SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Dr Alexia Maddox
detecting disruption
Visualizing data from digital
communities surrounding
cryptocurrencies and the dark
web
Twitter: @alexiamadd
Overview
❖ Research agenda
❖ Visualising social form
❖ Characterising digital communities
❖ Social surfaces
❖ Data alignments for visualisation
❖ Socio-technical disruption
❖ Case study 1: cryptocurrency community(ies)
❖ Case study 2: Dark web community(ies).
Research context
❖ Social Scientist specialising in the study of digital communities,
digital social frontiers, and digital research methods including
❖ the study of collective behaviours online
❖ social media use
❖ digital cultures
❖ research methods to observe, monitor and engage online cohorts.
❖ Themes of social change, social cohesion, social activism and
social inclusion.
Research vision
❖ Generate a data recognition practice (AI/machine learning)
❖ model social intelligence in 3D immersive environment.
❖ search for signatures of social disruption within digital
trace data.
❖ Interactive and predictive analysis (historical and real
time).
❖ Identify non-human actors within social datasets that
influence social sentiment.
Research agenda
❖ Investigating available data, techniques and community
processes suitable for modelling and visualisation.
❖ Building collaborations through an interdisciplinary
network of researchers across the social sciences,
humanities and computational sciences (but not limited
to!).
❖ Developing an interactive and immersive platform for
researchers and research stakeholders to model social
processes.
Visualising social form
Modelling social form
Maddox, circa 2014 (vintage graphics!)
Maddox, A 2016, Research
Methods and Global Online
Communities: A Case Study,
Routledge, London, UK.
Figure: Methods for collecting data on digital community
Figure: Conceptualizing the link between egocentric data imprints to digital
community
Modelling individual
practices
Maddox, A 2017, 'Beyond digital dualism: Modeling digital community', in T Cottom, J
Daniels & K Gregory (eds), Digital Sociologies, Policy Press, Bristol, UK, pp. 9-26.
http://www.infinitelooper.com/?v=L-cxg8mF_Lw&p=n#/519;590
Serendipity & Social Surfaces
Maddox, circa 2014 (yes, Chromatophores!)
Deravi, LF, Magyar, AP, Sheehy, SP, Bell, GR, Mäthger, LM, Senft, SL,
Wardill, TJ, Lane, WS, Kuzirian, AM & Hanlon, RT 2014, 'The structure–
function relationships of a natural nanoscale photonic device in cuttlefish
chromatophores', Journal of The Royal Society Interface, vol. 11, no. 93, p.
20130942. http://rsif.royalsocietypublishing.org/content/11/93/20130942
Socio-technical disruption
Socio-technical disruption
❖ Hypotheses directing investigation:
❖ Digital communities generate and appropriate emerging technologies
to create alternative possibilities.
❖ Socio-technical disruption is manifested through digital communities.
❖ Socio-technical disruption may be identifiable through digital
signatures.
❖ Forms of identifiable disruption may be ambivalent, malicious or
resistance/refusal acts against structural inequalities.
❖ Within a community this can be characterised through both internal
events and externalised activities.
Case study 1: Cryptocurrencies
❖ To study public discourse surrounding cryptocurrencies via social
media analysis.
❖ Cryptocurrencies are:
❖ Digital payments systems
❖ based upon decentralised peer-to-peer exchange practices
❖ Use of encryption technologies for user privacy and anonymity.
❖ Contentious developments widely discussed within social
media surrounding cryptocurrencies over the last five years
(2012-2017).
Data gathered through TrISMA archive and processed through Tableau (unpublished)
Figure: Cryptocurrency discussion in the Australian Twittersphere 2012 to early 2017
Case study 1: Cryptocurrencies
❖ Community profile
❖ Origins within the Cyber-libertarians of the 1990s (Cypherpunks email
list formed in 1992).
❖ Value field includes: privacy, anonymity, personal sovereignty &
autonomy, freedom (of information and by contractual relationships),
disruption of state, decentralisation, peer-to-peer socio-technical
architectures, code-as-law.
❖ Goldbugs, hippies, cyberlibertarians and so on … (Maurer 2013).
❖ Cypherpunks and Crypto-anarchists (Swartz 2018).
❖ Broader base includes fintech enthusiasts and speculators, start ups and
entrepreneurs, privacy advocates.
