SlideShare a Scribd company logo
Emerging Research Agendas at the
Intersection of Communication
& Computational Social Science
DR. KATY PEARCE, UNIVERSITY OF WASHINGTON
@KATYPEARCE
Drawing constellations
amongst the stars:
Opportunities and
challenges of studying
vulnerable populations
via computational social
science
1
SO WHAT?
• We all have to deal
with ethical issues in
computational social
science
• Looking at extreme
cases of vulnerable
populations can
illuminate issues
• I’m suggesting this is
helpful for those with
contextual knowledge
2
RESEARCH IN AUTHORITARIAN
STATES IS NOT FOR THE MEEK
AUTHORITARIAN STATES
ACCESS
RISK
CREDIBILI
TY
BLURRED
LINES
3
ENTER THE INTERNET
“Social networking sites are
a social scientist’s wet
dream” – Halavais, 2011
4
WHAT CAN THE INTERNET DO FOR
YOU?
AFFORDANCES
ACCESS
RISK
CREDIBILI
TY
BLURRED
LINES
5
INTERNET &
AUTHORITARIAN STATES
ACCESS
RISK
CREDIBILI
TY
BLURRED
LINES
6
Computational methods can allow to
see beyond the visible spectrum of
traditional analysis (Cioffi-Revilla,
2010) – this is rich, detailed,
interrelated, timely, and low-cost
data (Kitchin, 2013) that can reveal
patterns of individual and group
behavior (Lazer, et al., 2009)
ENTER
COMPUTATIONAL METHODS
7
ACCESS
• Access is easy
• But perhaps
unethical
• Informed consent
(boyd & Crawford,
2012; Gleibs, 2014)
RISK
• Data collection
reduces risk greatly
• Analysis
introduces entirely
new risk (Oboler,
Welsh, & Cruz,
2012)
BLURRED
LINES
• The issue remains:
am I friend or foe
or merely a
researcher?
CREDIBILITY
• Computational
analysis may seem
“creepy”
COMPUTATIONAL &
AUTHORITARIAN STATES
• Hard to access participants
• Everyone is at risk
• Credibility and blurred lines
are always an issue
• Computational methods
give me something and
complements other
methods
• Less risky to access
• Analysis is probably putting
people at greater risk
AT STAKE
CHALLENGES OPPORTUNITIES
WHAT HAVE I DONE AND WHAT SHOULD I DO?
78
• Busting “bad guys” feels good
• Oppositionists ask me to do
these analyses to determine if
campaigns were successful, to
identify powerful nodes, and
to identify new allies
• Embassy staff find analyses
useful
• If oppositionists and embassy
staff find analyses useful, so
does the regime
• Regime probably knows some
of this, but not everything
– Example: after analyses
where I determined a
young photographer to be
the most powerful social
media player, increased
threats to him and regular
blocking of his accounts
• Retaliatory society
WHAT TO DO?
HELPFUL HARMFUL
1
7
TAKEAWAYS
The Internet and especially computational methods solve many of
the issues related to research in authoritarian states
But it creates many new problems
Given the challenges related to privacy and consent in
computational social science, how should we be thinking about
vulnerable populations?
1
8
THANK YOU
1
9
EXTRA SLIDES
1
9
1
RESEARCH IN AUTHORITARIAN
STATES IS NOT FOR THE MEEK
AUTHORITARIAN STATES
ACCESS
•Researchers face access
barriers – getting visas,
funding to do fieldwork,
language and culture
differences, finding willing
participants, building
rapport
RISK
• Participants can take on
great risk to speak to a
researcher
• IRB cares more about
participants than researcher
• Researcher can easily risk
denial of visa or slanderous
content
BLURRED
LINES
• Friendships or relations in
an authoritarian state
increase risk for all involved
• When does friendship
begin and research end?
CREDIBILITY
• Make or break
• Very difficult to establish
• Researchers are assumed to
be spies
• Trust and credibility can be
helped by demonstrating
specific knowledge
• Using connections and
dropping names can help
1
INTERNET AFFORDANCES
ACCESS
• Easier to find individuals,
easier to find time to
conduct interviews
• Allows for participants to
have greater reflection than
in a face-to-face interview
RISK
• Digital traces can increase
likelihood of information
getting out
• Research in a digital space
may not be considered as
authentic
BLURRED
LINES
• Online contexts and social
media blur lines between
friend and researcher
• If a research subject is a
“friend” and posts things
online, where is the
informed consent?
CREDIBILITY
• Difficult to demonstrate
authenticity in a mediated
environment
• Rapport can be build online
in a different way
• Self-presentation online can
be carefully crafted
• Researchers can make
credentials available online
WHAT CAN THE INTERNET DO FOR
YOU?

