Towards Trustworthy Social Media and Crowdsourcing by George Chamales, Rogue Genius, LLC | May 2013

Towards Trustworthy Social Media and Crowdsourcing by George Chamales, Rogue Genius, LLC | May 2013

policy memo series vol 2 TOWARDS TRUSTWORTHY SOCIAL MEDIA AND CROWDSOURCING By George Chamales, Rogue Genius, LLC | May 2013 Individuals and organizations interested in using social media and crowdsourcing currently lack two key sets of information: a systematic assessment of the vulnerabilities in these technologies and a comprehensive set of best practices describing how to address those vulnerabilities. Identifying those vulnerabilities and developing those best practices are necessary to address a growing number of incidents ranging from innocent mistakes to targeted attacks that have claimed lives and cost millions of dollars. The trouble with trusting technology is that there The first step is to understand the primary are so many ways things can go wrong; prob- ways in which these technologies can be lems can occur as a result of weaknesses in the used. The second is to assess the ways in technology, mistakes made by users, or trouble which things can go wrong while using them. intentionally caused by abusers. This is certainly The third is to develop best practices to pre- the case when dealing with crowdsourcing and vent those bad things from happening. social media—technologies built on complex, global platforms that rely on the interaction of Building trust through understanding technolo- hundreds of thousands of people every day. gies, identifying vulnerabilities, and developing best practices does not require that the tech- Laying the foundation for trust in social media nologies or the people using them be trust- and crowdsourcing is a three-step process. worthy. Instead, it enables users ranging from Box 1. A Tale of Two Tweets Hoax Twitter Account On January 29, 2013, false mes- sages were posted to Twitter stat- ing that the Department of Justice was investigating the computer hardware manufacturer Audience, Inc. Shortly thereafter, the compa- ny’s stock value dropped sharply by more than 25 percent. Two days later, similarly faked tweets about a pharmaceutical company coincided with a sudden, 9 percent drop in its value. In both cases, the fabricated messages were sent from accounts impersonating well-known financial analysis firms.1 Real Twitter Account 2 Building trust through understanding technologies, identifying vulnerabilities, and developing best practices does not require that the technologies or the people using them be trustworthy. Instead, it enables users ranging from individuals to government agencies to trust that they have the information necessary to make informed decisions about when and how to use these technologies effectively. individuals to government agencies to trust that messages is the result of conventions devel- they have the information necessary to make oped to insert common point-to-point mes- informed decisions about when and how to use saging features that were intentionally omit- these technologies effectively. ted. For example, using an @ followed by a username indicates that, even though a tweet How to Use Social Media is being shared with everyone, it is intended for a particular user (e.g., “Hey @finkd, loved The social media ecosystem includes a the chicken picture!”). growing number of online platforms, such as Facebook, Twitter, and Sina Weibo (i.e., The broadcast nature of some social media a Chinese social networking site similar to platforms can lead to confusion, as took Twitter and Facebook), that enable individuals place when a Christmas dinner photo of and organizations to broadcast information, the Zuckerberg family, including Facebook engage in ongoing conversations, or passively founder Mark, was “leaked” to Twitter. Mark’s collect information posted by users. sister Randi posted the photo on Facebook, where it was automatically broadcast to Broadcasting, where a message is sent to her group of friends and made available to a group of users, puts the “social” in social the friends of those friends. One of those media. Twitter is a great example of the friends-of-friends assumed that she was able broadcast-centric design of social media to see the family photo because the picture platforms. Unlike point-to-point communica- was public. She then re-posted it to Twitter, tions systems like email or text messages, where it quickly went viral, much to the cha- there’s no To: field in a Twitter message; each grin of Randi Zuckerberg.2 tweet is, by default, broadcast to every- one who is “following” that user’s message Social media also enables engagement feed. The confusing format of many Twitter between a wide population of users. It is 3 Crowdsourcing technology brings together a distributed workforce of individuals in order to collect resources, process information, or create new content. estimated that 67 percent of adults in the variety of opportunities for both individuals United States use social media, and there are and organizations seeking to take advantage currently more than 1 billion active Facebook of social media. Broadcasting creates the users worldwide.3 