SlideShare a Scribd company logo
1 of 23
+

The Dark Side of Social
Networks
Current Issues in Web Technology
Michael Heron
+

Introduction


We’ve spoken quite a lot about some of the power of social
networks.


We need to traverse some dark parts of the human psyche to really
appreciate many of the benefits.



In this lecture we’re going to talk about those dark parts, and
how social networks work as much through fear and conformity
as through memes and virality.



Many of the techniques used to create the stickiest and most
viral messages are fundamentally exploitative.


We’ll talk more about this in the Captology lectures.
+

Conformity


Have you ever heard of the phrase ‘social proofing’?




Social proofing is the cognitive bias that comes into play when
we are in social circumstances and don’t know how to behave.




Probably not, but every one of us is affected by it every day.

We look to the people around us for cues as to how we should
interpret a situation.

That works reasonably well.


Sometimes.
+

Conformity


We are very strongly influenced by social contexts.




Also in the Solomon Asch line experiments.







C.F. Milgram Experiment and the Stanford Prison Experiment.

http://www.youtube.com/watch?v=TYIh4MkcfJA
Codified in things like the Matthew Effect.
Feedback accumulates to things which have already accumulated
feedback.

Social networks are multipliers of these effects.



Because we are ‘part of the group’
Social pressures are strongest when they come from ‘people like us’
+

The Bystander Effect


A tremendously famous incident in 1964 was the murder of Kitty
Genovese.




The murder itself is not what made the incident so well known.




A 28 year old woman stabbed to death outside her home in NYC.

It was the newspaper coverage that followed.

Investigations by reporters (some of which may have been
embellished) revealed two key facts:




The attacks had happened over a 30 minute period in three separate
incidents..
 A period of time during which she was screaming for help.
During that time several dozen people watched the murder.
 None of them called them police.
+

The Bystander Effect


Whether or not the reporting of this event was accurate, the research it
spawned off is well validated.





And become codified as ‘the bystander effect’
http://www.youtube.com/watch?v=OSsPfbup0ac

Driven by:



Social proofing
Diffusion of responsibility



‘Someone else will do something’



‘Nobody else seems to be concerned’



Counteracted by specific allocations of roles, actions and responsibilities.



Counteracted by ‘accountability’ for actions.
+

People Like Us


Humans are naturally designed to form groups.






The effects of these vary from person to person, but they exert
a constant pressure from many directions.




The family
The tribe
The nationality

‘Our genes make us like people like us’
 http://www.psychologicalscience.org/media/releases/2005/pr0507
27.cfm

It takes a certain kind of personality to be willing to spend a lot
of time ‘rocking the boat’
+

Social Pressure


At school, the pressure to conform had a name.




It never truly goes away.




You might think of it as an aggressive form of memetic propagation.

Social networks, by virtue of their design, are powerful
amplifiers of social effects.




Peer pressure

And some of these effects work against our better judgement.

They invoke a ‘whirr-click’ response, to quote Robert Cialdini.
+

Social Pressure


If you buy into the basic premise of memetic theory, the
reasons why social pressures are important is obvious.


You pick up real viruses by being in close proximity to people with
viruses.



You’re more likely to catch them from your friends.



The ideas and attitudes that your friends have propagate more
freely than the ideas and attitudes of strangers.



Within our monkey brains, that also extends to ‘people like us’.


‘These people who are of my tribe’
+

Reciprocity Effect


Let’s look at one such effect that is capitalized upon by the
trend towards social gaming.




Have you ever been in a situation where someone has handed
you a cheap trinket and then asked for money?




It’s a very common technique.

One of the cognitive biases in the human mind is that ‘gifts
must be repaid’




The Reciprocity Effect.

We must reciprocate.

This effect underpins the propagation of social norms.
+

Reciprocity Effect


Zynga are masters of this effect.




Farmville in particular is a masterpiece of psychological
manipulation.