More Related Content

What's hot

A Scholar's Dilemmas
A Scholar's DilemmasA Scholar's Dilemmas
A Scholar's Dilemmas
Eric Schnell
 
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Julius Reimer
 
Collaboration and Social Networking (KCB202 Week 2 Podcast)
Collaboration and Social Networking (KCB202 Week 2 Podcast)Collaboration and Social Networking (KCB202 Week 2 Podcast)
Collaboration and Social Networking (KCB202 Week 2 Podcast)
Axel Bruns
 
The Basics of Science Communication - in a formula
The Basics of Science Communication - in a formulaThe Basics of Science Communication - in a formula
The Basics of Science Communication - in a formula
Jacopo Pasotti
 
Overcoming Challenges of Using Social Media for Outreach in an Academic Library
Overcoming Challenges of Using Social Media for Outreach in an Academic LibraryOvercoming Challenges of Using Social Media for Outreach in an Academic Library
Overcoming Challenges of Using Social Media for Outreach in an Academic Library
sociamigo
 
Bobby barnes finale
Bobby barnes finaleBobby barnes finale
Bobby barnes finaleCMoondog
 
Cyberbullying in adolescent victims
Cyberbullying in adolescent victimsCyberbullying in adolescent victims
Cyberbullying in adolescent victimsMarcelo Pesallaccia
 
Internet Not So Isolating, Study Finds
Internet Not So Isolating, Study FindsInternet Not So Isolating, Study Finds
Internet Not So Isolating, Study FindsDavid Ricker
 
Lies, Damned Lies and Statistics: History and the Impact Agenda
Lies, Damned Lies and Statistics: History and the Impact AgendaLies, Damned Lies and Statistics: History and the Impact Agenda
Lies, Damned Lies and Statistics: History and the Impact Agenda
M. H Beals
 
ESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentationESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentation
Kandy Woodfield
 
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Digital Sociology Mini-Conference
 
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesIdentifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
JISC RSC Southeast
 
Virtual worlds for chiropractic education feasible or foolish
Virtual worlds for chiropractic education  feasible or foolishVirtual worlds for chiropractic education  feasible or foolish
Virtual worlds for chiropractic education feasible or foolishghinck
 
Playing the Past, Seeing the Future: Game Design in the Humanities
Playing the Past, Seeing the Future: Game Design in the HumanitiesPlaying the Past, Seeing the Future: Game Design in the Humanities
Playing the Past, Seeing the Future: Game Design in the Humanities
SeriousGamesAssoc
 
Techno research
Techno researchTechno research
Techno research
Carol Haigh
 
Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults
AbhramikaChoudhuri
 
The Digital Scholar revisited
The Digital Scholar revisitedThe Digital Scholar revisited
The Digital Scholar revisited
Martin Weller
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
Big data, small data and everything in between
Big data, small data and everything in betweenBig data, small data and everything in between
Big data, small data and everything in between
Weiai Wayne Xu
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
Ansgar Koene
 

What's hot (20)

A Scholar's Dilemmas
A Scholar's DilemmasA Scholar's Dilemmas
A Scholar's Dilemmas
 
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
 
Collaboration and Social Networking (KCB202 Week 2 Podcast)
Collaboration and Social Networking (KCB202 Week 2 Podcast)Collaboration and Social Networking (KCB202 Week 2 Podcast)
Collaboration and Social Networking (KCB202 Week 2 Podcast)
 