Maddox, A, Singh, S, Horst, H & Adamson, G 2016, 'An ethnography of Bitcoin: Towards a future research
agenda', Australian Journal of Telecommunications and the Digital Economy, vol. 4, no. 1, pp. 65-78.
Case study 1: Cryptocurrencies
❖ External disruption
❖ Community agenda towards the disruption of
centralised banking system
❖ Frictionless transfers across national borders (ie
stateless transfer).
❖ Blockchain developments (cf. Allen 2018, Zhao
2016)
Case study 1: Cryptocurrencies
❖ Internal disruption
❖ There have been several contentious events within
the community (ie forking in the blockchain, hacks
and scams).
❖ These are disputes surrounding what the
technologies can or should do linked to disputes
between values.
Case study 1: Cryptocurrencies
❖ Trends & tensions over 2012-2017
❖ Incorporation of these technologies within banks
❖ Scams and hacks through exchanges and ICOs
❖ Centralising forces & middle men
❖ Investment/speculation bubble
❖ Digital metallism vs infrastructural mutualism
(Swartz 2018).
Case study 2: Cyberlibertarians
❖ To study cyber-libertarian discourse within the
contentious environments of the dark web.
❖ To investigate the relationship between passive data
monitoring (big data analysis) and data gathered
through active engagement (small data analysis)
❖ Consider how this combination of data can inform
and disrupt assumptions within data visualisation
approaches.
Case study 2: Cyberlibertarians
❖ Dark web environments
❖ Overlapping values towards the sovereign self, personal privacy
and anonymity.
❖ Nodal governance of online spaces
❖ Expression of radical values (information freedom, radical
transparency, radical anti-statism).
❖ Cyber-libertarianism 2.0: anarcho-capitalism of the sharing
economy & DIY prosumers freed from external constraint
(Dahlberg 2010).
❖ Technology-enabled solutions to social problems
❖ Self-organising practices of resistance (cf. Fuchs, Coleman)
Case study 2: Cyberlibertarians
❖ Cryptomarkets
❖ Choice-driven drug
purchasing online
❖ Constructive activism
❖ Contentious visibility
❖ ‘Selfcare’ vs ‘Healthcare’
Maddox, A, Barratt, MJ, Allen, M & Lenton, S 2015, 'Constructive activism in the dark web: cryptomarkets and illicit drugs in the
digital ‘demimonde’', Information, Communication & Society, pp. 1-16.
Barratt, MJ, Lenton, S, Maddox, A & Allen, M 2016, '‘What if you live on top of a bakery and you like cakes?’—Drug use and harm
trajectories before, during and after the emergence of Silk Road', International Journal of Drug Policy, vol. 35, pp. 50-7.
Barratt, MJ & Maddox, A 2016, 'Active engagement with stigmatised communities through digital ethnography', Qualitative Research,
vol. 16, no. 6, pp. 701-19.
https://anthrodendum.org/2018/01/22/a-digital-bermuda-triangle-the-perils-of-doing-ethnography-on-darknet-drug-markets/
Case study 2: Cyberlibertarians
❖ External disruption
❖ Constructive activism: building a new world in the
shell of the old.
❖ Online privacy and digital rights movement
❖ Internal disruption
❖ Hacks and Scams, DDOS attacks, Doxxing , site
seizure by law enforcement, digital diasporas in
digital spaces
Methodological challenges abound
❖ Defining and locating the community to study.
❖ Gaining consent and engagement and addressing the many ethical
quandaries.
❖ Decisions on which methods and data collection tools.
❖ Identification of appropriate data sources
❖ Data capture: data on the dark web tends towards the ephemeral.
❖ How to render social intelligence into 3D formats (multi-factor
visualisation).
❖ How to incorporate machine learning and AI approaches to process
social intelligence (archival and real time information).
Next steps
❖ Keep plugging away at case study 1
❖ Identify appropriate subject of study for case study 2
❖ Identify and map available data sources
❖ Investigate 3D visualisation tools and Machine learning/AI tools.
❖ Determine funding sources to support the development of this project
❖ Identify and engage collaborators and build a research network/ engage
and interdisciplinary field
❖ Publish, publish, publish
❖ Stay employed long enough to develop critical mass around this project!

