SlideShare a Scribd company logo
1 of 28
Accessing, archiving and reconstructing user-
generated data: The connected spheres of
digital
Dr Mariann Hardey, Associate Director Centre of Communication Science,
Durham University
@mazrred

- Tales from the field
https://prezi.com/secure/e6572baa1fe59bba67f3f77b23d4f004d939a85c/




                                                                     PREZI
Accessing   cc http://www.slideshare.net/Cybersoc/chief-marketing-officer-congress-sopot
New forms of methodology




                           (cc) http://2.bp.blogspot.com/-erYgX7c6hq8/TZryR1uXXII/
…as the social scientist Seb Paquet*
observes, social tools make for
ridiculously easy group-forming.
              * Canadian Professor at Université du Québec à Montréal via Wikipedia




                                                                       Hardey, M. (2011)
Data monitoring
       Opportunities for data
       and research content


                                             Social media and user-generated
                                               content related to research
                                                        activities




                                                   Individual presence
                                                   up and down social
                                                          media

                    Data at risk?
                    Personalised content /
                    publicly available…
research in action?
•   Content curation
•   User-generated
•   Profile based
•   Personal
•   ‘Real’
•   and a bit sweary…
cc http://infegy.com/buzzstudy/tag/social-media/
data collation




                 cc http://www.slideshare.net/Cybersoc/chief-marketing-officer-congress-sopot
(cc) socialradar/nestle.com
the social researcher
Exposed: Research using Social Network Sites SNSs


                  Purpose - A project that does something innovative with high impact
                  status and will be seminal for future academic knowledge.
                  Design/methodological approach - We used Facebook, YouTube,
                  Twitter :-)
                  Practical implications -Data relies on utilising social network platforms
                  that contain personal information. The research depends on being able
                  to access, observe, track and archive shared material from users willing
                  to self-disclose.
                  Research limitations -Data forms part of self-reportage and can only
                  ever be a snap-shot of time, making it difficult to repeat for comparison
                  or validation.



       ‘I will use Facebook for my fieldwork and                  ‘I don’t see anything wrong with
       ask my friends to fill in a questionnaire                  using Facebook for my fieldwork.’
       there.’

                                  ‘Facebook makes research easier and fun…’
In this together
Data
                                                Tagging
                                        User-generated content
                                               Advocacy
                                             Group pages
                                             SNSs profiles
                                             Transactions
                                              Comments
                                                 Shares
                                                Embeds



Social researcher                     Outcomes                     Role and responsibility
                                                                 (Guidelines of professional bodies)




                                Training
                               Processing
                    Data organisation and modeling
                          Knowledge sharing
                           Academic culture
                         Polices and guidelines

                            Frameworks



                                                                              Adapted from Edelman business planning, 2010
Self disclosure; or more commonly
known as the, process of making
the self known to others.
                 Jourard and Lasakow, 1958: 91. Some factors in self
                 disclosure. The journal of abnormal and social psychology.
                 Jourard, 1971. The Transparent Self. Nostrand. New York.
cc http://www.tomscott.com/five/
Enacting engagement


                                                                                There is a wider shift towards
                                                                                multidirectional many-to-many
                                                                                communication. As modeled upon the
                                                                                “conversation”.

                                                                                An interchange made possible by new
                                                                                technologies, and the rhetoric suggests
                                                                                something of an inevitability in the
                                                                                “transformation” they engender. As
                                                                                museums are being increasingly
                                                                                conceptualised as “forums” and recognised
                                                                                as “contact zones”, places traditionally of
                                                                                imbalance, asymmetry, and often
                                                                                disempowerment, talk of “democracy” is
                                                                                now rife in the rhetoric.
   (cc) http://www.flickr.com/photos/polly_cotton/galleries/72157623664322738
                                                                                                                   Kidd, 2011
d  out  to  50  cents/questionnaire;  respondents  were             tweets,  some  of  your  tweets,  and  some  tweets  posted  by  other  witty 
 ven if their data was eventually discarded.                         folks. Part of the list looks like this: 
                                                                         SecretSquirrel  A  city  is  only  really  home  when  you  stop  being 
Mechanical Turk HIT consisted of 34 questions. Eight 
                                                                         mystified  by  its  public  transport  and  instead  are  just  constantly 
  questions characterized the respondent; six questions                  angry at it. 
 ntended to measure the respondent’s familiarity with 
                                                                         RedRabbit My personality results came back. They’re negative. 
  r;  three  questions  tested  the  respondent’s  reading 
 ehension (a tactic other researchers have suggested to                  NewJerseyDave  I’ll  go  to  the  co­dependency  workshop  if  you 
                                                                         come with me. 

    Rights to ownership
    that  respondents  are  reading  the  survey before  they 
  responses  [14,12]);  16  questions  were  statements  of 
  for  respondents  to  assess  on  a  7­point  Likert  scale; 
                                                                         SecretSquirrel I might like the iPad better if it were red & furry. 
                                                                         rrmutt  I  know  how  you  feel,  hon:  “I’d  stage­dive  but  I’m  far  too 
  e  final  question  probed  the  respondent’s  willingness             elderly”—Courtney Love 

                                                   Social Media Ownership: Using Twitter as a 
 ticipate  in  future  surveys  and  interviews.  Additional 
e.g. the respondent’s work time) was collected by the 
                                                                         NewJerseyDave  Maybe  the  person  in  the  car  ahead  of  you  isn’t 
                                                                         driving erratically because he’s texting; maybe he’s just knitting. 
anical Turk infrastructure.                        Window onto Current Attitudes and Beliefs 
                                                                     Dave should only be able to store his own tweets on his hard drive. 
                                                                     Dave has the right to post his list of funny tweets to his Facebook wall. 
 ix Scenarios                                                        Dave has the right to publish his list of funny tweets in a blog post. 
                                                      Catherine C. Marshall 
belief  portion  of  the  HIT  consisted  of  six  short                                                                                  Frank M. Shipman 
                                                                                                                                                      