The Basics of Science Communication - in a formula
The Basics of Science Communication - in a formulaThe Basics of Science Communication - in a formula
The Basics of Science Communication - in a formula
 
Overcoming Challenges of Using Social Media for Outreach in an Academic Library
Overcoming Challenges of Using Social Media for Outreach in an Academic LibraryOvercoming Challenges of Using Social Media for Outreach in an Academic Library
Overcoming Challenges of Using Social Media for Outreach in an Academic Library
 
Bobby barnes finale
Bobby barnes finaleBobby barnes finale
Bobby barnes finale
 
Cyberbullying in adolescent victims
Cyberbullying in adolescent victimsCyberbullying in adolescent victims
Cyberbullying in adolescent victims
 
Internet Not So Isolating, Study Finds
Internet Not So Isolating, Study FindsInternet Not So Isolating, Study Finds
Internet Not So Isolating, Study Finds
 
Lies, Damned Lies and Statistics: History and the Impact Agenda
Lies, Damned Lies and Statistics: History and the Impact AgendaLies, Damned Lies and Statistics: History and the Impact Agenda
Lies, Damned Lies and Statistics: History and the Impact Agenda
 
ESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentationESRC Research Methods Festival NSMNSS presentation
ESRC Research Methods Festival NSMNSS presentation
 
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...
 
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesIdentifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
 
Virtual worlds for chiropractic education feasible or foolish
Virtual worlds for chiropractic education  feasible or foolishVirtual worlds for chiropractic education  feasible or foolish
Virtual worlds for chiropractic education feasible or foolish
 
Playing the Past, Seeing the Future: Game Design in the Humanities
Playing the Past, Seeing the Future: Game Design in the HumanitiesPlaying the Past, Seeing the Future: Game Design in the Humanities
Playing the Past, Seeing the Future: Game Design in the Humanities
 
Techno research
Techno researchTechno research
Techno research
 
Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults
 
The Digital Scholar revisited
The Digital Scholar revisitedThe Digital Scholar revisited
The Digital Scholar revisited
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
Big data, small data and everything in between
Big data, small data and everything in betweenBig data, small data and everything in between
Big data, small data and everything in between
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 

Viewers also liked

T R A B A J O D E C A M P O D E P O M A G A R C I A
T R A B A J O  D E  C A M P O  D E  P O M A  G A R C I AT R A B A J O  D E  C A M P O  D E  P O M A  G A R C I A
T R A B A J O D E C A M P O D E P O M A G A R C I Aguest35a97b
 
Hi
HiHi
Accediendo al curso
Accediendo al cursoAccediendo al curso
Accediendo al cursoalexromero
 
Korelasi Dika New
Korelasi Dika NewKorelasi Dika New
Korelasi Dika Newguest44990b
 
Work life balance ldl
Work life balance  ldlWork life balance  ldl
Work life balance ldl
Lies Dina Liastuti
 
Phoenix Contact's Cutfox 10, Semi automatic wire cutting device
Phoenix Contact's Cutfox 10, Semi automatic wire cutting devicePhoenix Contact's Cutfox 10, Semi automatic wire cutting device
Phoenix Contact's Cutfox 10, Semi automatic wire cutting devicePhoenix Contact
 

Viewers also liked (7)

T R A B A J O D E C A M P O D E P O M A G A R C I A
T R A B A J O  D E  C A M P O  D E  P O M A  G A R C I AT R A B A J O  D E  C A M P O  D E  P O M A  G A R C I A
T R A B A J O D E C A M P O D E P O M A G A R C I A
 
Jurnal hanto
Jurnal hantoJurnal hanto
Jurnal hanto
 
Hi
HiHi
Hi
 
Accediendo al curso
Accediendo al cursoAccediendo al curso
Accediendo al curso
 
Korelasi Dika New
Korelasi Dika NewKorelasi Dika New
Korelasi Dika New
 
Work life balance ldl
Work life balance  ldlWork life balance  ldl
Work life balance ldl
 
Phoenix Contact's Cutfox 10, Semi automatic wire cutting device
Phoenix Contact's Cutfox 10, Semi automatic wire cutting devicePhoenix Contact's Cutfox 10, Semi automatic wire cutting device
Phoenix Contact's Cutfox 10, Semi automatic wire cutting device
 

Similar to Ica cs spanelv2

Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012
Michael Netzley, Ph.D.
 