Mais conteúdo relacionado

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Destaque

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Destaque (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Detecting disruptive events within digital communities: Visualizing Data from Cryptocurrency and Dark Web Communities

  • 1. Dr Alexia Maddox detecting disruption Visualizing data from digital communities surrounding cryptocurrencies and the dark web Twitter: @alexiamadd
  • 2. Overview ❖ Research agenda ❖ Visualising social form ❖ Characterising digital communities ❖ Social surfaces ❖ Data alignments for visualisation ❖ Socio-technical disruption ❖ Case study 1: cryptocurrency community(ies) ❖ Case study 2: Dark web community(ies).
  • 3. Research context ❖ Social Scientist specialising in the study of digital communities, digital social frontiers, and digital research methods including ❖ the study of collective behaviours online ❖ social media use ❖ digital cultures ❖ research methods to observe, monitor and engage online cohorts. ❖ Themes of social change, social cohesion, social activism and social inclusion.
  • 4. Research vision ❖ Generate a data recognition practice (AI/machine learning) ❖ model social intelligence in 3D immersive environment. ❖ search for signatures of social disruption within digital trace data. ❖ Interactive and predictive analysis (historical and real time). ❖ Identify non-human actors within social datasets that influence social sentiment.
  • 5. Research agenda ❖ Investigating available data, techniques and community processes suitable for modelling and visualisation. ❖ Building collaborations through an interdisciplinary network of researchers across the social sciences, humanities and computational sciences (but not limited to!). ❖ Developing an interactive and immersive platform for researchers and research stakeholders to model social processes.
  • 7. Modelling social form Maddox, circa 2014 (vintage graphics!)
  • 8. Maddox, A 2016, Research Methods and Global Online Communities: A Case Study, Routledge, London, UK. Figure: Methods for collecting data on digital community
  • 9. Figure: Conceptualizing the link between egocentric data imprints to digital community Modelling individual practices Maddox, A 2017, 'Beyond digital dualism: Modeling digital community', in T Cottom, J Daniels & K Gregory (eds), Digital Sociologies, Policy Press, Bristol, UK, pp. 9-26.
  • 10. http://www.infinitelooper.com/?v=L-cxg8mF_Lw&p=n#/519;590 Serendipity & Social Surfaces Maddox, circa 2014 (yes, Chromatophores!) Deravi, LF, Magyar, AP, Sheehy, SP, Bell, GR, Mäthger, LM, Senft, SL, Wardill, TJ, Lane, WS, Kuzirian, AM & Hanlon, RT 2014, 'The structure– function relationships of a natural nanoscale photonic device in cuttlefish chromatophores', Journal of The Royal Society Interface, vol. 11, no. 93, p. 20130942. http://rsif.royalsocietypublishing.org/content/11/93/20130942
  • 12. Socio-technical disruption ❖ Hypotheses directing investigation: ❖ Digital communities generate and appropriate emerging technologies to create alternative possibilities. ❖ Socio-technical disruption is manifested through digital communities. ❖ Socio-technical disruption may be identifiable through digital signatures. ❖ Forms of identifiable disruption may be ambivalent, malicious or resistance/refusal acts against structural inequalities. ❖ Within a community this can be characterised through both internal events and externalised activities.
  • 13. Case study 1: Cryptocurrencies ❖ To study public discourse surrounding cryptocurrencies via social media analysis. ❖ Cryptocurrencies are: ❖ Digital payments systems ❖ based upon decentralised peer-to-peer exchange practices ❖ Use of encryption technologies for user privacy and anonymity. ❖ Contentious developments widely discussed within social media surrounding cryptocurrencies over the last five years (2012-2017).
  • 14. Data gathered through TrISMA archive and processed through Tableau (unpublished) Figure: Cryptocurrency discussion in the Australian Twittersphere 2012 to early 2017
  • 15. Case study 1: Cryptocurrencies ❖ Community profile ❖ Origins within the Cyber-libertarians of the 1990s (Cypherpunks email list formed in 1992). ❖ Value field includes: privacy, anonymity, personal sovereignty & autonomy, freedom (of information and by contractual relationships), disruption of state, decentralisation, peer-to-peer socio-technical architectures, code-as-law. ❖ Goldbugs, hippies, cyberlibertarians and so on … (Maurer 2013). ❖ Cypherpunks and Crypto-anarchists (Swartz 2018). ❖ Broader base includes fintech enthusiasts and speculators, start ups and entrepreneurs, privacy advocates. Maddox, A, Singh, S, Horst, H & Adamson, G 2016, 'An ethnography of Bitcoin: Towards a future research agenda', Australian Journal of Telecommunications and the Digital Economy, vol. 4, no. 1, pp. 65-78.
