This document summarizes a presentation about research conducted on the online community Everything2.com. The presentation covered 3 studies:
1. A study of how user tenure relates to participation patterns over time. It found that short-term users were more likely to delete early write-ups and submitting a second write-up increased chances of long-term participation.
2. A study predicting future content contributions using metrics like new write-ups, deleted write-ups, messages, and abandoned accounts. It found it could predict contributions with over 90% accuracy.
3. A proposed study of habitual use of online communities, examining how behaviors become automatic over time based on theories of habit and socio-cognition.
Nanocelebrity: A SxSW Future 15 SessionShane Tilton
In the spirit of the theme of this session, I would make an argument that we may be moving slightly away from the microcelebrity and heading towards something I’m calling the nanocelebrity. I originally made the argument that a nanocelebrity was defined an individual who was using social media, had a smaller audience than the microcelebrity (somewhere between 600 to 1,000 people) and would tailor their content around a field of niche information and know how to explain that field to their audience.
AAPOR - comparing found data from social media and made data from surveysCliff Lampe
This presentation was for the 2014 AAPOR conference, and deals with specific components of how "big data" from social media is different from data acquired through surveys.
Nanocelebrity: A SxSW Future 15 SessionShane Tilton
In the spirit of the theme of this session, I would make an argument that we may be moving slightly away from the microcelebrity and heading towards something I’m calling the nanocelebrity. I originally made the argument that a nanocelebrity was defined an individual who was using social media, had a smaller audience than the microcelebrity (somewhere between 600 to 1,000 people) and would tailor their content around a field of niche information and know how to explain that field to their audience.
AAPOR - comparing found data from social media and made data from surveysCliff Lampe
This presentation was for the 2014 AAPOR conference, and deals with specific components of how "big data" from social media is different from data acquired through surveys.
Social Network Theory is the study of how people, organizations or groups interact with others inside their network understanding the easier when you examine the individual pieces starting with the largest element, when is networks, and working down to the smallest elements, which is the actors. The idea of social network and the notions of sociograms appeared over 50years ago Barnes (1954) is credited with coining the notion of social network, an outflow of his study of a Norwegian island parish in the early 1950s
This presentation was given to a sold out crowd at Salesforce UX Lecture Series in San Francisco.
This is the second presentation of this and it changed a bit. The focus is how to take the next we must take to improve our social software we are using, particularly for organization within their own walls. The shift of from the social patterns of early adopters to mainstream is really a large shift and things are really difficult to do as we have only just begun the trek again (groupware and KM were the two prior attempts).
Understanding how to look at things through different social lenses so to see what is going on is essential. This presentation is 6 or 7 of my 40+ (now just over 50) social lenses to help do this. This presentation is a high level view, but enough to see gaps and where things could and should change as we move forward.
fOSSa2011: Five Things About Online Community and NetworksNancy Wright White
My talk at fOSSa2011 in Lyon France sharing some ideas about communities, networks and technology stewardship in the context of Open Source Software communities. Photos of the sketchnotes I did of other presentations can be found here: http://fossa.inria.fr/nancywhite-s-sketch-notes-scanned-part-one/
TED Fuller event | digital user-generated content - My tales from the fieldDr Mariann Hardey
Workshop presentation for TEDfuller event at University Lincoln on user-generated content and digital technology. Pitfalls and opportunities for social researchers.
The Rise Of Us (on Collective Intelligence)Kevin Lim
Last year lecture was well received, even featured on the Chronicle of Higher Education blog. This year I present an updated version with relevant book mentions, such as Wikinomics and The Cult of the Amateur.
This is a short presentation that was quickly put together for UX Barcamp DC. There are a few items that I hadn't put into slides before, but have been background in many other presentations.
Melbourne social media forum - The Oaktree FoundationConnecting Up
Presentation at the Melbourne social media forum by Daniel Lewis-Toakley from The Oaktree Foundation, titled 'Social media: The Live Below the Line campaign'
This is the slides from my presentation of the paper entitled "Activity Analysis – Applying Activity Theory to Analyze Complex Work in Hospitals" which was presented at the ACM Conference on Computer Supported Cooperative Work, CSCW 2011 in Hangzhou, China.
The paper is available from my homepage
http://www.itu.dk/people/bardram
Social Network Theory is the study of how people, organizations or groups interact with others inside their network understanding the easier when you examine the individual pieces starting with the largest element, when is networks, and working down to the smallest elements, which is the actors. The idea of social network and the notions of sociograms appeared over 50years ago Barnes (1954) is credited with coining the notion of social network, an outflow of his study of a Norwegian island parish in the early 1950s
This presentation was given to a sold out crowd at Salesforce UX Lecture Series in San Francisco.