From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...
From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...
From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...
Cape Peninsula University of Technology
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
University of Southern California
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
gloriakt
 
Karenclassslides
KarenclassslidesKarenclassslides
Karenclassslideskcarter14
 
Communicating Science via the Web - Tools and Tips for Grad Students
Communicating Science via the Web - Tools and Tips for Grad StudentsCommunicating Science via the Web - Tools and Tips for Grad Students
Communicating Science via the Web - Tools and Tips for Grad StudentsNaomi Hirsch
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
Pew Research Center's Internet & American Life Project
 
Workshop for PhD researchers: Impact is Coming
Workshop for PhD researchers: Impact is ComingWorkshop for PhD researchers: Impact is Coming
Workshop for PhD researchers: Impact is Coming
Esther De Smet
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinalkcarter14
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinalkcarter14
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinalkcarter14
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinalkcarter14
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
Charleston Conference
 
12 sept2013 imd network orchestration martha g russell
12 sept2013 imd network orchestration martha g russell12 sept2013 imd network orchestration martha g russell
12 sept2013 imd network orchestration martha g russell
Martha Russell
 
Social networks v2
Social networks v2Social networks v2
Social networks v2
The Campaign Company
 
Could social networking online help NEET young people gain employment?
Could social networking online help NEET young people gain employment?Could social networking online help NEET young people gain employment?
Could social networking online help NEET young people gain employment?
John Mowbray
 
Scholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional IdentitiesScholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional Identities
Bonnie Stewart
 
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
Cindy Regalado
 

Similar to Ica cs spanelv2 (20)

Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012
 
From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...
From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...
From Informal Academic Debate To Cyber Harassment- Navigating The Minefield A...
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
Karenclassslides
KarenclassslidesKarenclassslides
Karenclassslides
 
Communicating Science via the Web - Tools and Tips for Grad Students
Communicating Science via the Web - Tools and Tips for Grad StudentsCommunicating Science via the Web - Tools and Tips for Grad Students
Communicating Science via the Web - Tools and Tips for Grad Students
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
 
Workshop for PhD researchers: Impact is Coming
Workshop for PhD researchers: Impact is ComingWorkshop for PhD researchers: Impact is Coming
Workshop for PhD researchers: Impact is Coming
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinal
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinal
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinal
 
Low incomefullfinal
Low incomefullfinalLow incomefullfinal
Low incomefullfinal
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
12 sept2013 imd network orchestration martha g russell
12 sept2013 imd network orchestration martha g russell12 sept2013 imd network orchestration martha g russell
12 sept2013 imd network orchestration martha g russell
 
okraku_sunbelt-2016-presentation_041016
okraku_sunbelt-2016-presentation_041016okraku_sunbelt-2016-presentation_041016
okraku_sunbelt-2016-presentation_041016
 
Week2
Week2Week2
Week2
 
Social networks v2
Social networks v2Social networks v2
Social networks v2
 
Could social networking online help NEET young people gain employment?
Could social networking online help NEET young people gain employment?Could social networking online help NEET young people gain employment?
Could social networking online help NEET young people gain employment?
 
Scholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional IdentitiesScholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional Identities
 
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
 

More from Katy Pearce

Socinfo - teaching social network analysis
Socinfo - teaching social network analysisSocinfo - teaching social network analysis
Socinfo - teaching social network analysis
Katy Pearce
 
Pearce - LOLs of Nations
Pearce - LOLs of NationsPearce - LOLs of Nations
Pearce - LOLs of NationsKaty Pearce
 
Azerbaijanicts2013
Azerbaijanicts2013Azerbaijanicts2013
Azerbaijanicts2013Katy Pearce
 
Attitudes toward elections in georgia
Attitudes toward elections in georgiaAttitudes toward elections in georgia
Attitudes toward elections in georgiaKaty Pearce
 
Caucasus ict trends
Caucasus ict trendsCaucasus ict trends
Caucasus ict trendsKaty Pearce
 
Katy Pearce #ttw12
Katy Pearce #ttw12Katy Pearce #ttw12
Katy Pearce #ttw12Katy Pearce
 
Armenia ict adoption ii
Armenia ict adoption iiArmenia ict adoption ii
Armenia ict adoption iiKaty Pearce
 
Georgian women
Georgian womenGeorgian women
Georgian women
Katy Pearce
 
Facebookodnoklassniki
FacebookodnoklassnikiFacebookodnoklassniki
FacebookodnoklassnikiKaty Pearce
 
Regionalconsumption
RegionalconsumptionRegionalconsumption
RegionalconsumptionKaty Pearce
 

More from Katy Pearce (20)

Socinfo - teaching social network analysis
Socinfo - teaching social network analysisSocinfo - teaching social network analysis
Socinfo - teaching social network analysis
 
Pdfmemes
PdfmemesPdfmemes
Pdfmemes
 
Pearce - LOLs of Nations
Pearce - LOLs of NationsPearce - LOLs of Nations
Pearce - LOLs of Nations
 
Change
ChangeChange
Change
 
Azerbaijanicts2013
Azerbaijanicts2013Azerbaijanicts2013
Azerbaijanicts2013
 
Uwtalk
UwtalkUwtalk
Uwtalk
 
Attitudes toward elections in georgia
Attitudes toward elections in georgiaAttitudes toward elections in georgia
Attitudes toward elections in georgia
 
Mobile
MobileMobile
Mobile
 
Caucasus ict trends
Caucasus ict trendsCaucasus ict trends
Caucasus ict trends
 
Icakzkgtj
IcakzkgtjIcakzkgtj
Icakzkgtj
 
Azerbaijanicts
AzerbaijanictsAzerbaijanicts
Azerbaijanicts
 
Mobilepreconf
MobilepreconfMobilepreconf
Mobilepreconf
 
Katy Pearce #ttw12
Katy Pearce #ttw12Katy Pearce #ttw12
Katy Pearce #ttw12
 
Armenia ict adoption ii
Armenia ict adoption iiArmenia ict adoption ii
Armenia ict adoption ii
 
Georgian women
Georgian womenGeorgian women
Georgian women
 
Facebookodnoklassniki
FacebookodnoklassnikiFacebookodnoklassniki
Facebookodnoklassniki
 
Gettingajob
GettingajobGettingajob
Gettingajob
 
English
EnglishEnglish
English
 
Incomesources
IncomesourcesIncomesources
Incomesources
 
Regionalconsumption
RegionalconsumptionRegionalconsumption
Regionalconsumption
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Ica cs spanelv2