It’s not so much a game as a perfectly pitched engine for transferring
the contents of your bank account from you to Zynga.

You will have seen this in action, undoubtedly.




To help us bridge in this lecture the narrative from social networks to
games.

<Some friend> has gifted you a cow! Log on to Farmville to return the
favour!

You didn’t get me gift! You got me an obligation.


http://www.youtube.com/watch?v=38x6kWB-xD4
+

Reciprocity Effect


The effect is magnified within our ‘people like us’ group.




What? To do that I need to click on these stupid things and then
press that thing and then come back in an hour? Fine, whatever.





Someone got me a cow, I must then log on to do whatever dumb
thing I need to do to negate the imbalance.

Right, I’m back. Hey, they gave me a free cow I can gift to a friend.
I guess that’s nice of them. I can send that on to the friend who sent
me his’

Some minutes later, from the perspective of the first friend:


‘Wow, he sent me a cow back!’



‘They must really like Farmville. I’ll send something else their way
when I get a chance’
+

The Dark Side


The problem with all these techniques as that they are largely
evolutionary traits.




Cognitive biases are the ‘cheat codes to the human mind’




If you know they exist, you can design strategies to tickle these biases.

They don’t work universally.




Our cognitive biases, and there are hundreds of them, help us make
sense of an incredibly complex world.

At best they increase rates of compliance.

But nonetheless, you’re exploiting loopholes in human thinking.


Loopholes of which many people are not aware.
+

The Dark Side


There are numerous ways in which the nature of social
networking has a dark side.


An erosion of privacy




Facilitation of social pressures.




And an increase in the willingness of individuals to share
information.
Cyberbullying

Enabling the wrong kinds of ‘people like us’ to communicate.





Terrorists
Traders of child sex images

Deindividuation


Hidden behind pseudonyms
+

The Dark Side


Social networks don’t create any of these problems.




However, their design does magnify the effects.

There were ‘funny memes’ before Facebook.


However, it was difficult for such things to become viral.




Virality is multiplied by the power of social networks.

It’s easy to separate the real life consequences when all the social
cues point to propagation.


It’s easy to forget that most memes are profoundly cruel to the
people involved.



If it was bad, people wouldn’t be doing it, right?
+

Bandwagon Effects


Social networks multiply the bandwagon effect.




This is another cognitive bias, reinforced by other biases.





Social proofing
‘Herd instinct’

The bandwagon effect by itself is not inherently harmful, and can be put to
‘good’ use.






The more people doing something, the more ‘okay’ it has to be.

The current ‘green bandwagon’
Momentum in socially beneficial causes.
The ‘Arab spring’

However, it can also create a tremendously negative environment in which
people sublimate their judgements for that of the group.
+

Cyberstalking


We put more and more information online every year.




That is, ‘the collective we’

The more information we put out there, the more information it
will unexpectedly reveal.


An individual foursquare announcement won’t tell me anything.



A thousand analysed over the course of a year will tell me
everything.




http://techcrunch.com/2010/02/17/please-rob-me-makesfoursquare-super-useful-for-burglars/

Not everyone who views your online footprint is going to be
looking to do you any favours.
+

Identify Theft


Consider the common ‘security questions’ that are asked for
authentication.




Your mother’s maiden name
Your first pet
Where you were born



Consider the set of information that your social networks ask of
you on a daily basis.



Consider what people could find out from looking at your
relationships.



Consider what they could find out looking at your ‘where I lived’
entries.
+

Identify Theft


There are high profile examples of people gaining enough
information through analysing the information available online





Facebook code leak
One Direction album leak

But, identify theft is a growing problem.




And the ease with which it can be done is increased as a result of
social networking.

In many cases, it is not an individual doing this.


This is a staple of organised crime nowadays,
+

The Culture of Sharing


More and more employers, police and other interested
individuals are looking to social media.



The media we upload is usually full of identifying metadata.




A while ago someone posted a photograph of a desk, upon
which was a line of cocaine.




