SlideShare uma empresa Scribd logo
1 de 23
+

The Dark Side of Social
Networks
Current Issues in Web Technology
Michael Heron
+

Introduction


We’ve spoken quite a lot about some of the power of social
networks.


We need to traverse some dark parts of the human psyche to really
appreciate many of the benefits.



In this lecture we’re going to talk about those dark parts, and
how social networks work as much through fear and conformity
as through memes and virality.



Many of the techniques used to create the stickiest and most
viral messages are fundamentally exploitative.


We’ll talk more about this in the Captology lectures.
+

Conformity


Have you ever heard of the phrase ‘social proofing’?




Social proofing is the cognitive bias that comes into play when
we are in social circumstances and don’t know how to behave.




Probably not, but every one of us is affected by it every day.

We look to the people around us for cues as to how we should
interpret a situation.

That works reasonably well.


Sometimes.
+

Conformity


We are very strongly influenced by social contexts.




Also in the Solomon Asch line experiments.







C.F. Milgram Experiment and the Stanford Prison Experiment.

http://www.youtube.com/watch?v=TYIh4MkcfJA
Codified in things like the Matthew Effect.
Feedback accumulates to things which have already accumulated
feedback.

Social networks are multipliers of these effects.



Because we are ‘part of the group’
Social pressures are strongest when they come from ‘people like us’
+

The Bystander Effect


A tremendously famous incident in 1964 was the murder of Kitty
Genovese.




The murder itself is not what made the incident so well known.




A 28 year old woman stabbed to death outside her home in NYC.

It was the newspaper coverage that followed.

Investigations by reporters (some of which may have been
embellished) revealed two key facts:




The attacks had happened over a 30 minute period in three separate
incidents..
 A period of time during which she was screaming for help.
During that time several dozen people watched the murder.
 None of them called them police.
+

The Bystander Effect


Whether or not the reporting of this event was accurate, the research it
spawned off is well validated.





And become codified as ‘the bystander effect’
http://www.youtube.com/watch?v=OSsPfbup0ac

Driven by:



Social proofing
Diffusion of responsibility



‘Someone else will do something’



‘Nobody else seems to be concerned’



Counteracted by specific allocations of roles, actions and responsibilities.



Counteracted by ‘accountability’ for actions.
+

People Like Us


Humans are naturally designed to form groups.






The effects of these vary from person to person, but they exert
a constant pressure from many directions.




The family
The tribe
The nationality

‘Our genes make us like people like us’
 http://www.psychologicalscience.org/media/releases/2005/pr0507
27.cfm

It takes a certain kind of personality to be willing to spend a lot
of time ‘rocking the boat’
+

Social Pressure


At school, the pressure to conform had a name.




It never truly goes away.




You might think of it as an aggressive form of memetic propagation.

Social networks, by virtue of their design, are powerful
amplifiers of social effects.




Peer pressure

And some of these effects work against our better judgement.

They invoke a ‘whirr-click’ response, to quote Robert Cialdini.
+

Social Pressure


If you buy into the basic premise of memetic theory, the
reasons why social pressures are important is obvious.


You pick up real viruses by being in close proximity to people with
viruses.



You’re more likely to catch them from your friends.



The ideas and attitudes that your friends have propagate more
freely than the ideas and attitudes of strangers.



Within our monkey brains, that also extends to ‘people like us’.


‘These people who are of my tribe’
+

Reciprocity Effect


Let’s look at one such effect that is capitalized upon by the
trend towards social gaming.




Have you ever been in a situation where someone has handed
you a cheap trinket and then asked for money?




It’s a very common technique.

One of the cognitive biases in the human mind is that ‘gifts
must be repaid’




The Reciprocity Effect.

We must reciprocate.

This effect underpins the propagation of social norms.
+

Reciprocity Effect


Zynga are masters of this effect.




Farmville in particular is a masterpiece of psychological
manipulation.




