Download slides - Courses

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Computer-Mediated
Communication
Privacy and Information Control
Coye Cheshire & Andrew Fiore
//
13 February 2013
Projects and Assignment #1
 Assignment 1 is a short 2-3 page description of your group
project idea and the division of labor within the group.
 Due Feb. 27 at beginning of class
(one assignment per group, two printed copies)
 Groups will be signing up for a meeting with us to discuss
the project the following Wednesday.
 http://courses.ischool.berkeley.edu/i216/s13/assignment1.php
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
1
The Internet is Good!
BAD!?
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
2
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
3
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
4
“Knowledge is Power”
 Choice to Share
 Choice to Exit
http://www.flickr.com/photos/felixmontino/3232503788/
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
5
Where did all of our information
control and power go?
 Accessibility
 Durability
http://www.misterkitty.org/dave/
 Comprehensiveness
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
6
Incorrect Information Inferences
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
7
“…[If] the widespread use of digital
remembering leads to a loss of
information control, it constricts
precisely the freedom to shape
one’s own identity”
“A History of Violence”
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
8
The Pros and Cons of Human Memory
 Tend to recall those things that are frequently
remembered
 Tend to recall things that confirm our beliefs,
rather than those that disconfirm
 We do not tend to recall memory specifics with
time as well as we do with artifacts, events,
people, scents, sounds
 Forgetting is part of human capacity to move
on, deal with past, push oneself to improve or
change.
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
9
The “Chilling Effect” of a Digital Panopticon
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
10
Potential Responses?
Digital Abstinence
Cognitive Adjustment
Information Privacy Rights
Information Ecology
Privacy DRM
Perfect Contextualization
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
11
“I find the author's argument almost entirely speculative, and think
that he re-hashes fears which have reappeared continuously with
the introduction of new technologies. One of Mayer-Schoenberger's
critiques is that humans are not - and won't be - able to manage the
immense amount of of information catalogued by the tools of digitial
remembrance, which will "threaten our ability to decide rationally"
(113). I find this argument hyperbolic; humans have always dealt
with an ever-increasing amount of stimuli and information, and we
have always adapted more-or-less successfully. Daniel Rosenberg's
piece "Early Modern Information Overload," for example, details
almost precisely the same hysteria surrounding the burgeoning array
of encyclopedias and scholarly journals in the 16th and 17th
centuries.— LIndsay
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
12
Consider, if you will, the world of Downton Abbey, Season 1
(April, 1912): Britain's caste system was securely in place.
Though reading and writing systems were readily available,
only 40% of the population was literate. Even in the upper
echelons, the movement of information between persons
was, by in large, disseminated orally…
Now consider where both Britain and the extended colonies
found themselves a few decades later (Season 3), as the
telephone and telegraph systems that enabled faster,
cheaper, and more broadly disseminated forms of
communication: those caste systems began to erode. As
people began to conceptualize a world beyond their
boarders, a new realm of possibilities, and with them the
ability to change and adapt, also materialized. — Jennifer
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
13
Rapid Design Activity
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
14
Design Activity #1: “Keep Me!”
Design a tool that allows users to pare down their
digital archives or histories to just those things they
want to keep. Be sure to consider the resolution of
this tool: Messages? Days? Months? Years?
People? Places?
Design Activity #2: “Forget Me!”
Design an “algorithm” for a machine to forget
for you. What information does it prioritize?
How does it decide what's important to keep
and what should be removed? Be specific.
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
15
5 min BREAK
+
Discussion of
Activity
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
16
Other Types of Empirical Work
on Privacy and Information
Control…
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
17
Facebook… who cares?
 boyd and Hargittai: Survey of
first-year UIC students
 Conducted on paper to avoid
bias towards web users with
higher privacy concerns
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
18
Facebook privacy settings circa Dec 2009
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
19
Facebook privacy settings circa July 2010
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
20
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
21
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
22
Confidence with
other online activities
 Gender differences
 What is the story here?
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
23
Managing
Privacy Settings
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
24
“[T]he researchers seem to define someone who manages their
privacy settings by how often that person changes their privacy
settings. This assumes that if a person changes his/her settings
often then he/she knows how to manage their privacy settings
whereas someone who have done it once doesn't (when in fact
the ones that change their privacy settings often maybe couldn't
make up their mind about certain types of privacy settings).
[…]
Over 50% of the original students who took the survey did not
respond to the second survey. Even when you take into
account that 10% was no longer at the school, the non
response rate is a significant number. Why is that?” — Evie
it would be interesting to see a follow-up to this study. Would
people be more or less concerned about privacy today?
Personally, I do not look at my privacy settings as much as I
did in, say, 2009. — Hannah
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
25
Web Discretion and Information
Control
 Cheshire/Antin/Churchill:
survey of Craigslist.org
users in the volunteer
sections of two large
cities (Atlanta and
Chicago).
Photo credit: http://thedatarescuecenter.com/blog/wpcontent/uploads/Privacy-Rights.jpg
 Conducted through an
online survey platform,
limiting the sample to
those who are clearly
internet users and who
take the time to answer
calls for open Internet
surveys
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
26
Who are the most vigilant internet users
(exercising web discretion)?
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
27
Online Social Intelligence: High Trust (open to
opportunities) combined with High Caution (skepticism)
and
HIGH
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
28
Web Discretion
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
29
+
=
2/13/13
Higher
Internet
Discretion
Cheshire & Fiore — Computer-Mediated Communication
30
Perception of Information Control
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
33
+
=
2/13/13
Lower
Perceived
Information
Control
Cheshire & Fiore — Computer-Mediated Communication
34
2/13/13
Lower
Perceived
Information
Control 35
Cheshire & Fiore — Computer-Mediated Communication
Take Away Point #1:
It can pay to take risks, but the most rewarding long-term strategies
involve risk-taking as well as a healthy dose of prudence
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
37
Take Away Point #2:
Information Control and Online Discretion are not Zero-Sum Games.
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
38
“I couldn't help but think of someone with an incredible sense of
‘internet superhighway street/highway smarts’. I felt that someone with
those street smarts would be worn and tested, being able to feel their
way around the net. Those of us who have been around the block
long enough have read or seen a story about identity theft, or have
had a home computer crash from sketchy web pages…know to guard
our information with our lives, because it is our lives.”
— Mark
“I find the research design that test the hypotheses confusing. There
is a huge simultaneity issue here: the causal direction could go either
way. For instance, differences in attitudinal beliefs in web privacy and
information control can lead to different exposures of adverse events.
At the moment, the research design seems to be purely correlational.
In addition…questions that addresses discretion and control attitudes
*directly* will prime and frame participants to answer questions about
their online behaviors to be consistent with their prior answers.”
— Weiyi
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
39
For next Wednesday…
Media Richness
Walther, J.B., and Parks, M.R. (2002) Cues filtered out, cues filtered in: Computer-mediated
communication and relationships. In In M.L. Knapp and J.A. Daly (Eds.), Handbook of
interpersonal communication (3rd ed., pp. 529?563). Thousand Oaks, CA: Sage. (Only pages
529 through 542 are required.)
Dennis, A.R., and S.T. Kinney. (1998) Testing media richness theory in the new media: The effects of
cues, feedback, and task equivocality. In Information Systems Research 9 (3).
Erickson, T., Halverson, C., Kellogg, W.A., Laff, M., and Wolf, T. (2002) Social translucence:
designing social infrastructures that make collective activity visible. In Communications of the
ACM 45 (4).
Donath, J. (2001) Mediated Faces. In In M. Beynon, C.L. Nehaniv, K. Dautenhahn (Eds.) Cognitive
Technology: Instruments of Mind: 4th International Conference.
2/13/13
Cheshire & Fiore — Computer-Mediated Communication
40