  • 16. Case study 1: Cryptocurrencies ❖ External disruption ❖ Community agenda towards the disruption of centralised banking system ❖ Frictionless transfers across national borders (ie stateless transfer). ❖ Blockchain developments (cf. Allen 2018, Zhao 2016)
  • 17. Case study 1: Cryptocurrencies ❖ Internal disruption ❖ There have been several contentious events within the community (ie forking in the blockchain, hacks and scams). ❖ These are disputes surrounding what the technologies can or should do linked to disputes between values.
  • 18. Case study 1: Cryptocurrencies ❖ Trends & tensions over 2012-2017 ❖ Incorporation of these technologies within banks ❖ Scams and hacks through exchanges and ICOs ❖ Centralising forces & middle men ❖ Investment/speculation bubble ❖ Digital metallism vs infrastructural mutualism (Swartz 2018).
  • 19. Case study 2: Cyberlibertarians ❖ To study cyber-libertarian discourse within the contentious environments of the dark web. ❖ To investigate the relationship between passive data monitoring (big data analysis) and data gathered through active engagement (small data analysis) ❖ Consider how this combination of data can inform and disrupt assumptions within data visualisation approaches.
  • 20. Case study 2: Cyberlibertarians ❖ Dark web environments ❖ Overlapping values towards the sovereign self, personal privacy and anonymity. ❖ Nodal governance of online spaces ❖ Expression of radical values (information freedom, radical transparency, radical anti-statism). ❖ Cyber-libertarianism 2.0: anarcho-capitalism of the sharing economy & DIY prosumers freed from external constraint (Dahlberg 2010). ❖ Technology-enabled solutions to social problems ❖ Self-organising practices of resistance (cf. Fuchs, Coleman)
  • 21. Case study 2: Cyberlibertarians ❖ Cryptomarkets ❖ Choice-driven drug purchasing online ❖ Constructive activism ❖ Contentious visibility ❖ ‘Selfcare’ vs ‘Healthcare’ Maddox, A, Barratt, MJ, Allen, M & Lenton, S 2015, 'Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’', Information, Communication & Society, pp. 1-16. Barratt, MJ, Lenton, S, Maddox, A & Allen, M 2016, '‘What if you live on top of a bakery and you like cakes?’—Drug use and harm trajectories before, during and after the emergence of Silk Road', International Journal of Drug Policy, vol. 35, pp. 50-7. Barratt, MJ & Maddox, A 2016, 'Active engagement with stigmatised communities through digital ethnography', Qualitative Research, vol. 16, no. 6, pp. 701-19. https://anthrodendum.org/2018/01/22/a-digital-bermuda-triangle-the-perils-of-doing-ethnography-on-darknet-drug-markets/
  • 22. Case study 2: Cyberlibertarians ❖ External disruption ❖ Constructive activism: building a new world in the shell of the old. ❖ Online privacy and digital rights movement ❖ Internal disruption ❖ Hacks and Scams, DDOS attacks, Doxxing , site seizure by law enforcement, digital diasporas in digital spaces
  • 23. Methodological challenges abound ❖ Defining and locating the community to study. ❖ Gaining consent and engagement and addressing the many ethical quandaries. ❖ Decisions on which methods and data collection tools. ❖ Identification of appropriate data sources ❖ Data capture: data on the dark web tends towards the ephemeral. ❖ How to render social intelligence into 3D formats (multi-factor visualisation). ❖ How to incorporate machine learning and AI approaches to process social intelligence (archival and real time information).
  • 24. Next steps ❖ Keep plugging away at case study 1 ❖ Identify appropriate subject of study for case study 2 ❖ Identify and map available data sources ❖ Investigate 3D visualisation tools and Machine learning/AI tools. ❖ Determine funding sources to support the development of this project ❖ Identify and engage collaborators and build a research network/ engage and interdisciplinary field ❖ Publish, publish, publish ❖ Stay employed long enough to develop critical mass around this project!