It’s not so much a game as a perfectly pitched engine for transferring
the contents of your bank account from you to Zynga.

You will have seen this in action, undoubtedly.




To help us bridge in this lecture the narrative from social networks to
games.

<Some friend> has gifted you a cow! Log on to Farmville to return the
favour!

You didn’t get me gift! You got me an obligation.


http://www.youtube.com/watch?v=38x6kWB-xD4
+

Reciprocity Effect


The effect is magnified within our ‘people like us’ group.




What? To do that I need to click on these stupid things and then
press that thing and then come back in an hour? Fine, whatever.





Someone got me a cow, I must then log on to do whatever dumb
thing I need to do to negate the imbalance.

Right, I’m back. Hey, they gave me a free cow I can gift to a friend.
I guess that’s nice of them. I can send that on to the friend who sent
me his’

Some minutes later, from the perspective of the first friend:


‘Wow, he sent me a cow back!’



‘They must really like Farmville. I’ll send something else their way
when I get a chance’
+

The Dark Side


The problem with all these techniques as that they are largely
evolutionary traits.




Cognitive biases are the ‘cheat codes to the human mind’




If you know they exist, you can design strategies to tickle these biases.

They don’t work universally.




Our cognitive biases, and there are hundreds of them, help us make
sense of an incredibly complex world.

At best they increase rates of compliance.

But nonetheless, you’re exploiting loopholes in human thinking.


Loopholes of which many people are not aware.
+

The Dark Side


There are numerous ways in which the nature of social
networking has a dark side.


An erosion of privacy




Facilitation of social pressures.




And an increase in the willingness of individuals to share
information.
Cyberbullying

Enabling the wrong kinds of ‘people like us’ to communicate.





Terrorists
Traders of child sex images

Deindividuation


Hidden behind pseudonyms
+

The Dark Side


Social networks don’t create any of these problems.




However, their design does magnify the effects.

There were ‘funny memes’ before Facebook.


However, it was difficult for such things to become viral.




Virality is multiplied by the power of social networks.

It’s easy to separate the real life consequences when all the social
cues point to propagation.


It’s easy to forget that most memes are profoundly cruel to the
people involved.



If it was bad, people wouldn’t be doing it, right?
+

Bandwagon Effects


Social networks multiply the bandwagon effect.




This is another cognitive bias, reinforced by other biases.





Social proofing
‘Herd instinct’

The bandwagon effect by itself is not inherently harmful, and can be put to
‘good’ use.






The more people doing something, the more ‘okay’ it has to be.

The current ‘green bandwagon’
Momentum in socially beneficial causes.
The ‘Arab spring’

However, it can also create a tremendously negative environment in which
people sublimate their judgements for that of the group.
+

Cyberstalking


We put more and more information online every year.




That is, ‘the collective we’

The more information we put out there, the more information it
will unexpectedly reveal.


An individual foursquare announcement won’t tell me anything.



A thousand analysed over the course of a year will tell me
everything.




http://techcrunch.com/2010/02/17/please-rob-me-makesfoursquare-super-useful-for-burglars/

Not everyone who views your online footprint is going to be
looking to do you any favours.
+

Identify Theft


Consider the common ‘security questions’ that are asked for
authentication.




Your mother’s maiden name
Your first pet
Where you were born



Consider the set of information that your social networks ask of
you on a daily basis.



Consider what people could find out from looking at your
relationships.



Consider what they could find out looking at your ‘where I lived’
entries.
+

Identify Theft


There are high profile examples of people gaining enough
information through analysing the information available online





Facebook code leak
One Direction album leak

But, identify theft is a growing problem.




And the ease with which it can be done is increased as a result of
social networking.

In many cases, it is not an individual doing this.


This is a staple of organised crime nowadays,
+

The Culture of Sharing


More and more employers, police and other interested
individuals are looking to social media.



The media we upload is usually full of identifying metadata.




A while ago someone posted a photograph of a desk, upon
which was a line of cocaine.