This is the second presentation of this and it changed a bit. The focus is how to take the next we must take to improve our social software we are using, particularly for organization within their own walls. The shift of from the social patterns of early adopters to mainstream is really a large shift and things are really difficult to do as we have only just begun the trek again (groupware and KM were the two prior attempts).
Understanding how to look at things through different social lenses so to see what is going on is essential. This presentation is 6 or 7 of my 40+ (now just over 50) social lenses to help do this. This presentation is a high level view, but enough to see gaps and where things could and should change as we move forward.
fOSSa2011: Five Things About Online Community and NetworksNancy Wright White
My talk at fOSSa2011 in Lyon France sharing some ideas about communities, networks and technology stewardship in the context of Open Source Software communities. Photos of the sketchnotes I did of other presentations can be found here: http://fossa.inria.fr/nancywhite-s-sketch-notes-scanned-part-one/
TED Fuller event | digital user-generated content - My tales from the fieldDr Mariann Hardey
Workshop presentation for TEDfuller event at University Lincoln on user-generated content and digital technology. Pitfalls and opportunities for social researchers.
The Rise Of Us (on Collective Intelligence)Kevin Lim
Last year lecture was well received, even featured on the Chronicle of Higher Education blog. This year I present an updated version with relevant book mentions, such as Wikinomics and The Cult of the Amateur.
This is a short presentation that was quickly put together for UX Barcamp DC. There are a few items that I hadn't put into slides before, but have been background in many other presentations.
Melbourne social media forum - The Oaktree FoundationConnecting Up
Presentation at the Melbourne social media forum by Daniel Lewis-Toakley from The Oaktree Foundation, titled 'Social media: The Live Below the Line campaign'
This is the slides from my presentation of the paper entitled "Activity Analysis – Applying Activity Theory to Analyze Complex Work in Hospitals" which was presented at the ACM Conference on Computer Supported Cooperative Work, CSCW 2011 in Hangzhou, China.
The paper is available from my homepage
http://www.itu.dk/people/bardram
CSCW 2012 Note - Wikipedia Public Policy InitiativeCliff Lampe
One of the biggest challenges faced by social media sites like Wikipedia is how to motivate users to contribute content. Research continues to demonstrate that only a small percentage of users contribute to user-generated content sites. In this study we assess the results of a Wikimedia Foundation initiative, which had graduate and undergraduate students from 22 U.S. universities contribute content to Wikipedia articles as part of their coursework. 185 students were asked about their participation in the initiative and their intention to participate on Wikipedia in the future. Results suggest that intentions to continue contributing are influenced by the initial attitude towards the class, and the degree to which students perceived they were writing for a global audience.
HCI Research as Problem-Solving [CHI'16, presentation slides] Aalto University
Slides from a talk delivered at CHI 2016, San Jose.
Authors: Antti Oulasvirta (Aalto University) and Kasper Hornbaek (University of Copenhagen).
Link to paper: http://users.comnet.aalto.fi/oulasvir/pubs/hci-research-as-problem-solving-chi2016.pdf
Overview: This talk discusses a meta-scientific account of human-computer interaction (HCI) research as problem-solving. We build on the philosophy of Larry Laudan, who develops problem and solution as the foundational concepts of science. We argue that most HCI research is about three main types of problem: empirical, conceptual, and constructive. We elaborate upon Laudan’s concept of problem-solving capacity as a universal criterion for determining the progress of solutions (outcomes): Instead of asking whether research is ‘valid’ or follows the ‘right’ approach, it urges us to ask how its solutions advance our capacity to solve important problems in human use of computers. This offers a rich, generative, and ‘discipline-free’ view of HCI and resolves some existing debates about what HCI is or should be. It may also help unify efforts across nominally disparate traditions in empirical research, theory, design, and engineering.
Social Media Week - September 2012 - Vitalise Your Intranet with RaonaPablo Peris
During Social Media Week, Raona presents this session where you will see the crucial components to “vitalize your intranet” one that will motivate and encourage employees to share, collaborate and engage.
Gave this talk at SSSW'13; The 10th Summer School on Ontology Engineering and the Semantic Web
7 - 13 July, 2013. Cercedilla, Spain. http://sssw.org/2013/
Humans are funny animals, and behave in surprising ways. In an information space, a human’s needs are simple and his behavior straightforward. Find. Read. Save. But once you get a bunch of humans together, communicating and collaborating, sometimes you see the madness and sometimes the wisdom of crowds. This makes the architecture in social spaces the most challenging work you can take on. While your site can never control people, but it certainly can encourage good behavior and discourage bad. We'll cover core principals for creating robust and vibrant online communities, and illuminates critical design decisions that help a community thrive. Learn about the building blocks of social software, and which ones are most relevant to your business. Learn how to promote desired behaviors with interface design, and who’s doing it right. Learn when to apply familiar designs (such as with logging in or adding a friend) and when to strike out into entirely new territory.