Digital cameras encode a giant amount of information with their
digital files.

With the tagline ‘I bet you can’t guess where I am’

Seconds later, the Internet told him.


‘The second office on the third floor of the east wing of the
Whitehouse’
+

The Culture of Sharing


Some employers demand employees for their social media
login details.





Mostly in America.
We have stronger data protection here.

However, how much of your social media data is truly private?


Facebook change their privacy settings on an almost monthly basis.



If your settings are locked down, what about friends sharing
your photos?



What about you being tagged in their public photos?
+

The Culture of Sharing


In America, during a divorce settlement, a couple were told to
share each other’s facebook password.


Full disclosure.



Could your account stand up to the scrutiny of someone else
looking over everything you’ve ever said and done there?



Can you delete the information you put online?



Can you ever put the genie back in the bottle?



Do we share too much as a society?
+

Conclusion


Social networks have the power to do great things for us.




Our culture of online sharing creates a range of issues for us in
the future.




We can’t really get away from the things we’ve done online.

The context in which we make remarks is often not obvious.





But they have a dark side.

You’ll say things to friends you wouldn’t say to other people.
You’ll say things to colleagues in a particular area of expertise that
others will misinterpret.

And along the way, the human mind is working against us.


Because it’s full of cognitive biases.

More Related Content

More from Michael Heron

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMichael Heron
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconductMichael Heron
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkMichael Heron
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility SupportMichael Heron
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and AutershipMichael Heron
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interactionMichael Heron
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityMichael Heron
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - TexturesMichael Heron
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)Michael Heron
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)Michael Heron
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationMichael Heron
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsMichael Heron
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsMichael Heron
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationMichael Heron
 

More from Michael Heron (20)

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game Accessibility
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconduct
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS Framework
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility Support
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and Autership
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interaction
 
SAD04 - Inheritance
SAD04 - InheritanceSAD04 - Inheritance
SAD04 - Inheritance
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - Textures
 
GRPHICS06 - Shading
GRPHICS06 - ShadingGRPHICS06 - Shading
GRPHICS06 - Shading
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical Representation
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D Graphics
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art Appreciation
 
2CPP18 - Modifiers
2CPP18 - Modifiers2CPP18 - Modifiers
2CPP18 - Modifiers
 
2CPP17 - File IO
2CPP17 - File IO2CPP17 - File IO
2CPP17 - File IO
 
2CPP16 - STL
2CPP16 - STL2CPP16 - STL
2CPP16 - STL
 
2CPP15 - Templates
2CPP15 - Templates2CPP15 - Templates
2CPP15 - Templates
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

COMPISSUES03 - The Dark Side of Social Networks

  • 1. + The Dark Side of Social Networks Current Issues in Web Technology Michael Heron
  • 2. + Introduction  We’ve spoken quite a lot about some of the power of social networks.  We need to traverse some dark parts of the human psyche to really appreciate many of the benefits.  In this lecture we’re going to talk about those dark parts, and how social networks work as much through fear and conformity as through memes and virality.  Many of the techniques used to create the stickiest and most viral messages are fundamentally exploitative.  We’ll talk more about this in the Captology lectures.
  • 3. + Conformity  Have you ever heard of the phrase ‘social proofing’?   Social proofing is the cognitive bias that comes into play when we are in social circumstances and don’t know how to behave.   Probably not, but every one of us is affected by it every day. We look to the people around us for cues as to how we should interpret a situation. That works reasonably well.  Sometimes.
  • 4. + Conformity  We are very strongly influenced by social contexts.   Also in the Solomon Asch line experiments.     C.F. Milgram Experiment and the Stanford Prison Experiment. http://www.youtube.com/watch?v=TYIh4MkcfJA Codified in things like the Matthew Effect. Feedback accumulates to things which have already accumulated feedback. Social networks are multipliers of these effects.   Because we are ‘part of the group’ Social pressures are strongest when they come from ‘people like us’
  • 5. + The Bystander Effect  A tremendously famous incident in 1964 was the murder of Kitty Genovese.   The murder itself is not what made the incident so well known.   A 28 year old woman stabbed to death outside her home in NYC. It was the newspaper coverage that followed. Investigations by reporters (some of which may have been embellished) revealed two key facts:   The attacks had happened over a 30 minute period in three separate incidents..  A period of time during which she was screaming for help. During that time several dozen people watched the murder.  None of them called them police.
  • 6. + The Bystander Effect  Whether or not the reporting of this event was accurate, the research it spawned off is well validated.    And become codified as ‘the bystander effect’ http://www.youtube.com/watch?v=OSsPfbup0ac Driven by:   Social proofing Diffusion of responsibility  ‘Someone else will do something’  ‘Nobody else seems to be concerned’  Counteracted by specific allocations of roles, actions and responsibilities.  Counteracted by ‘accountability’ for actions.
  • 7. + People Like Us  Humans are naturally designed to form groups.     The effects of these vary from person to person, but they exert a constant pressure from many directions.   The family The tribe The nationality ‘Our genes make us like people like us’  http://www.psychologicalscience.org/media/releases/2005/pr0507 27.cfm It takes a certain kind of personality to be willing to spend a lot of time ‘rocking the boat’
  • 8. + Social Pressure  At school, the pressure to conform had a name.   It never truly goes away.   You might think of it as an aggressive form of memetic propagation. Social networks, by virtue of their design, are powerful amplifiers of social effects.   Peer pressure And some of these effects work against our better judgement. They invoke a ‘whirr-click’ response, to quote Robert Cialdini.
  • 9. + Social Pressure  If you buy into the basic premise of memetic theory, the reasons why social pressures are important is obvious.  You pick up real viruses by being in close proximity to people with viruses.  You’re more likely to catch them from your friends.  The ideas and attitudes that your friends have propagate more freely than the ideas and attitudes of strangers.  Within our monkey brains, that also extends to ‘people like us’.  ‘These people who are of my tribe’
  • 10. + Reciprocity Effect  Let’s look at one such effect that is capitalized upon by the trend towards social gaming.   Have you ever been in a situation where someone has handed you a cheap trinket and then asked for money?   It’s a very common technique. One of the cognitive biases in the human mind is that ‘gifts must be repaid’   The Reciprocity Effect. We must reciprocate. This effect underpins the propagation of social norms.
  • 11. + Reciprocity Effect  Zynga are masters of this effect.   Farmville in particular is a masterpiece of psychological manipulation.   It’s not so much a game as a perfectly pitched engine for transferring the contents of your bank account from you to Zynga. You will have seen this in action, undoubtedly.   To help us bridge in this lecture the narrative from social networks to games. <Some friend> has gifted you a cow! Log on to Farmville to return the favour! You didn’t get me gift! You got me an obligation.  http://www.youtube.com/watch?v=38x6kWB-xD4
  • 12. + Reciprocity Effect  The effect is magnified within our ‘people like us’ group.   What? To do that I need to click on these stupid things and then press that thing and then come back in an hour? Fine, whatever.   Someone got me a cow, I must then log on to do whatever dumb thing I need to do to negate the imbalance. Right, I’m back. Hey, they gave me a free cow I can gift to a friend. I guess that’s nice of them. I can send that on to the friend who sent me his’ Some minutes later, from the perspective of the first friend:  ‘Wow, he sent me a cow back!’  ‘They must really like Farmville. I’ll send something else their way when I get a chance’
  • 13. + The Dark Side  The problem with all these techniques as that they are largely evolutionary traits.   Cognitive biases are the ‘cheat codes to the human mind’   If you know they exist, you can design strategies to tickle these biases. They don’t work universally.   Our cognitive biases, and there are hundreds of them, help us make sense of an incredibly complex world. At best they increase rates of compliance. But nonetheless, you’re exploiting loopholes in human thinking.  Loopholes of which many people are not aware.
  • 14. + The Dark Side  There are numerous ways in which the nature of social networking has a dark side.  An erosion of privacy   Facilitation of social pressures.   And an increase in the willingness of individuals to share information. Cyberbullying Enabling the wrong kinds of ‘people like us’ to communicate.    Terrorists Traders of child sex images Deindividuation  Hidden behind pseudonyms
  • 15. + The Dark Side  Social networks don’t create any of these problems.   However, their design does magnify the effects. There were ‘funny memes’ before Facebook.  However, it was difficult for such things to become viral.   Virality is multiplied by the power of social networks. It’s easy to separate the real life consequences when all the social cues point to propagation.  It’s easy to forget that most memes are profoundly cruel to the people involved.  If it was bad, people wouldn’t be doing it, right?
  • 16. + Bandwagon Effects  Social networks multiply the bandwagon effect.   This is another cognitive bias, reinforced by other biases.    Social proofing ‘Herd instinct’ The bandwagon effect by itself is not inherently harmful, and can be put to ‘good’ use.     The more people doing something, the more ‘okay’ it has to be. The current ‘green bandwagon’ Momentum in socially beneficial causes. The ‘Arab spring’ However, it can also create a tremendously negative environment in which people sublimate their judgements for that of the group.
  • 17. + Cyberstalking  We put more and more information online every year.   That is, ‘the collective we’ The more information we put out there, the more information it will unexpectedly reveal.  An individual foursquare announcement won’t tell me anything.  A thousand analysed over the course of a year will tell me everything.   http://techcrunch.com/2010/02/17/please-rob-me-makesfoursquare-super-useful-for-burglars/ Not everyone who views your online footprint is going to be looking to do you any favours.
  • 18. + Identify Theft  Consider the common ‘security questions’ that are asked for authentication.    Your mother’s maiden name Your first pet Where you were born  Consider the set of information that your social networks ask of you on a daily basis.  Consider what people could find out from looking at your relationships.  Consider what they could find out looking at your ‘where I lived’ entries.
  • 19. + Identify Theft  There are high profile examples of people gaining enough information through analysing the information available online    Facebook code leak One Direction album leak But, identify theft is a growing problem.   And the ease with which it can be done is increased as a result of social networking. In many cases, it is not an individual doing this.  This is a staple of organised crime nowadays,
  • 20. + The Culture of Sharing  More and more employers, police and other interested individuals are looking to social media.  The media we upload is usually full of identifying metadata.   A while ago someone posted a photograph of a desk, upon which was a line of cocaine.   Digital cameras encode a giant amount of information with their digital files. With the tagline ‘I bet you can’t guess where I am’ Seconds later, the Internet told him.  ‘The second office on the third floor of the east wing of the Whitehouse’
  • 21. + The Culture of Sharing  Some employers demand employees for their social media login details.    Mostly in America. We have stronger data protection here. However, how much of your social media data is truly private?  Facebook change their privacy settings on an almost monthly basis.  If your settings are locked down, what about friends sharing your photos?  What about you being tagged in their public photos?
  • 22. + The Culture of Sharing  In America, during a divorce settlement, a couple were told to share each other’s facebook password.  Full disclosure.  Could your account stand up to the scrutiny of someone else looking over everything you’ve ever said and done there?  Can you delete the information you put online?  Can you ever put the genie back in the bottle?  Do we share too much as a society?
  • 23. + Conclusion  Social networks have the power to do great things for us.   Our culture of online sharing creates a range of issues for us in the future.   We can’t really get away from the things we’ve done online. The context in which we make remarks is often not obvious.    But they have a dark side. You’ll say things to friends you wouldn’t say to other people. You’ll say things to colleagues in a particular area of expertise that others will misinterpret. And along the way, the human mind is working against us.  Because it’s full of cognitive biases.