In some situations, the opportunity to build a digital audience mea- engagement process is replacing the traditional sured in the millions. Justin Bieber, who was means by which people communicate. This was an unknown Canadian teenager in 2008, now certainly the case when a pair of young girls got has more Twitter followers than there are peo- lost in the storm drains beneath their hometown ple in Canada.5 of Adelaide, Australia. The girls were able to obtain a cell phone signal which they used to The engagement capability enables everyone post a distress message on Facebook. They from individuals to well-orchestrated brand were found after a Facebook friend forwarded campaigns to interact with millions of people their information to the local authorities.4 almost anywhere in the world. Finally, the collection capability gives both users and Passive collection of social media messages outsiders access to the wealth of content makes it possible to gather information from created and distributed on these platforms. these platforms without having to broadcast information or engage with others. This can be How to Use Crowdsourcing as simple as browsing through the public con- tent posted online or creating an account that Crowdsourcing technology brings together a follows other users. Some platforms offer third distributed workforce of individuals in order parties, such as online marketers, the opportu- to collect resources, process information, or nity to pay for direct access to the messages create new content. The implementation of a sent by social media users (Twitter refers to their crowdsourcing system can vary widely, from third-party message feed as “The Firehose”). complex online websites that coordinate a mil- This access is central to the ongoing existence lion simultaneous workers to low-tech, ad hoc of many social networks that generate revenue approaches that use a shared spreadsheet. through targeted advertising based on the infor- mation their users have shared. Crowdsourced collection uses a group of workers to find and gather resources. This combination of uses—broadcasting, The recent rise of crowd-funding web- engagement, and collection—creates a wide sites like Kickstarter.com and Indigogo are 4 crowdsourced collection systems used to a crowdsourced game in which individuals find and gather money for new projects. identify ways that complex protein molecules Crowdsourced collection can also be used are folded together. In September of 2011, to identify useful information and may be members of their workforce identified the performed with or without the knowledge of structure of a protein central to the spread of the individuals that make up the workforce. AIDS. That task, which had been unsolved During the early days of the Libyan revolu- for the last decade, was accomplished by the tion, response agencies outside of the con- Foldit crowd in just over 10 days.8 flict zone used the photos, videos, and other messages posted on social media to build Crowdsourced content creation uses the and update a shared situational awareness crowd to produce entirely new information. map.6 Similar efforts have sought to collect This can be accomplished by bringing togeth- information from citizens during contested er teams of individuals to tackle a problem elections in countries such as Egypt, Sudan, or distributing a problem to many different and Kenya. individuals in search of a person capable of developing a solution. The data competition In crowdsourced information processing, company Kaggle and the U.S. government’s a workforce takes an existing set of data Challenge.gov website post challenges for and converts, identifies, or extracts infor- users from around the world to solve problems mation that is useful for a specific task. ranging from predicting the progression of HIV Crowdsourced information processing can infection to building better lightbulbs.9 be combined with social media to distinguish useful pieces of information (e.g. identifying Many well-known crowdsourcing efforts use damaged buildings during a natural disas- a combination of collection, processing, and ter) from the significant volume of messages creation. The articles posted to Wikipedia being posted every moment. Those tasks that combine original writing created by its users are difficult or currently impossible for com- and a collection of citations to external puters to do are particularly suited for crowd- sources. Both the writing and the sources sourced information processing. are put through an editorial review process to ensure that the articles meet the site’s For example, online dating sites are using San standards. The management approaches Francisco–based CrowdFlower’s million-per- developed by successful crowdsourcing and son global workforce to identify risqué photos social media operations enable the effective that violate their site’s acceptable use poli- use of these technologies. Understanding cies.7 The task is difficult for computers to do, why these techniques are successful and but can be performed in seconds by workers how to leverage them in other situations around the world.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us