These slides are from a tutorial at the 5th ACM International Conference on Recommender Systems (RecSys 2011).
Recommender systems aim to provide users with products or content that satisfy the users' stated or inferred needs. The primary evaluation measures for recommender systems emphasize either the perceived relevance of the recommendations or the actions associated with those recommendations (e.g., purchases or clicks). Unfortunately, this transactional emphasis neglects how users interact with recommendations in the context of information seeking tasks. The effectiveness of this interaction determines the user's experience beyond a single transaction. This tutorial explores the role of recommendations as part of a conversation between the user and an information seeking system. The tutorial does not require any special background in interfaces or usability, and will focus on practical techniques to make recommender systems most effective for users.
Immersive Recommendation incorporates cross-platform and diverse personal digital traces into recommendations. Our context-aware topic modeling algorithm systematically profiles users' interests based on their traces from different contexts, and our hybrid recommendation algorithm makes high-quality recommendations by fusing users' personal profiles, item profiles, and existing ratings. The proposed model showed significant improvement over the state-of-the-art algorithms, suggesting the value of using this new user-centric recommendation model to improve recommendation quality, including in cold-start situations.
Taking Leadership Online: Developing Your Personal Social Media Voice4Good.org
How should you navigate the personal and professional boundaries in the world of social media, and what does that mean for your leadership? How does the social media buzzword “transparency,” translate into “leadership?” In this webinar, we will consider how nonprofit executive directors and other staff use social media personally to further the mission of their organization and translate their leadership online.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
April 22, 2011 MIT talk
1. “Earn Your Bull$&!*”:
User Lifecycles in
Social Media
Cliff Lampe
Michigan State University
April 22, 2011
2. Cliff Lampe
College of Communication
Arts and Sciences
Dept. of Telecommunication,
Information Studies, and
Media
ACM researcher with a
crunchy Communication
coating
“Socio-technical” Researcher
2
25. Key E2 features
Write-ups = article contribution
Noder = registered site member
Vote = +/- user rating of content
Cool = tag applied by high level users
Catbox = Synchronous chat
Message = asynchronous individual and
group msgs
25
26. Earn your Bull%&!*
Earn your bullshit. Node for the other users and not for yourself. Don't let
it be an "attention" node. Once you do a little noding for the higher cause
feel free to take a few nodes to make fun of the French or take a cheap shot
at the Dave Matthews Band or whatever wack idea you wish to spread
throughout the database.
In other words, if you've been a user here for two weeks and have seventy-
three very short writeups you'd best protect yo neck...especially if 90% of them
deal with feces, masturbation or the hallucinatory revelation that came to you
while eating your morning toast...again. If you do that user search on yourself
you may be surprised as to how many have disappeared. We don't need that
anymore!
"Be Cool"
26
29. Motivation and participation
Theoretical perspectives
Uses and Gratifications
Organizational Commitment
User types
“Guest” vs. registered
Participation
Future vs. present vs. actual
29
30. Data
Survey
295 anonymous, 304 registered users
Server Logs
Matched for registered users
30
31. Current Future Future
use Use Contribution
Get Info 0.05 0.19 *** -0.03
Provide Info -0.20 ** 0.16 * 0.53 ***
Social
-0.13 . -0.09 0.10
Enhancement
Maintaining
-0.04 -0.13 0.04
Connectivity
Self Discovery 0.08 0.09 0.02
Entertainment 0.22 *** 0.38 *** 0.02
Analysis: OLS Regression, with many controls. R2=0.49, 0.48,
0.56
31
32. Implications
Usability and efficacy didn’t affect the models
Motivations varied widely within both anonymous and
registered users
Motivations were tied to differences in perceived and
actual behavior
32
34. Two competing views
of user lifecycles
“Born not made”
Panciera et al. 2009, Panciera et al.
2010
“Reader to Leader”
Preece and Shneiderman 2009
34
35. “Born Not Made”
Users come to a site with role predilection
Little change between roles
People fill niches within a type of role
35
36. “Reader to Leader”
Users are socialized into more “weighty”
roles
Users can stop in roles
Roles vs. types
36
37. Method - Interviews
30 active users
Snowball sample to near-saturation
Server log analysis to avoid
homophily
Semi-structured phone interviews
Theme assignment using Atlas.ti
Data matrix
37
38. Inherent Users
Users had made major changes to their
participation practices
Site changes, life changes, user conflict
Previously active participants
Skills, efficacy, context intact
Not lurkers!
38
39. Motivational Consistency
Users reported consistent motivations to participate over
time
Status builders
Personal relationship builders
Community builders
Human capital builders
39
40. Status Builders
‘[...] they were constantly saying
things like ‘you’re doing a great job’,
‘you’re a fantastic writer’ […], that’s
a tremendous amount of motivation
for that sort of material.’ (Rob)
40
41. Personal Relationship Builders
‘I think that I started to see the sort of the social
element was much more prevalent in the content
itself, there were many insider jokes and many more
references of the other people or nodes that
referenced other people […], very soon I got a real
sense of the personalities and I found those people
very attractive. I wanted to have relationships with
them […] that kept me going.’ (Jack).
41
42. Community Builders
‘I guess you’d call it a writing community
[…] everybody reading material, offering
comments, and in turn helping
everybody else becomes a better writer.
[…] It was a great place to basically talk
with like minded people all centered
around writing.’ (Henry).
42
43. Human Capital Builders
‘To hone my technical writing skills
and […] to learn more about science
things.’ (Kim)
‘Like a training wheel for
writing.’ (Rob)
43
44. Exogenous events lead
to behavior changes
Life events (Job, marriage, kid)
Site changes (Raising the Bar, copyright change)
Other site changes (Wikipedia and LiveJournal)
Other user conflicts
44
45. Latent user behaviors
Status builders
Personal relationship builders
Community builders
Human capital builders
45
47. Relationship Builders
Reading, direct messaging, other channels
‘Most of my friends I got from [Everything2] are
friends in real life, but there are certainly still
people out there that I only see through the site
[…] and it’s probably the only way I would have to
connect with. […] I’d written this thing and thought
that maybe I should uh try it again, post it you
know let some old friends know what’s going
on.’ (Alice).
47
48. Community Builders
Move to admin roles, live chat
‘The style of writing that I was good at, was no
longer the style we were focusing on. [I] started
moving towards editing. I would help people
improve their writing instead of trying to put up
Write-ups of my own.’ (Patrick).
48
49. Human capital builders
Feedback to other users
‘So you read some interesting article
and you felt wow! So you give the
authors some feedback email.’ (Bob)
49
50. Born vs. Made
Roles do change, but due to
exogenous factors
There is socialization within roles
Motivation matters
50
54. Research Question
How does the time spent on the site relate
to the pattern of participation over time?
54
55. Method
40,324 users divided into 3 categories based on
difference between account creation and last login (time
lagged)
Categories
Short users - 1-87 days
Latent Committed - 88-502 days
Committed - 503-3484 days
55
57. Multinomial regression
The probability of first write-ups deletion is much higher
for the short-term tenure group, compared to the mid-
term tenure group
(Odds ratio= 2.478, p = .03 < .05).
The submission of a second write-up within the
community has a significant effect on the members’ long-
term tenure, compared to mid-term tenure.
(Odds ratio= 3.36, p = .001 < .05).
57
58. Early Interpretations
May be a propensity for tenure as soon as people hit the
site
How much do early experiences shape long term
participation? When are habits formed?
58
65. Habit
Dewey (1921) - Habits, emotion and cognition have roles
in behavior
Bandura (1975) - Socio-cognitive theory
LaRose and Eastin (2000) - Internet Self Efficacy
Ozkaya and LaRose (2011) - Internet Habitual Use
65
66. Using everything2.com is something…
I do automatically.
I do without having to consciously remember.
That makes me feel weird if I do not do it.
I do without thinking.
That would require effort not to do it.
I start doing before I realize I’m doing it.
I would find hard not to do.
I have no need to think about doing.
That expresses my personal style
66
67. Other E2 studies...
Detecting roles based on message network
characteristics
Experiments on converting readers to
contributors
Analysis of the effects of meeting offline on
Noders
Responses to the content rating system as a
social behavior feedback mechanism
67
70. Chi definitions
Building a system, and studying it in the
laboratory
Adopting a system, and studying it in the
laboratory
Building a system, and studying it in the
wild
Adopting a system and studying it in the
wild
70
72. Pros and Cons
External validity Expensive
Triangulated Risky
data
Generalizability
Persistent trove
Ethical
Known context considerations
of the
community
72
73. E2 Research Team
Rick Wash Tor Bjornrud Chris Hamrick Alcides Velasquez
Akshaya Sreenivasan Elif Ozkaya Chandan Sarkar Yvette Wohn 73