                                                Microsoft Research, Silicon Valley 
 ios  or  situations  involving  Twitter.  In  each,  users            Figure 1. A portion of Scenario 1 exploring views about Department of Computer Science 
  save,  retweet,  or  reuse  their  favorite  tweets  in  other 
                                                            1065 La Avenida  saving, sharing, and republishing a collection.           Texas A&M University  
s. The scenarios are followed by statements of belief 
                                                 Mountain View, CA 94043  disagree)  with  the  statement  (is  there  a 
                                                                                                                     College Station, TX 77843­3112 
 spondents  to  assess.  Each  scenario  is  specific,  and        tend  to  agree  (or 
                                                   cathymar@microsoft.com  of  responses),  or  are  they  divided  into 
 es  the  actual  tweets.  By  posing  concrete  situations,       normal  distribution                                     shipman@cs.tamu.edu 
 ped to put all respondents on a more even footing (so             communities at opposition (is there a bimodal distribution)?             
 nvision  similar  situations)  and  to  draw  on  their  real                                           
           Social media by its very nature, The following definitions of the four data ownership terms 
                                  ABSTRACT 
 ences. We also hoped that specific content and details                                                   people [20,22], it presents design challenges for new digital 
                                                                   were  provided  to  participants  before  they  began  the 
           is mitigate  This Social media, by its very nature, introduces questions about 
   help  to  social. gross  inconsistencies  between 
                                  introduces                                                              services such as archiving or publishing. 
                                                                   questionnaire to help ensure consistent interpretation: 
                                  ownership. Ownership comes into play most crucially when 
 es and behavior, such as those discussed at length in               Save  –  to  store  the  content 
                                  we investigate how social media is saved or archived; how  on  your  own  storage  media. they  can  (and  cannot)  do  with 
                                                                                                          What  do  people  feel 
           specific concerns about
 vacy literature [1]; nonetheless, we are careful to note            For  example, you  might  save  a  photo  to  your created  by  others?  We  divide  potential 
                                  it is reused; and whether it can be removed or deleted. We              information  local hard 
he  data  we  collected  reflects  attitudes  and  beliefs                                                activities  into  four  basic  categories:  (1)  saving  digital 
           research practices, ownershipmedia  ownership  issues  using 
 than behavior.                   investigate  these  social         drive or burn it to a CD.  a 
                                                                                                          content;  (2)  sharing  digital  content  with  specified  (and 
                                                                     Share – to make the content available to a limited set of 
           and dissemination… Turk  survey  of  Twitter  users;  the  survey  uses  limited) groups of people; (3) publishing digital content so 
                                  Mechanical 
enario  1,  a  Twitter  user,  Dave,  collects questions  and  statements  of  belief  about 
                                  open­ended      humorous           friends or family members by using email or social media 
                                  realistic Twitter­based  scenarios  to  give  us a  window  onto  might  share  a  photo  with  and  (4)  removing  digital  content 
   posted  by  different  people,  including  himself;  in           websites.  For  example,  you  it  is  broadly  accessible; 
rio  2,  Dave  collects  tweets  that  represent  a 
                                  current  attitudes  and  beliefs. your friends on Facebook. 
                                                                       Our  findings  reveal  that        from its social media venue (and not necessarily deleting it 
rsation  he  is  having  with  two  other  Twitter  users.  In                                            from local storage, in line with reported behavior [21]). 
                                                                     Publish – to make the content available to the public by 
                                  respondents take a liberal attitude toward saving and storing 
rio  3,  Dave  encounters  an the  tweets  that  they  encounter.  More  caution  is  a  website  like  Flickr,  Blogspot,  or 
                                    offensive  tweet  about          uploading  it  to  exercised         CSCW applications have long demonstrated that users may 
  f. In Scenario 4, the respondent has received Dave’s 
                                  with  republishing  the  material, YouTube.  For with  sharing  might  publish  a  story  to 
                                                                      and  still  more  example,  you  not apply reciprocal standards to actions they feel they can 
 funny tweets via email, and we investigate what he or 
                                  the  material  among  friends  and  associates.  Respondents            take [5]. For example, they may want to see others without 
                                                                     your blog or publish a video to YouTube. 
 n do with the list subsequently. Scenario 5 covers the  type  of  lightweight  social  media 
                                  approach  removal  of  this 
                                                                     Remove – to ‘unpublish’ content; to delete content from  want  to  have  capabilities  that  are 
 on  in  which  the  respondent  most  cautiously. or  her  material’s  provenance  and  the 
                                  has  removed  his  The 
                                                                                                          being  seen,  or  they  may 
                                                                                                          not offered to their peers. In this case, we investigate what 
                                                                     a public website. For example, you might remove a photo 
 weet  from  the  Twitter  feed,  but  while  it  was  still  to  the  material  (whether  they  are 
                                  respondents’  relationship 
 , Dave has collected it, and is now posting it. Finally,            from Flickr if you don’t want everyone to see it.   they  should  be  able  to  do  with microblog 
                                                                                                          respondents  feel 
                                  the author or subject) has considerable bearing on what they            content  they  encounter,  as  well  as  probe  what  respondents 
 nario  6,  the  Library  of  Congress  acquires  the  entire 
                                  feel they can do with it.        Because  we  wanted  the  respondents  to  react  to  each 
                                                                                                          feel that others can do with the respondent’s content. 
 r  archive,  and  provides  access  to  it  under  three          scenario  without  perceiving  a  pattern  and  using  it  as  a 
                                  Author Keywords 
ent conditions.                                                    shortcut  to  fill  in  answers,  we  made  concrete  statements  in  scaling  up  our  findings  from 
                                                                                                          Finally,  we  are  interested 
                                  Twitter, social media, information rights, survey, reuse.               individuals  to  public  institutions:  what  do  people  feel  that 
   1  shows  a  portion  of  Scenario  1,  followed  by  an        about  the  situation,  and  varied  the  ownership  rights  we 
                                  ACM Classification Keywords                                             public  institutions  should  be  able  to  do  with  today’s 
                                                                   tested. Again, refer to Figure 1 for examples. 
pt of the belief statements that followed the scenario.                                                   ephemera  and  everyday  digital  belongings?  For  example, 
                                                                                                                                                                            CHI 2011, May 7-11
                                  H4.3. Information Systems: Communications Applications.  
[The] freedom [of others] is dependent on mine, and
mine on theirs… In choosing a mode of behaviour for
myself, I choose it in a way for all men; I decide that
all men ought to behave in such and such a fashion.
Hence man is totally responsible not only for his own
existence but also for that of others.

                               Wahl, J. (1959: 62). Philosophies of existence.
                               London: Routledge & Kegan Paul.
Recognising Ethical Dilemmas



 We live, work and play ‘…in a network, where
 all communicators and all communication are
 connected’.

 Propose reconceptualizing the journalist’s role
 through a combination of existentialism and
 social responsibility theory. In an open
 medium that affords complete autonomy over
 personal communication, ‘the heart of a
 socially responsible existentialist lies in a
 combination of freely choosing to be
 responsible in order to fulfill a social role based
 on trust’ (Singer, 2006: 13).
Freedom and responsibility
                  5 key themes:
                  1. Ownership and control;
                  2. Content sharing and publication
                  3. Reuse and republication;
                  4. Deletion and removal;
                  5. Individual and institutional data rights.
Research Principles in Practice:
   Watching What Happens
Hammersley and Atkinson have                   The Digital Methods Initiative
argued that “the ethnographer                  Important to identify the constraints per social
participates, overtly or covertly, in
                                               networking platform in harvesting data. The further
people’s daily lives for an extended
period of time, watching what                  step is to identify the set of relationships that
happens, listening to what is said,            sh/could be studied, e.g., do friends have the same
asking questions; in fact collecting           interests? When, and for which purposes, are
whatever data are available to throw           interests a more significant mode of organizing,
light on the issues with which he or           sorting and recommending action than
she is concerned”                              demographics?
Hammersley, M., & Atkinson, P. (1989).
Ethnography: Principles in practice. London:   https://www.digitalmethods.net/Digitalmethods/PostDemographics#Object_of_S
Tavistock.                                     tudy:_Social_Networking_Sites
Everyone has three lives: a public
life, a private life, and a secret life.
                           Gabriel García Márquez, Colombian
                           novelist, short-story writer, screenwriter
                           and journalist.
Dr Mariann Hardey
e.mariann.hardey@durham.ac.uk
       twitter @mazrred




                        (cc) http://www.yatzer.com/assets/Article/2135/images/Organic_Factory-gilles-belley-yatzer_6.jpg

More Related Content

What's hot

ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2ADTELLIGENCE GmbH
 
Social media as marketing tool
Social media as marketing toolSocial media as marketing tool
Social media as marketing toolNastiti Mayawulan
 
socialmedia-egov
socialmedia-egovsocialmedia-egov
socialmedia-egovknowhowgr
 
MEC Social Media Manual
MEC Social Media ManualMEC Social Media Manual
MEC Social Media ManualJenn Brown
 
Social Change: Social Media's role in Business
Social Change: Social Media's role in BusinessSocial Change: Social Media's role in Business
Social Change: Social Media's role in BusinessMichael Murray
 
This isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network ageThis isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network ageNancy Wright White
 
Usages des réseaux sociaux
Usages des réseaux sociauxUsages des réseaux sociaux
Usages des réseaux sociauxEloïse CAPET
 
CSE5656 Complex Networks - Dunbar's Number
CSE5656   Complex Networks - Dunbar's NumberCSE5656   Complex Networks - Dunbar's Number
CSE5656 Complex Networks - Dunbar's NumberMarcello Tomasini
 
Impact of Social Media
Impact of Social MediaImpact of Social Media
Impact of Social Mediawhite paper
 
Social Media Overview (Women Business Leaders)
Social Media Overview (Women Business Leaders)Social Media Overview (Women Business Leaders)
Social Media Overview (Women Business Leaders)Caroline Cummings
 
Conole fels
Conole felsConole fels
Conole felsgrainne
 
Uses of media and sns in a classroom
Uses of media and sns in a classroomUses of media and sns in a classroom
Uses of media and sns in a classroomAnge Baks
 
Building Online Communities
Building Online CommunitiesBuilding Online Communities
Building Online CommunitiesLisa Trager
 
The Ineptitude and Affordances of the Crowd
The Ineptitude and Affordances of the CrowdThe Ineptitude and Affordances of the Crowd
The Ineptitude and Affordances of the CrowdThe New School
 
Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGAnn DeMarle
 
Learning with facebook sandra perusch_slideshare
Learning with facebook sandra perusch_slideshareLearning with facebook sandra perusch_slideshare
Learning with facebook sandra perusch_slideshareSandra Sabitzer
 
Social media? Get serious! Understanding the functional building blocks of so...
Social media? Get serious! Understanding the functional building blocks of so...Social media? Get serious! Understanding the functional building blocks of so...
Social media? Get serious! Understanding the functional building blocks of so...Ian McCarthy
 

What's hot (20)

ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2
 
Social media as marketing tool
Social media as marketing toolSocial media as marketing tool
Social media as marketing tool
 
The Self Online
The Self OnlineThe Self Online
The Self Online
 
socialmedia-egov
socialmedia-egovsocialmedia-egov
socialmedia-egov
 
MEC Social Media Manual
MEC Social Media ManualMEC Social Media Manual
MEC Social Media Manual
 
Social Change: Social Media's role in Business
Social Change: Social Media's role in BusinessSocial Change: Social Media's role in Business
Social Change: Social Media's role in Business
 
This isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network ageThis isn't what I thought it was: community in the network age
This isn't what I thought it was: community in the network age
 
Usages des réseaux sociaux
Usages des réseaux sociauxUsages des réseaux sociaux
Usages des réseaux sociaux
 
CSE5656 Complex Networks - Dunbar's Number
CSE5656   Complex Networks - Dunbar's NumberCSE5656   Complex Networks - Dunbar's Number
CSE5656 Complex Networks - Dunbar's Number
 
Impact of Social Media
Impact of Social MediaImpact of Social Media
Impact of Social Media
 
CCSMW
CCSMWCCSMW
CCSMW
 
Clc cell
Clc cellClc cell
Clc cell
 
Social Media Overview (Women Business Leaders)
Social Media Overview (Women Business Leaders)Social Media Overview (Women Business Leaders)
Social Media Overview (Women Business Leaders)
 
Conole fels
Conole felsConole fels
Conole fels
 
Uses of media and sns in a classroom
Uses of media and sns in a classroomUses of media and sns in a classroom
Uses of media and sns in a classroom
 
Building Online Communities
Building Online CommunitiesBuilding Online Communities
Building Online Communities
 
The Ineptitude and Affordances of the Crowd
The Ineptitude and Affordances of the CrowdThe Ineptitude and Affordances of the Crowd
The Ineptitude and Affordances of the Crowd
 
Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKING
 
Learning with facebook sandra perusch_slideshare
Learning with facebook sandra perusch_slideshareLearning with facebook sandra perusch_slideshare
Learning with facebook sandra perusch_slideshare
 
Social media? Get serious! Understanding the functional building blocks of so...
Social media? Get serious! Understanding the functional building blocks of so...Social media? Get serious! Understanding the functional building blocks of so...
Social media? Get serious! Understanding the functional building blocks of so...
 

Viewers also liked

The Social Context of Online Research
The Social Context of Online ResearchThe Social Context of Online Research
The Social Context of Online ResearchDr Mariann Hardey
 
IMPL070928
IMPL070928IMPL070928
IMPL070928threecs
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Dr Mariann Hardey
 
Ignite! Facebook the Fear of Losing Attention - A social network noir
Ignite! Facebook the Fear of Losing Attention - A social network noirIgnite! Facebook the Fear of Losing Attention - A social network noir
Ignite! Facebook the Fear of Losing Attention - A social network noirDr Mariann Hardey
 
Program welcome ppt tsuru 2014
Program welcome ppt tsuru 2014Program welcome ppt tsuru 2014
Program welcome ppt tsuru 2014stncprog
 
Education beyond Facebook
Education beyond FacebookEducation beyond Facebook
Education beyond FacebookMandy Rohs
 
Digital Literacy in Teacher Education in Germany - Current Issues and Concepts
Digital Literacy in Teacher Education in Germany - Current Issues and ConceptsDigital Literacy in Teacher Education in Germany - Current Issues and Concepts
Digital Literacy in Teacher Education in Germany - Current Issues and ConceptsMandy Rohs
 
The educational system in germany and england
The educational system in germany and englandThe educational system in germany and england
The educational system in germany and englandEllaine Orqueza
 
Education in Germany
Education in GermanyEducation in Germany
Education in Germanymrshansen
 
Implementing Highly Effective Teacher Policy and Practice - 2015 Internation...
Implementing Highly Effective Teacher Policy and Practice -  2015 Internation...Implementing Highly Effective Teacher Policy and Practice -  2015 Internation...
Implementing Highly Effective Teacher Policy and Practice - 2015 Internation...EduSkills OECD
 

Viewers also liked (13)

The Social Context of Online Research
The Social Context of Online ResearchThe Social Context of Online Research
The Social Context of Online Research
 
IMPL070928
IMPL070928IMPL070928
IMPL070928
 
Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12Introductory Lecture Information Systems 2011.12
Introductory Lecture Information Systems 2011.12
 
Ignite! Facebook the Fear of Losing Attention - A social network noir
Ignite! Facebook the Fear of Losing Attention - A social network noirIgnite! Facebook the Fear of Losing Attention - A social network noir
Ignite! Facebook the Fear of Losing Attention - A social network noir
 
Program welcome ppt tsuru 2014
Program welcome ppt tsuru 2014Program welcome ppt tsuru 2014
Program welcome ppt tsuru 2014
 
Education beyond Facebook
Education beyond FacebookEducation beyond Facebook
Education beyond Facebook
 
talking about escape
talking about escapetalking about escape
talking about escape
 
Marketing
MarketingMarketing
Marketing
 
Digital Literacy in Teacher Education in Germany - Current Issues and Concepts
Digital Literacy in Teacher Education in Germany - Current Issues and ConceptsDigital Literacy in Teacher Education in Germany - Current Issues and Concepts
Digital Literacy in Teacher Education in Germany - Current Issues and Concepts
 
Study in Germany
Study in GermanyStudy in Germany
Study in Germany
 
The educational system in germany and england
The educational system in germany and englandThe educational system in germany and england
The educational system in germany and england
 
Education in Germany
Education in GermanyEducation in Germany
Education in Germany
 
Implementing Highly Effective Teacher Policy and Practice - 2015 Internation...
Implementing Highly Effective Teacher Policy and Practice -  2015 Internation...Implementing Highly Effective Teacher Policy and Practice -  2015 Internation...
Implementing Highly Effective Teacher Policy and Practice - 2015 Internation...
 

Similar to Accessing user data from social media

Co-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.de
Co-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.deCo-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.de
Co-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.deNicolas Loose
 
Enacting Digital Identities
Enacting Digital IdentitiesEnacting Digital Identities
Enacting Digital IdentitiesCatherine Cronin
 
Through a black mirror, palely
Through a black mirror, palelyThrough a black mirror, palely
Through a black mirror, palelyDr Wayne Barry
 
Academic visibility online presentation 13 october 2011
Academic visibility online presentation 13 october 2011Academic visibility online presentation 13 october 2011
Academic visibility online presentation 13 october 2011Laura Czerniewicz
 
Research Design for the Study of Social Media Use by Dutch Development Organi...
Research Design for the Study of Social Media Use by Dutch Development Organi...Research Design for the Study of Social Media Use by Dutch Development Organi...
Research Design for the Study of Social Media Use by Dutch Development Organi...Anand Sheombar
 
Using social media for research & researcher development
Using social media for research & researcher developmentUsing social media for research & researcher development
Using social media for research & researcher developmentDr Sarah-Louise Quinnell
 
The social capital of online influencers: evidence from the food industries
The social capital of online influencers: evidence from the food industriesThe social capital of online influencers: evidence from the food industries
The social capital of online influencers: evidence from the food industriesIvana Pais
 
Presentationparis 120510035212 Phpapp01
Presentationparis 120510035212 Phpapp01Presentationparis 120510035212 Phpapp01
Presentationparis 120510035212 Phpapp01Cecilia Manzo
 
Social Technologies: challenges and opportunities for participation
Social Technologies: challenges and opportunities for participationSocial Technologies: challenges and opportunities for participation
Social Technologies: challenges and opportunities for participationPenny Hagen
 
Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0Acando Consulting
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
Open & Networked Learning for #ECI831
Open & Networked Learning for #ECI831Open & Networked Learning for #ECI831
Open & Networked Learning for #ECI831Alec Couros
 
How Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform EducationHow Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform EducationAlec Couros
 
Research Design: Twitter and professional learning
Research Design: Twitter and professional learningResearch Design: Twitter and professional learning
Research Design: Twitter and professional learningPeter Evans
 
SxD_Principles-AdrianChan-2012
SxD_Principles-AdrianChan-2012SxD_Principles-AdrianChan-2012
SxD_Principles-AdrianChan-2012Adrian Chan
 
Social Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSocial Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSimon Buckingham Shum
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessMarco Brambilla
 

Similar to Accessing user data from social media (20)

Co-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.de
Co-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.deCo-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.de
Co-Creation with Lead Users on the Digital Research Platform www.dieNEONauten.de
 
Enacting Digital Identities
Enacting Digital IdentitiesEnacting Digital Identities
Enacting Digital Identities
 
sm@jgc Session Three
sm@jgc Session Threesm@jgc Session Three
sm@jgc Session Three
 
Through a black mirror, palely
Through a black mirror, palelyThrough a black mirror, palely
Through a black mirror, palely
 
Academic visibility online presentation 13 october 2011
Academic visibility online presentation 13 october 2011Academic visibility online presentation 13 october 2011
Academic visibility online presentation 13 october 2011
 
Research Design for the Study of Social Media Use by Dutch Development Organi...
Research Design for the Study of Social Media Use by Dutch Development Organi...Research Design for the Study of Social Media Use by Dutch Development Organi...
Research Design for the Study of Social Media Use by Dutch Development Organi...
 
Using social media for research & researcher development
Using social media for research & researcher developmentUsing social media for research & researcher development
Using social media for research & researcher development
 
The social capital of online influencers: evidence from the food industries
The social capital of online influencers: evidence from the food industriesThe social capital of online influencers: evidence from the food industries
The social capital of online influencers: evidence from the food industries
 
Presentationparis 120510035212 Phpapp01
Presentationparis 120510035212 Phpapp01Presentationparis 120510035212 Phpapp01
Presentationparis 120510035212 Phpapp01
 
Social Technologies: challenges and opportunities for participation
Social Technologies: challenges and opportunities for participationSocial Technologies: challenges and opportunities for participation
Social Technologies: challenges and opportunities for participation
 
Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
The Birth of Social Media Methods
The Birth of Social Media MethodsThe Birth of Social Media Methods
The Birth of Social Media Methods
 
Facilitating Lea
Facilitating LeaFacilitating Lea
Facilitating Lea
 
Open & Networked Learning for #ECI831
Open & Networked Learning for #ECI831Open & Networked Learning for #ECI831
Open & Networked Learning for #ECI831
 
How Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform EducationHow Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform Education
 
Research Design: Twitter and professional learning
Research Design: Twitter and professional learningResearch Design: Twitter and professional learning
Research Design: Twitter and professional learning
 
SxD_Principles-AdrianChan-2012
SxD_Principles-AdrianChan-2012SxD_Principles-AdrianChan-2012
SxD_Principles-AdrianChan-2012
 
Social Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSocial Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked Problems
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital business
 

More from Dr Mariann Hardey

Innovative Media for a Digital Ecnonmy (imde) 2009
Innovative Media for a Digital Ecnonmy (imde) 2009Innovative Media for a Digital Ecnonmy (imde) 2009
Innovative Media for a Digital Ecnonmy (imde) 2009Dr Mariann Hardey
 
Productive Consumers Paper Commentary
Productive Consumers Paper CommentaryProductive Consumers Paper Commentary
Productive Consumers Paper CommentaryDr Mariann Hardey
 
The Role of the Productive Consumer for Global Digital Enterprise
The Role of the Productive Consumer for Global Digital EnterpriseThe Role of the Productive Consumer for Global Digital Enterprise
The Role of the Productive Consumer for Global Digital EnterpriseDr Mariann Hardey
 
Innovative health technologies: Point & Click for Nip n Tuck
Innovative health technologies: Point & Click for Nip n TuckInnovative health technologies: Point & Click for Nip n Tuck
Innovative health technologies: Point & Click for Nip n TuckDr Mariann Hardey
 
eHealthcare: The Self-Serve world of Health 2.0
eHealthcare: The Self-Serve world of Health 2.0eHealthcare: The Self-Serve world of Health 2.0
eHealthcare: The Self-Serve world of Health 2.0Dr Mariann Hardey
 
Make Some Green: Following Environment2.0
Make Some Green: Following Environment2.0Make Some Green: Following Environment2.0
Make Some Green: Following Environment2.0Dr Mariann Hardey
 
From Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping Exercise
From Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping ExerciseFrom Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping Exercise
From Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping ExerciseDr Mariann Hardey
 
TEDxman etiquette & social media 2.0
TEDxman etiquette & social media 2.0TEDxman etiquette & social media 2.0
TEDxman etiquette & social media 2.0Dr Mariann Hardey
 
Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…

Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…
Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…

Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…
Dr Mariann Hardey
 
Seriously Social Surveillance: A Cafe Dana Talk at the Science Museum
Seriously Social Surveillance: A Cafe Dana Talk at the Science MuseumSeriously Social Surveillance: A Cafe Dana Talk at the Science Museum
Seriously Social Surveillance: A Cafe Dana Talk at the Science MuseumDr Mariann Hardey
 
ICTs and Generations: Living Constantly Connected Social Lives…
ICTs and Generations: Living Constantly Connected Social Lives…ICTs and Generations: Living Constantly Connected Social Lives…
ICTs and Generations: Living Constantly Connected Social Lives…Dr Mariann Hardey
 
From Watermelon to Peach - the workplace for a digital age
From Watermelon to Peach - the workplace for a digital ageFrom Watermelon to Peach - the workplace for a digital age
From Watermelon to Peach - the workplace for a digital ageDr Mariann Hardey
 
eDating: the formation of rules of courtship for the network society
eDating: the formation of rules of courtship for the network societyeDating: the formation of rules of courtship for the network society
eDating: the formation of rules of courtship for the network societyDr Mariann Hardey
 
The value of social media for business
The value of social media for businessThe value of social media for business
The value of social media for businessDr Mariann Hardey
 
A 'digital generation': sustaining connections in the Information Age
A 'digital generation': sustaining connections in the Information AgeA 'digital generation': sustaining connections in the Information Age
A 'digital generation': sustaining connections in the Information AgeDr Mariann Hardey
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Dr Mariann Hardey
 
Seriously Social | digital social networks in a nutshell
Seriously Social | digital social networks in a nutshell Seriously Social | digital social networks in a nutshell
Seriously Social | digital social networks in a nutshell Dr Mariann Hardey
 
The Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social livesThe Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social livesDr Mariann Hardey
 

More from Dr Mariann Hardey (18)

Innovative Media for a Digital Ecnonmy (imde) 2009
Innovative Media for a Digital Ecnonmy (imde) 2009Innovative Media for a Digital Ecnonmy (imde) 2009
Innovative Media for a Digital Ecnonmy (imde) 2009
 
Productive Consumers Paper Commentary
Productive Consumers Paper CommentaryProductive Consumers Paper Commentary
Productive Consumers Paper Commentary
 
The Role of the Productive Consumer for Global Digital Enterprise
The Role of the Productive Consumer for Global Digital EnterpriseThe Role of the Productive Consumer for Global Digital Enterprise
The Role of the Productive Consumer for Global Digital Enterprise
 
Innovative health technologies: Point & Click for Nip n Tuck
Innovative health technologies: Point & Click for Nip n TuckInnovative health technologies: Point & Click for Nip n Tuck
Innovative health technologies: Point & Click for Nip n Tuck
 
eHealthcare: The Self-Serve world of Health 2.0
eHealthcare: The Self-Serve world of Health 2.0eHealthcare: The Self-Serve world of Health 2.0
eHealthcare: The Self-Serve world of Health 2.0
 
Make Some Green: Following Environment2.0
Make Some Green: Following Environment2.0Make Some Green: Following Environment2.0
Make Some Green: Following Environment2.0
 
From Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping Exercise
From Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping ExerciseFrom Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping Exercise
From Social Media: Ecosystems, Wellbeing & Sensor Networks. A Scoping Exercise
 
TEDxman etiquette & social media 2.0
TEDxman etiquette & social media 2.0TEDxman etiquette & social media 2.0
TEDxman etiquette & social media 2.0
 
Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…

Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…
Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…

Existing 
social
 processes,
design 
&

 the
 coordination 
of
 media…

 
Seriously Social Surveillance: A Cafe Dana Talk at the Science Museum
Seriously Social Surveillance: A Cafe Dana Talk at the Science MuseumSeriously Social Surveillance: A Cafe Dana Talk at the Science Museum
Seriously Social Surveillance: A Cafe Dana Talk at the Science Museum
 
ICTs and Generations: Living Constantly Connected Social Lives…
ICTs and Generations: Living Constantly Connected Social Lives…ICTs and Generations: Living Constantly Connected Social Lives…
ICTs and Generations: Living Constantly Connected Social Lives…
 
From Watermelon to Peach - the workplace for a digital age
From Watermelon to Peach - the workplace for a digital ageFrom Watermelon to Peach - the workplace for a digital age
From Watermelon to Peach - the workplace for a digital age
 
eDating: the formation of rules of courtship for the network society
eDating: the formation of rules of courtship for the network societyeDating: the formation of rules of courtship for the network society
eDating: the formation of rules of courtship for the network society
 
The value of social media for business
The value of social media for businessThe value of social media for business
The value of social media for business
 
A 'digital generation': sustaining connections in the Information Age
A 'digital generation': sustaining connections in the Information AgeA 'digital generation': sustaining connections in the Information Age
A 'digital generation': sustaining connections in the Information Age
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
 
Seriously Social | digital social networks in a nutshell
Seriously Social | digital social networks in a nutshell Seriously Social | digital social networks in a nutshell
Seriously Social | digital social networks in a nutshell
 
The Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social livesThe Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social lives
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Accessing user data from social media

  • 1. Accessing, archiving and reconstructing user- generated data: The connected spheres of digital Dr Mariann Hardey, Associate Director Centre of Communication Science, Durham University @mazrred - Tales from the field
  • 3. Accessing cc http://www.slideshare.net/Cybersoc/chief-marketing-officer-congress-sopot
  • 4.
  • 5. New forms of methodology (cc) http://2.bp.blogspot.com/-erYgX7c6hq8/TZryR1uXXII/
  • 6. …as the social scientist Seb Paquet* observes, social tools make for ridiculously easy group-forming. * Canadian Professor at Université du Québec à Montréal via Wikipedia Hardey, M. (2011)
  • 7. Data monitoring Opportunities for data and research content Social media and user-generated content related to research activities Individual presence up and down social media Data at risk? Personalised content / publicly available…
  • 9. Content curation • User-generated • Profile based • Personal • ‘Real’ • and a bit sweary…
  • 11. data collation cc http://www.slideshare.net/Cybersoc/chief-marketing-officer-congress-sopot
  • 14. Exposed: Research using Social Network Sites SNSs Purpose - A project that does something innovative with high impact status and will be seminal for future academic knowledge. Design/methodological approach - We used Facebook, YouTube, Twitter :-) Practical implications -Data relies on utilising social network platforms that contain personal information. The research depends on being able to access, observe, track and archive shared material from users willing to self-disclose. Research limitations -Data forms part of self-reportage and can only ever be a snap-shot of time, making it difficult to repeat for comparison or validation. ‘I will use Facebook for my fieldwork and ‘I don’t see anything wrong with ask my friends to fill in a questionnaire using Facebook for my fieldwork.’ there.’ ‘Facebook makes research easier and fun…’
  • 15.
  • 17. Data Tagging User-generated content Advocacy Group pages SNSs profiles Transactions Comments Shares Embeds Social researcher Outcomes Role and responsibility (Guidelines of professional bodies) Training Processing Data organisation and modeling Knowledge sharing Academic culture Polices and guidelines Frameworks Adapted from Edelman business planning, 2010
  • 18. Self disclosure; or more commonly known as the, process of making the self known to others. Jourard and Lasakow, 1958: 91. Some factors in self disclosure. The journal of abnormal and social psychology. Jourard, 1971. The Transparent Self. Nostrand. New York.
  • 20. Enacting engagement There is a wider shift towards multidirectional many-to-many communication. As modeled upon the “conversation”. An interchange made possible by new technologies, and the rhetoric suggests something of an inevitability in the “transformation” they engender. As museums are being increasingly conceptualised as “forums” and recognised as “contact zones”, places traditionally of imbalance, asymmetry, and often disempowerment, talk of “democracy” is now rife in the rhetoric. (cc) http://www.flickr.com/photos/polly_cotton/galleries/72157623664322738 Kidd, 2011
  • 21. d  out  to  50  cents/questionnaire;  respondents  were  tweets,  some  of  your  tweets,  and  some  tweets  posted  by  other  witty  ven if their data was eventually discarded.  folks. Part of the list looks like this:  SecretSquirrel  A  city  is  only  really  home  when  you  stop  being  Mechanical Turk HIT consisted of 34 questions. Eight  mystified  by  its  public  transport  and  instead  are  just  constantly  questions characterized the respondent; six questions  angry at it.  ntended to measure the respondent’s familiarity with  RedRabbit My personality results came back. They’re negative.  r;  three  questions  tested  the  respondent’s  reading  ehension (a tactic other researchers have suggested to  NewJerseyDave  I’ll  go  to  the  co­dependency  workshop  if  you  come with me.  Rights to ownership   that  respondents  are  reading  the  survey before  they  responses  [14,12]);  16  questions  were  statements  of  for  respondents  to  assess  on  a  7­point  Likert  scale;  SecretSquirrel I might like the iPad better if it were red & furry.  rrmutt  I  know  how  you  feel,  hon:  “I’d  stage­dive  but  I’m  far  too  e  final  question  probed  the  respondent’s  willingness  elderly”—Courtney Love  Social Media Ownership: Using Twitter as a  ticipate  in  future  surveys  and  interviews.  Additional  e.g. the respondent’s work time) was collected by the  NewJerseyDave  Maybe  the  person  in  the  car  ahead  of  you  isn’t  driving erratically because he’s texting; maybe he’s just knitting.  anical Turk infrastructure.  Window onto Current Attitudes and Beliefs  Dave should only be able to store his own tweets on his hard drive.  Dave has the right to post his list of funny tweets to his Facebook wall.  ix Scenarios  Dave has the right to publish his list of funny tweets in a blog post.  Catherine C. Marshall  belief  portion  of  the  HIT  consisted  of  six  short  Frank M. Shipman    Microsoft Research, Silicon Valley  ios  or  situations  involving  Twitter.  In  each,  users  Figure 1. A portion of Scenario 1 exploring views about Department of Computer Science  save,  retweet,  or  reuse  their  favorite  tweets  in  other  1065 La Avenida  saving, sharing, and republishing a collection.  Texas A&M University   s. The scenarios are followed by statements of belief  Mountain View, CA 94043  disagree)  with  the  statement  (is  there  a  College Station, TX 77843­3112  spondents  to  assess.  Each  scenario  is  specific,  and  tend  to  agree  (or  cathymar@microsoft.com  of  responses),  or  are  they  divided  into  es  the  actual  tweets.  By  posing  concrete  situations,  normal  distribution  shipman@cs.tamu.edu  ped to put all respondents on a more even footing (so  communities at opposition (is there a bimodal distribution)?    nvision  similar  situations)  and  to  draw  on  their  real    Social media by its very nature, The following definitions of the four data ownership terms  ABSTRACT  ences. We also hoped that specific content and details  people [20,22], it presents design challenges for new digital  were  provided  to  participants  before  they  began  the  is mitigate  This Social media, by its very nature, introduces questions about    help  to  social. gross  inconsistencies  between  introduces services such as archiving or publishing.  questionnaire to help ensure consistent interpretation:  ownership. Ownership comes into play most crucially when  es and behavior, such as those discussed at length in  Save  –  to  store  the  content  we investigate how social media is saved or archived; how  on  your  own  storage  media. they  can  (and  cannot)  do  with  What  do  people  feel  specific concerns about vacy literature [1]; nonetheless, we are careful to note  For  example, you  might  save  a  photo  to  your created  by  others?  