inls089   117

« earlier    

Current.org | Andy Carvin, virtual correspondent, 2012
This vetting process occupies most of Carvin’s workdays. At first glance it looks much like the daily routine of many journalists, but it’s how Carvin became the talk of journalistic digerati a year ago, when he channeled his social-media savvy as a one-man newsroom covering the Arab Spring’s rolling upheaval.
inls089 
august 2012 by fstutzman
Programming the Global Brain | May 2012 | Communications of the ACM
We still only poorly understand, however, how to "program" this global brain. We have some stunning success stories (such as Wikipedia, Google), but most applications still fail, or require a long series of trial-and-error refinements, for reasons we only poorly understand. Because people are involved, programming the global brain is deeply different from programming traditional computers. In this Viewpoint, we will consider this challenge, exploring the nature of these differences as well as issuing a call to arms describing open research challenges that need to be met in order to more fully exploit the enormous potential of the global brain.
collective_intelligence  inls089  inls490121 
july 2012 by jpom
Privacy management on social media sites | Pew Research Center's Internet & American Life Project
Social network users are becoming more active in pruning and managing their accounts. Women and younger users tend to unfriend more than others.

About two-thirds of internet users use social networking sites (SNS) and all the major metrics for profile management are up, compared to 2009: 63% of them have deleted people from their “friends” lists, up from 56% in 2009; 44% have deleted comments made by others on their profile; and 37% have removed their names from photos that were tagged to identify them.
inls089  inls490121  social_media  privacy 
february 2012 by jpom
Information Manipulation, Coordination, and Regime Change
This paper presents a model of information and political regime change. If enough citizens act against a regime, it is overthrown. Citizens are imperfectly informed about how hard this will be and the regime can, at a cost, engage in propaganda so that at face-value it seems hard. This coordination game with endogenous information manipulation has a unique equilibrium and the paper gives a complete analytic characterization of its comparative statics. If the quantity of information available to citizens is suciently high, then the regime has a better chance of surviving. However, an increase in the reliability of information can reduce the regime’s chances. These two effects are always in tension: a regime benefits from an increase in information quantity if and only if an increase in information reliability reduces its chances. The model allows for two kinds of information revolutions. In the first, associated with radio and mass newspapers under the totalitarian regimes of the early twentieth century, an increase in information quantity coincides with a shift towards media institutions more accommodative of the regime and, in this sense, a decrease in information reliability. In this case, both effects help the regime. In the second kind, associated with diffuse technologies like modern social media, an increase in information quantity coincides with a shift towards sources of information less accommodative of the regime and an increase in information reliability. This makes the quantity and reliability effects work against each other. The model predicts that a given percentage increase in information reliability has exactly twice as large an effect on the regime’s chances as the same percentage increase in information quantity, so, overall, an information revolution that leads to roughly equal-sized percentage increases in both these characteristics will reduce a regime’s chances of surviving.
inls089  propaganda  social_change  socialsoftware  information 
december 2011 by jpom

« earlier    

related tags

accountability  activism  agency  algorithms  amazon  analysis  anonymity  anti-power  architecture  attention  augmentation  authority  barry_wellman  bigsheets  bing  blog  business  campaign  censorship  collective_intelligence  communication  computational_journalism  computational_thinking  conference  copyright  corpus  counter-power  crowdsourcing  culture  cyberwar  cyborg  data  datamining  dataset  debate  default  delicious  democracy  demographics  design  dictatorship  digital  documentary  duke  ecommerce  egypt  election  entrepreneurship  exercise  exoinformation  facebook  failure  feltron  filetype:pdf  filter  filtering  foreign_policy  freedom  google  government  groupon  health  homophily  ibm  identity  individualism  infochimps  infographics  informatics  information  information_overload  infrastructure  inls200  inls490121  inls890121  innovation  intelligence  internet  iran  journalism  kremlin  law  liberation  life  loc  manyeyes  mashup  media  media:document  meshnet  microsoft  mobile  myspace  national_security  netflix  netwar  network  nike  nonviolent  pandora  phone  policy  politics  power  preservation  privacy  programming  propaganda  protest  psychology  reading  recommender  repression  research  resistance  restaurant  revolution  rights  running  science  search  searchengine  security  sexual_identity  shirky  social  social_change  social_contagion  social_informatics  social_media  socialnetworking  socialsoftware  society  sociology  software  sousveillance  stanford  statistics  surveillance  sweden  taxonomy  technological_determinism  technology  tie_strength  tor  trends  trust  tunisia  tutorial  twitter  ukraine  unc  us  vendor  video  visualization  wearable_computing  web  wikileaks  wikipedia  yahoo  yahoo_pipes  yelp  youth 

Copy this bookmark:



description:


tags: