SlideShare a Scribd company logo
1 of 24
Download to read offline
Dr Alexia Maddox
detecting disruption
Visualizing data from digital
communities surrounding
cryptocurrencies and the dark
web
Twitter: @alexiamadd
Overview
❖ Research agenda
❖ Visualising social form
❖ Characterising digital communities
❖ Social surfaces
❖ Data alignments for visualisation
❖ Socio-technical disruption
❖ Case study 1: cryptocurrency community(ies)
❖ Case study 2: Dark web community(ies).
Research context
❖ Social Scientist specialising in the study of digital communities,
digital social frontiers, and digital research methods including
❖ the study of collective behaviours online
❖ social media use
❖ digital cultures
❖ research methods to observe, monitor and engage online cohorts.
❖ Themes of social change, social cohesion, social activism and
social inclusion.
Research vision
❖ Generate a data recognition practice (AI/machine learning)
❖ model social intelligence in 3D immersive environment.
❖ search for signatures of social disruption within digital
trace data.
❖ Interactive and predictive analysis (historical and real
time).
❖ Identify non-human actors within social datasets that
influence social sentiment.
Research agenda
❖ Investigating available data, techniques and community
processes suitable for modelling and visualisation.
❖ Building collaborations through an interdisciplinary
network of researchers across the social sciences,
humanities and computational sciences (but not limited
to!).
❖ Developing an interactive and immersive platform for
researchers and research stakeholders to model social
processes.
Visualising social form
Modelling social form
Maddox, circa 2014 (vintage graphics!)
Maddox, A 2016, Research
Methods and Global Online
Communities: A Case Study,
Routledge, London, UK.
Figure: Methods for collecting data on digital community
Figure: Conceptualizing the link between egocentric data imprints to digital
community
Modelling individual
practices
Maddox, A 2017, 'Beyond digital dualism: Modeling digital community', in T Cottom, J
Daniels & K Gregory (eds), Digital Sociologies, Policy Press, Bristol, UK, pp. 9-26.
http://www.infinitelooper.com/?v=L-cxg8mF_Lw&p=n#/519;590
Serendipity & Social Surfaces
Maddox, circa 2014 (yes, Chromatophores!)
Deravi, LF, Magyar, AP, Sheehy, SP, Bell, GR, Mäthger, LM, Senft, SL,
Wardill, TJ, Lane, WS, Kuzirian, AM & Hanlon, RT 2014, 'The structure–
function relationships of a natural nanoscale photonic device in cuttlefish
chromatophores', Journal of The Royal Society Interface, vol. 11, no. 93, p.
20130942. http://rsif.royalsocietypublishing.org/content/11/93/20130942
Socio-technical disruption
Socio-technical disruption
❖ Hypotheses directing investigation:
❖ Digital communities generate and appropriate emerging technologies
to create alternative possibilities.
❖ Socio-technical disruption is manifested through digital communities.
❖ Socio-technical disruption may be identifiable through digital
signatures.
❖ Forms of identifiable disruption may be ambivalent, malicious or
resistance/refusal acts against structural inequalities.
❖ Within a community this can be characterised through both internal
events and externalised activities.
Case study 1: Cryptocurrencies
❖ To study public discourse surrounding cryptocurrencies via social
media analysis.
❖ Cryptocurrencies are:
❖ Digital payments systems
❖ based upon decentralised peer-to-peer exchange practices
❖ Use of encryption technologies for user privacy and anonymity.
❖ Contentious developments widely discussed within social
media surrounding cryptocurrencies over the last five years
(2012-2017).
Data gathered through TrISMA archive and processed through Tableau (unpublished)
Figure: Cryptocurrency discussion in the Australian Twittersphere 2012 to early 2017
Case study 1: Cryptocurrencies
❖ Community profile
❖ Origins within the Cyber-libertarians of the 1990s (Cypherpunks email
list formed in 1992).
❖ Value field includes: privacy, anonymity, personal sovereignty &
autonomy, freedom (of information and by contractual relationships),
disruption of state, decentralisation, peer-to-peer socio-technical
architectures, code-as-law.
❖ Goldbugs, hippies, cyberlibertarians and so on … (Maurer 2013).
❖ Cypherpunks and Crypto-anarchists (Swartz 2018).
❖ Broader base includes fintech enthusiasts and speculators, start ups and
entrepreneurs, privacy advocates.
Maddox, A, Singh, S, Horst, H & Adamson, G 2016, 'An ethnography of Bitcoin: Towards a future research
agenda', Australian Journal of Telecommunications and the Digital Economy, vol. 4, no. 1, pp. 65-78.
Case study 1: Cryptocurrencies
❖ External disruption
❖ Community agenda towards the disruption of
centralised banking system
❖ Frictionless transfers across national borders (ie
stateless transfer).
❖ Blockchain developments (cf. Allen 2018, Zhao
2016)
Case study 1: Cryptocurrencies
❖ Internal disruption
❖ There have been several contentious events within
the community (ie forking in the blockchain, hacks
and scams).
❖ These are disputes surrounding what the
technologies can or should do linked to disputes
between values.
Case study 1: Cryptocurrencies
❖ Trends & tensions over 2012-2017
❖ Incorporation of these technologies within banks
❖ Scams and hacks through exchanges and ICOs
❖ Centralising forces & middle men
❖ Investment/speculation bubble
❖ Digital metallism vs infrastructural mutualism
(Swartz 2018).
Case study 2: Cyberlibertarians
❖ To study cyber-libertarian discourse within the
contentious environments of the dark web.
❖ To investigate the relationship between passive data
monitoring (big data analysis) and data gathered
through active engagement (small data analysis)
❖ Consider how this combination of data can inform
and disrupt assumptions within data visualisation
approaches.
Case study 2: Cyberlibertarians
❖ Dark web environments
❖ Overlapping values towards the sovereign self, personal privacy
and anonymity.
❖ Nodal governance of online spaces
❖ Expression of radical values (information freedom, radical
transparency, radical anti-statism).
❖ Cyber-libertarianism 2.0: anarcho-capitalism of the sharing
economy & DIY prosumers freed from external constraint
(Dahlberg 2010).
❖ Technology-enabled solutions to social problems
❖ Self-organising practices of resistance (cf. Fuchs, Coleman)
Case study 2: Cyberlibertarians
❖ Cryptomarkets
❖ Choice-driven drug
purchasing online
❖ Constructive activism
❖ Contentious visibility
❖ ‘Selfcare’ vs ‘Healthcare’
Maddox, A, Barratt, MJ, Allen, M & Lenton, S 2015, 'Constructive activism in the dark web: cryptomarkets and illicit drugs in the
digital ‘demimonde’', Information, Communication & Society, pp. 1-16.
Barratt, MJ, Lenton, S, Maddox, A & Allen, M 2016, '‘What if you live on top of a bakery and you like cakes?’—Drug use and harm
trajectories before, during and after the emergence of Silk Road', International Journal of Drug Policy, vol. 35, pp. 50-7.
Barratt, MJ & Maddox, A 2016, 'Active engagement with stigmatised communities through digital ethnography', Qualitative Research,
vol. 16, no. 6, pp. 701-19.
https://anthrodendum.org/2018/01/22/a-digital-bermuda-triangle-the-perils-of-doing-ethnography-on-darknet-drug-markets/
Case study 2: Cyberlibertarians
❖ External disruption
❖ Constructive activism: building a new world in the
shell of the old.
❖ Online privacy and digital rights movement
❖ Internal disruption
❖ Hacks and Scams, DDOS attacks, Doxxing , site
seizure by law enforcement, digital diasporas in
digital spaces
Methodological challenges abound
❖ Defining and locating the community to study.
❖ Gaining consent and engagement and addressing the many ethical
quandaries.
❖ Decisions on which methods and data collection tools.
❖ Identification of appropriate data sources
❖ Data capture: data on the dark web tends towards the ephemeral.
❖ How to render social intelligence into 3D formats (multi-factor
visualisation).
❖ How to incorporate machine learning and AI approaches to process
social intelligence (archival and real time information).
Next steps
❖ Keep plugging away at case study 1
❖ Identify appropriate subject of study for case study 2
❖ Identify and map available data sources
❖ Investigate 3D visualisation tools and Machine learning/AI tools.
❖ Determine funding sources to support the development of this project
❖ Identify and engage collaborators and build a research network/ engage
and interdisciplinary field
❖ Publish, publish, publish
❖ Stay employed long enough to develop critical mass around this project!

More Related Content

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Detecting disruptive events within digital communities: Visualizing Data from Cryptocurrency and Dark Web Communities

  • 1. Dr Alexia Maddox detecting disruption Visualizing data from digital communities surrounding cryptocurrencies and the dark web Twitter: @alexiamadd
  • 2. Overview ❖ Research agenda ❖ Visualising social form ❖ Characterising digital communities ❖ Social surfaces ❖ Data alignments for visualisation ❖ Socio-technical disruption ❖ Case study 1: cryptocurrency community(ies) ❖ Case study 2: Dark web community(ies).
  • 3. Research context ❖ Social Scientist specialising in the study of digital communities, digital social frontiers, and digital research methods including ❖ the study of collective behaviours online ❖ social media use ❖ digital cultures ❖ research methods to observe, monitor and engage online cohorts. ❖ Themes of social change, social cohesion, social activism and social inclusion.
  • 4. Research vision ❖ Generate a data recognition practice (AI/machine learning) ❖ model social intelligence in 3D immersive environment. ❖ search for signatures of social disruption within digital trace data. ❖ Interactive and predictive analysis (historical and real time). ❖ Identify non-human actors within social datasets that influence social sentiment.
  • 5. Research agenda ❖ Investigating available data, techniques and community processes suitable for modelling and visualisation. ❖ Building collaborations through an interdisciplinary network of researchers across the social sciences, humanities and computational sciences (but not limited to!). ❖ Developing an interactive and immersive platform for researchers and research stakeholders to model social processes.
  • 7. Modelling social form Maddox, circa 2014 (vintage graphics!)
  • 8. Maddox, A 2016, Research Methods and Global Online Communities: A Case Study, Routledge, London, UK. Figure: Methods for collecting data on digital community
  • 9. Figure: Conceptualizing the link between egocentric data imprints to digital community Modelling individual practices Maddox, A 2017, 'Beyond digital dualism: Modeling digital community', in T Cottom, J Daniels & K Gregory (eds), Digital Sociologies, Policy Press, Bristol, UK, pp. 9-26.
  • 10. http://www.infinitelooper.com/?v=L-cxg8mF_Lw&p=n#/519;590 Serendipity & Social Surfaces Maddox, circa 2014 (yes, Chromatophores!) Deravi, LF, Magyar, AP, Sheehy, SP, Bell, GR, Mäthger, LM, Senft, SL, Wardill, TJ, Lane, WS, Kuzirian, AM & Hanlon, RT 2014, 'The structure– function relationships of a natural nanoscale photonic device in cuttlefish chromatophores', Journal of The Royal Society Interface, vol. 11, no. 93, p. 20130942. http://rsif.royalsocietypublishing.org/content/11/93/20130942
  • 12. Socio-technical disruption ❖ Hypotheses directing investigation: ❖ Digital communities generate and appropriate emerging technologies to create alternative possibilities. ❖ Socio-technical disruption is manifested through digital communities. ❖ Socio-technical disruption may be identifiable through digital signatures. ❖ Forms of identifiable disruption may be ambivalent, malicious or resistance/refusal acts against structural inequalities. ❖ Within a community this can be characterised through both internal events and externalised activities.
  • 13. Case study 1: Cryptocurrencies ❖ To study public discourse surrounding cryptocurrencies via social media analysis. ❖ Cryptocurrencies are: ❖ Digital payments systems ❖ based upon decentralised peer-to-peer exchange practices ❖ Use of encryption technologies for user privacy and anonymity. ❖ Contentious developments widely discussed within social media surrounding cryptocurrencies over the last five years (2012-2017).
  • 14. Data gathered through TrISMA archive and processed through Tableau (unpublished) Figure: Cryptocurrency discussion in the Australian Twittersphere 2012 to early 2017
  • 15. Case study 1: Cryptocurrencies ❖ Community profile ❖ Origins within the Cyber-libertarians of the 1990s (Cypherpunks email list formed in 1992). ❖ Value field includes: privacy, anonymity, personal sovereignty & autonomy, freedom (of information and by contractual relationships), disruption of state, decentralisation, peer-to-peer socio-technical architectures, code-as-law. ❖ Goldbugs, hippies, cyberlibertarians and so on … (Maurer 2013). ❖ Cypherpunks and Crypto-anarchists (Swartz 2018). ❖ Broader base includes fintech enthusiasts and speculators, start ups and entrepreneurs, privacy advocates. Maddox, A, Singh, S, Horst, H & Adamson, G 2016, 'An ethnography of Bitcoin: Towards a future research agenda', Australian Journal of Telecommunications and the Digital Economy, vol. 4, no. 1, pp. 65-78.
  • 16. Case study 1: Cryptocurrencies ❖ External disruption ❖ Community agenda towards the disruption of centralised banking system ❖ Frictionless transfers across national borders (ie stateless transfer). ❖ Blockchain developments (cf. Allen 2018, Zhao 2016)
  • 17. Case study 1: Cryptocurrencies ❖ Internal disruption ❖ There have been several contentious events within the community (ie forking in the blockchain, hacks and scams). ❖ These are disputes surrounding what the technologies can or should do linked to disputes between values.
  • 18. Case study 1: Cryptocurrencies ❖ Trends & tensions over 2012-2017 ❖ Incorporation of these technologies within banks ❖ Scams and hacks through exchanges and ICOs ❖ Centralising forces & middle men ❖ Investment/speculation bubble ❖ Digital metallism vs infrastructural mutualism (Swartz 2018).
  • 19. Case study 2: Cyberlibertarians ❖ To study cyber-libertarian discourse within the contentious environments of the dark web. ❖ To investigate the relationship between passive data monitoring (big data analysis) and data gathered through active engagement (small data analysis) ❖ Consider how this combination of data can inform and disrupt assumptions within data visualisation approaches.
  • 20. Case study 2: Cyberlibertarians ❖ Dark web environments ❖ Overlapping values towards the sovereign self, personal privacy and anonymity. ❖ Nodal governance of online spaces ❖ Expression of radical values (information freedom, radical transparency, radical anti-statism). ❖ Cyber-libertarianism 2.0: anarcho-capitalism of the sharing economy & DIY prosumers freed from external constraint (Dahlberg 2010). ❖ Technology-enabled solutions to social problems ❖ Self-organising practices of resistance (cf. Fuchs, Coleman)
  • 21. Case study 2: Cyberlibertarians ❖ Cryptomarkets ❖ Choice-driven drug purchasing online ❖ Constructive activism ❖ Contentious visibility ❖ ‘Selfcare’ vs ‘Healthcare’ Maddox, A, Barratt, MJ, Allen, M & Lenton, S 2015, 'Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’', Information, Communication & Society, pp. 1-16. Barratt, MJ, Lenton, S, Maddox, A & Allen, M 2016, '‘What if you live on top of a bakery and you like cakes?’—Drug use and harm trajectories before, during and after the emergence of Silk Road', International Journal of Drug Policy, vol. 35, pp. 50-7. Barratt, MJ & Maddox, A 2016, 'Active engagement with stigmatised communities through digital ethnography', Qualitative Research, vol. 16, no. 6, pp. 701-19. https://anthrodendum.org/2018/01/22/a-digital-bermuda-triangle-the-perils-of-doing-ethnography-on-darknet-drug-markets/
  • 22. Case study 2: Cyberlibertarians ❖ External disruption ❖ Constructive activism: building a new world in the shell of the old. ❖ Online privacy and digital rights movement ❖ Internal disruption ❖ Hacks and Scams, DDOS attacks, Doxxing , site seizure by law enforcement, digital diasporas in digital spaces
  • 23. Methodological challenges abound ❖ Defining and locating the community to study. ❖ Gaining consent and engagement and addressing the many ethical quandaries. ❖ Decisions on which methods and data collection tools. ❖ Identification of appropriate data sources ❖ Data capture: data on the dark web tends towards the ephemeral. ❖ How to render social intelligence into 3D formats (multi-factor visualisation). ❖ How to incorporate machine learning and AI approaches to process social intelligence (archival and real time information).
  • 24. Next steps ❖ Keep plugging away at case study 1 ❖ Identify appropriate subject of study for case study 2 ❖ Identify and map available data sources ❖ Investigate 3D visualisation tools and Machine learning/AI tools. ❖ Determine funding sources to support the development of this project ❖ Identify and engage collaborators and build a research network/ engage and interdisciplinary field ❖ Publish, publish, publish ❖ Stay employed long enough to develop critical mass around this project!