Digital cameras encode a giant amount of information with their
digital files.

With the tagline ‘I bet you can’t guess where I am’

Seconds later, the Internet told him.


‘The second office on the third floor of the east wing of the
Whitehouse’
+

The Culture of Sharing


Some employers demand employees for their social media
login details.





Mostly in America.
We have stronger data protection here.

However, how much of your social media data is truly private?


Facebook change their privacy settings on an almost monthly basis.



If your settings are locked down, what about friends sharing
your photos?



What about you being tagged in their public photos?
+

The Culture of Sharing


In America, during a divorce settlement, a couple were told to
share each other’s facebook password.


Full disclosure.



Could your account stand up to the scrutiny of someone else
looking over everything you’ve ever said and done there?



Can you delete the information you put online?



Can you ever put the genie back in the bottle?



Do we share too much as a society?
+

Conclusion


Social networks have the power to do great things for us.




Our culture of online sharing creates a range of issues for us in
the future.




We can’t really get away from the things we’ve done online.

The context in which we make remarks is often not obvious.





But they have a dark side.

You’ll say things to friends you wouldn’t say to other people.
You’ll say things to colleagues in a particular area of expertise that
others will misinterpret.

And along the way, the human mind is working against us.


Because it’s full of cognitive biases.

Mais conteúdo relacionado

Mais de Michael Heron

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMichael Heron
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconductMichael Heron
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkMichael Heron
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility SupportMichael Heron
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and AutershipMichael Heron
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interactionMichael Heron
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityMichael Heron
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - TexturesMichael Heron
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)Michael Heron
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)Michael Heron
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationMichael Heron
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsMichael Heron
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsMichael Heron
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationMichael Heron
 

Mais de Michael Heron (20)

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game Accessibility
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconduct
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS Framework
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility Support
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and Autership
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interaction
 
SAD04 - Inheritance
SAD04 - InheritanceSAD04 - Inheritance
SAD04 - Inheritance
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - Textures
 
GRPHICS06 - Shading
GRPHICS06 - ShadingGRPHICS06 - Shading
GRPHICS06 - Shading
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical Representation
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D Graphics
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art Appreciation
 
2CPP18 - Modifiers
2CPP18 - Modifiers2CPP18 - Modifiers
2CPP18 - Modifiers
 
2CPP17 - File IO
2CPP17 - File IO2CPP17 - File IO
2CPP17 - File IO
 
2CPP16 - STL
2CPP16 - STL2CPP16 - STL
2CPP16 - STL
 
2CPP15 - Templates
2CPP15 - Templates2CPP15 - Templates
2CPP15 - Templates
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

COMPISSUES03 - The Dark Side of Social Networks

  • 1. + The Dark Side of Social Networks Current Issues in Web Technology Michael Heron
  • 2. + Introduction  We’ve spoken quite a lot about some of the power of social networks.  We need to traverse some dark parts of the human psyche to really appreciate many of the benefits.  In this lecture we’re going to talk about those dark parts, and how social networks work as much through fear and conformity as through memes and virality.  Many of the techniques used to create the stickiest and most viral messages are fundamentally exploitative.  We’ll talk more about this in the Captology lectures.
  • 3. + Conformity  Have you ever heard of the phrase ‘social proofing’?   Social proofing is the cognitive bias that comes into play when we are in social circumstances and don’t know how to behave.   Probably not, but every one of us is affected by it every day. We look to the people around us for cues as to how we should interpret a situation. That works reasonably well.  Sometimes.
  • 4. + Conformity  We are very strongly influenced by social contexts.   Also in the Solomon Asch line experiments.     C.F. Milgram Experiment and the Stanford Prison Experiment. http://www.youtube.com/watch?v=TYIh4MkcfJA Codified in things like the Matthew Effect. Feedback accumulates to things which have already accumulated feedback. Social networks are multipliers of these effects.   Because we are ‘part of the group’ Social pressures are strongest when they come from ‘people like us’
  • 5. + The Bystander Effect  A tremendously famous incident in 1964 was the murder of Kitty Genovese.   The murder itself is not what made the incident so well known.   A 28 year old woman stabbed to death outside her home in NYC. It was the newspaper coverage that followed. Investigations by reporters (some of which may have been embellished) revealed two key facts:   The attacks had happened over a 30 minute period in three separate incidents..  A period of time during which she was screaming for help. During that time several dozen people watched the murder.  None of them called them police.
  • 6. + The Bystander Effect  Whether or not the reporting of this event was accurate, the research it spawned off is well validated.    And become codified as ‘the bystander effect’ http://www.youtube.com/watch?v=OSsPfbup0ac Driven by:   Social proofing Diffusion of responsibility  ‘Someone else will do something’  ‘Nobody else seems to be concerned’  Counteracted by specific allocations of roles, actions and responsibilities.  Counteracted by ‘accountability’ for actions.
  • 7. + People Like Us  Humans are naturally designed to form groups.     The effects of these vary from person to person, but they exert a constant pressure from many directions.   The family The tribe The nationality ‘Our genes make us like people like us’  http://www.psychologicalscience.org/media/releases/2005/pr0507 27.cfm It takes a certain kind of personality to be willing to spend a lot of time ‘rocking the boat’
  • 8. + Social Pressure  At school, the pressure to conform had a name.   It never truly goes away.   You might think of it as an aggressive form of memetic propagation. Social networks, by virtue of their design, are powerful amplifiers of social effects.   Peer pressure And some of these effects work against our better judgement. They invoke a ‘whirr-click’ response, to quote Robert Cialdini.
  • 9. + Social Pressure  If you buy into the basic premise of memetic theory, the reasons why social pressures are important is obvious.  You pick up real viruses by being in close proximity to people with viruses.  You’re more likely to catch them from your friends.  The ideas and attitudes that your friends have propagate more freely than the ideas and attitudes of strangers.  Within our monkey brains, that also extends to ‘people like us’.  ‘These people who are of my tribe’
  • 10. + Reciprocity Effect  Let’s look at one such effect that is capitalized upon by the trend towards social gaming.   Have you ever been in a situation where someone has handed you a cheap trinket and then asked for money?   It’s a very common technique. One of the cognitive biases in the human mind is that ‘gifts must be repaid’   The Reciprocity Effect. We must reciprocate. This effect underpins the propagation of social norms.
  • 11. + Reciprocity Effect  Zynga are masters of this effect.   Farmville in particular is a masterpiece of psychological manipulation.   It’s not so much a game as a perfectly pitched engine for transferring the contents of your bank account from you to Zynga. You will have seen this in action, undoubtedly.   To help us bridge in this lecture the narrative from social networks to games. <Some friend> has gifted you a cow! Log on to Farmville to return the favour! You didn’t get me gift! You got me an obligation.  http://www.youtube.com/watch?v=38x6kWB-xD4
  • 12. + Reciprocity Effect  The effect is magnified within our ‘people like us’ group.   What? To do that I need to click on these stupid things and then press that thing and then come back in an hour? Fine, whatever.   Someone got me a cow, I must then log on to do whatever dumb thing I need to do to negate the imbalance. Right, I’m back. Hey, they gave me a free cow I can gift to a friend. I guess that’s nice of them. I can send that on to the friend who sent me his’ Some minutes later, from the perspective of the first friend:  ‘Wow, he sent me a cow back!’  ‘They must really like Farmville. I’ll send something else their way when I get a chance’