We  divide  potential  it is reused; and whether it can be removed or deleted. We  information  local hard  he  data  we  collected  reflects  attitudes  and  beliefs  activities  into  four  basic  categories:  (1)  saving  digital  research practices, ownershipmedia  ownership  issues  using  than behavior.  investigate  these  social  drive or burn it to a CD.  a  content;  (2)  sharing  digital  content  with  specified  (and  Share – to make the content available to a limited set of  and dissemination… Turk  survey  of  Twitter  users;  the  survey  uses  limited) groups of people; (3) publishing digital content so  Mechanical  enario  1,  a  Twitter  user,  Dave,  collects questions  and  statements  of  belief  about  open­ended  humorous  friends or family members by using email or social media  realistic Twitter­based  scenarios  to  give  us a  window  onto  might  share  a  photo  with  and  (4)  removing  digital  content    posted  by  different  people,  including  himself;  in  websites.  For  example,  you  it  is  broadly  accessible;  rio  2,  Dave  collects  tweets  that  represent  a  current  attitudes  and  beliefs. your friends on Facebook.  Our  findings  reveal  that  from its social media venue (and not necessarily deleting it  rsation  he  is  having  with  two  other  Twitter  users.  In  from local storage, in line with reported behavior [21]).  Publish – to make the content available to the public by  respondents take a liberal attitude toward saving and storing  rio  3,  Dave  encounters  an the  tweets  that  they  encounter.  More  caution  is  a  website  like  Flickr,  Blogspot,  or  offensive  tweet  about  uploading  it  to  exercised  CSCW applications have long demonstrated that users may  f. In Scenario 4, the respondent has received Dave’s  with  republishing  the  material, YouTube.  For with  sharing  might  publish  a  story  to  and  still  more  example,  you  not apply reciprocal standards to actions they feel they can  funny tweets via email, and we investigate what he or  the  material  among  friends  and  associates.  Respondents  take [5]. For example, they may want to see others without  your blog or publish a video to YouTube.  n do with the list subsequently. Scenario 5 covers the  type  of  lightweight  social  media  approach  removal  of  this  Remove – to ‘unpublish’ content; to delete content from  want  to  have  capabilities  that  are  on  in  which  the  respondent  most  cautiously. or  her  material’s  provenance  and  the  has  removed  his  The  being  seen,  or  they  may  not offered to their peers. In this case, we investigate what  a public website. For example, you might remove a photo  weet  from  the  Twitter  feed,  but  while  it  was  still  to  the  material  (whether  they  are  respondents’  relationship  , Dave has collected it, and is now posting it. Finally,  from Flickr if you don’t want everyone to see it.   they  should  be  able  to  do  with microblog  respondents  feel  the author or subject) has considerable bearing on what they  content  they  encounter,  as  well  as  probe  what  respondents  nario  6,  the  Library  of  Congress  acquires  the  entire  feel they can do with it.    Because  we  wanted  the  respondents  to  react  to  each  feel that others can do with the respondent’s content.  r  archive,  and  provides  access  to  it  under  three  scenario  without  perceiving  a  pattern  and  using  it  as  a  Author Keywords  ent conditions.  shortcut  to  fill  in  answers,  we  made  concrete  statements  in  scaling  up  our  findings  from  Finally,  we  are  interested  Twitter, social media, information rights, survey, reuse.  individuals  to  public  institutions:  what  do  people  feel  that    1  shows  a  portion  of  Scenario  1,  followed  by  an  about  the  situation,  and  varied  the  ownership  rights  we  ACM Classification Keywords  public  institutions  should  be  able  to  do  with  today’s  tested. Again, refer to Figure 1 for examples.  pt of the belief statements that followed the scenario.   ephemera  and  everyday  digital  belongings?  For  example,  CHI 2011, May 7-11 H4.3. Information Systems: Communications Applications.  
  • 22. [The] freedom [of others] is dependent on mine, and mine on theirs… In choosing a mode of behaviour for myself, I choose it in a way for all men; I decide that all men ought to behave in such and such a fashion. Hence man is totally responsible not only for his own existence but also for that of others. Wahl, J. (1959: 62). Philosophies of existence. London: Routledge & Kegan Paul.
  • 23. Recognising Ethical Dilemmas We live, work and play ‘…in a network, where all communicators and all communication are connected’. Propose reconceptualizing the journalist’s role through a combination of existentialism and social responsibility theory. In an open medium that affords complete autonomy over personal communication, ‘the heart of a socially responsible existentialist lies in a combination of freely choosing to be responsible in order to fulfill a social role based on trust’ (Singer, 2006: 13).
  • 24. Freedom and responsibility 5 key themes: 1. Ownership and control; 2. Content sharing and publication 3. Reuse and republication; 4. Deletion and removal; 5. Individual and institutional data rights.
  • 25. Research Principles in Practice: Watching What Happens Hammersley and Atkinson have The Digital Methods Initiative argued that “the ethnographer Important to identify the constraints per social participates, overtly or covertly, in networking platform in harvesting data. The further people’s daily lives for an extended period of time, watching what step is to identify the set of relationships that happens, listening to what is said, sh/could be studied, e.g., do friends have the same asking questions; in fact collecting interests? When, and for which purposes, are whatever data are available to throw interests a more significant mode of organizing, light on the issues with which he or sorting and recommending action than she is concerned” demographics? Hammersley, M., & Atkinson, P. (1989). Ethnography: Principles in practice. London: https://www.digitalmethods.net/Digitalmethods/PostDemographics#Object_of_S Tavistock. tudy:_Social_Networking_Sites
  • 26. Everyone has three lives: a public life, a private life, and a secret life. Gabriel García Márquez, Colombian novelist, short-story writer, screenwriter and journalist.
  • 27.
  • 28. Dr Mariann Hardey e.mariann.hardey@durham.ac.uk twitter @mazrred (cc) http://www.yatzer.com/assets/Article/2135/images/Organic_Factory-gilles-belley-yatzer_6.jpg