  • 13. + The Dark Side  The problem with all these techniques as that they are largely evolutionary traits.   Cognitive biases are the ‘cheat codes to the human mind’   If you know they exist, you can design strategies to tickle these biases. They don’t work universally.   Our cognitive biases, and there are hundreds of them, help us make sense of an incredibly complex world. At best they increase rates of compliance. But nonetheless, you’re exploiting loopholes in human thinking.  Loopholes of which many people are not aware.
  • 14. + The Dark Side  There are numerous ways in which the nature of social networking has a dark side.  An erosion of privacy   Facilitation of social pressures.   And an increase in the willingness of individuals to share information. Cyberbullying Enabling the wrong kinds of ‘people like us’ to communicate.    Terrorists Traders of child sex images Deindividuation  Hidden behind pseudonyms
  • 15. + The Dark Side  Social networks don’t create any of these problems.   However, their design does magnify the effects. There were ‘funny memes’ before Facebook.  However, it was difficult for such things to become viral.   Virality is multiplied by the power of social networks. It’s easy to separate the real life consequences when all the social cues point to propagation.  It’s easy to forget that most memes are profoundly cruel to the people involved.  If it was bad, people wouldn’t be doing it, right?
  • 16. + Bandwagon Effects  Social networks multiply the bandwagon effect.   This is another cognitive bias, reinforced by other biases.    Social proofing ‘Herd instinct’ The bandwagon effect by itself is not inherently harmful, and can be put to ‘good’ use.     The more people doing something, the more ‘okay’ it has to be. The current ‘green bandwagon’ Momentum in socially beneficial causes. The ‘Arab spring’ However, it can also create a tremendously negative environment in which people sublimate their judgements for that of the group.
  • 17. + Cyberstalking  We put more and more information online every year.   That is, ‘the collective we’ The more information we put out there, the more information it will unexpectedly reveal.  An individual foursquare announcement won’t tell me anything.  A thousand analysed over the course of a year will tell me everything.   http://techcrunch.com/2010/02/17/please-rob-me-makesfoursquare-super-useful-for-burglars/ Not everyone who views your online footprint is going to be looking to do you any favours.
  • 18. + Identify Theft  Consider the common ‘security questions’ that are asked for authentication.    Your mother’s maiden name Your first pet Where you were born  Consider the set of information that your social networks ask of you on a daily basis.  Consider what people could find out from looking at your relationships.  Consider what they could find out looking at your ‘where I lived’ entries.
  • 19. + Identify Theft  There are high profile examples of people gaining enough information through analysing the information available online    Facebook code leak One Direction album leak But, identify theft is a growing problem.   And the ease with which it can be done is increased as a result of social networking. In many cases, it is not an individual doing this.  This is a staple of organised crime nowadays,
  • 20. + The Culture of Sharing  More and more employers, police and other interested individuals are looking to social media.  The media we upload is usually full of identifying metadata.   A while ago someone posted a photograph of a desk, upon which was a line of cocaine.   Digital cameras encode a giant amount of information with their digital files. With the tagline ‘I bet you can’t guess where I am’ Seconds later, the Internet told him.  ‘The second office on the third floor of the east wing of the Whitehouse’
  • 21. + The Culture of Sharing  Some employers demand employees for their social media login details.    Mostly in America. We have stronger data protection here. However, how much of your social media data is truly private?  Facebook change their privacy settings on an almost monthly basis.  If your settings are locked down, what about friends sharing your photos?  What about you being tagged in their public photos?
  • 22. + The Culture of Sharing  In America, during a divorce settlement, a couple were told to share each other’s facebook password.  Full disclosure.  Could your account stand up to the scrutiny of someone else looking over everything you’ve ever said and done there?  Can you delete the information you put online?  Can you ever put the genie back in the bottle?  Do we share too much as a society?
  • 23. + Conclusion  Social networks have the power to do great things for us.   Our culture of online sharing creates a range of issues for us in the future.   We can’t really get away from the things we’ve done online. The context in which we make remarks is often not obvious.    But they have a dark side. You’ll say things to friends you wouldn’t say to other people. You’ll say things to colleagues in a particular area of expertise that others will misinterpret. And along the way, the human mind is working against us.  Because it’s full of cognitive biases.