  • 1. Emerging Research Agendas at the Intersection of Communication & Computational Social Science DR. KATY PEARCE, UNIVERSITY OF WASHINGTON @KATYPEARCE Drawing constellations amongst the stars: Opportunities and challenges of studying vulnerable populations via computational social science
  • 2. 1 SO WHAT? • We all have to deal with ethical issues in computational social science • Looking at extreme cases of vulnerable populations can illuminate issues • I’m suggesting this is helpful for those with contextual knowledge
  • 3. 2 RESEARCH IN AUTHORITARIAN STATES IS NOT FOR THE MEEK AUTHORITARIAN STATES ACCESS RISK CREDIBILI TY BLURRED LINES
  • 4. 3 ENTER THE INTERNET “Social networking sites are a social scientist’s wet dream” – Halavais, 2011
  • 5. 4 WHAT CAN THE INTERNET DO FOR YOU? AFFORDANCES ACCESS RISK CREDIBILI TY BLURRED LINES
  • 7. 6 Computational methods can allow to see beyond the visible spectrum of traditional analysis (Cioffi-Revilla, 2010) – this is rich, detailed, interrelated, timely, and low-cost data (Kitchin, 2013) that can reveal patterns of individual and group behavior (Lazer, et al., 2009) ENTER COMPUTATIONAL METHODS
  • 8. 7 ACCESS • Access is easy • But perhaps unethical • Informed consent (boyd & Crawford, 2012; Gleibs, 2014) RISK • Data collection reduces risk greatly • Analysis introduces entirely new risk (Oboler, Welsh, & Cruz, 2012) BLURRED LINES • The issue remains: am I friend or foe or merely a researcher? CREDIBILITY • Computational analysis may seem “creepy” COMPUTATIONAL & AUTHORITARIAN STATES
  • 9. • Hard to access participants • Everyone is at risk • Credibility and blurred lines are always an issue • Computational methods give me something and complements other methods • Less risky to access • Analysis is probably putting people at greater risk AT STAKE CHALLENGES OPPORTUNITIES WHAT HAVE I DONE AND WHAT SHOULD I DO? 78
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. • Busting “bad guys” feels good • Oppositionists ask me to do these analyses to determine if campaigns were successful, to identify powerful nodes, and to identify new allies • Embassy staff find analyses useful • If oppositionists and embassy staff find analyses useful, so does the regime • Regime probably knows some of this, but not everything – Example: after analyses where I determined a young photographer to be the most powerful social media player, increased threats to him and regular blocking of his accounts • Retaliatory society WHAT TO DO? HELPFUL HARMFUL 1 7
  • 19. TAKEAWAYS The Internet and especially computational methods solve many of the issues related to research in authoritarian states But it creates many new problems Given the challenges related to privacy and consent in computational social science, how should we be thinking about vulnerable populations? 1 8
  • 22. 1 RESEARCH IN AUTHORITARIAN STATES IS NOT FOR THE MEEK AUTHORITARIAN STATES ACCESS •Researchers face access barriers – getting visas, funding to do fieldwork, language and culture differences, finding willing participants, building rapport RISK • Participants can take on great risk to speak to a researcher • IRB cares more about participants than researcher • Researcher can easily risk denial of visa or slanderous content BLURRED LINES • Friendships or relations in an authoritarian state increase risk for all involved • When does friendship begin and research end? CREDIBILITY • Make or break • Very difficult to establish • Researchers are assumed to be spies • Trust and credibility can be helped by demonstrating specific knowledge • Using connections and dropping names can help
  • 23. 1 INTERNET AFFORDANCES ACCESS • Easier to find individuals, easier to find time to conduct interviews • Allows for participants to have greater reflection than in a face-to-face interview RISK • Digital traces can increase likelihood of information getting out • Research in a digital space may not be considered as authentic BLURRED LINES • Online contexts and social media blur lines between friend and researcher • If a research subject is a “friend” and posts things online, where is the informed consent? CREDIBILITY • Difficult to demonstrate authenticity in a mediated environment • Rapport can be build online in a different way • Self-presentation online can be carefully crafted • Researchers can make credentials available online WHAT CAN THE INTERNET DO FOR YOU?

Editor's Notes

  1. Access Researchers face access barriers – getting visas, funding to do fieldwork, language and culture differences, finding willing participants, building rapport Risk Participants can take on great risk to speak to a researcher IRB cares more about participants than researcher Researcher can easily risk denial of visa or slanderous content Credibility Make or break Very difficult to establish Researchers are assumed to be spies Trust and credibility can be helped by demonstrating specific knowledge Using connections and dropping names can help Blurred lines Friendships or relations in an authoritarian state increase risk for all involved When does friendship begin and research end?
  2. Access Easier to find individuals, easier to find time to conduct interviews Allows for participants to have greater reflection than in a face-to-face interview Risk Digital traces can increase likelihood of information getting out Research in a digital space may not be considered as authentic Credibility Difficult to demonstrate authenticity in a mediated environment Rapport can be build online in a different way Self-presentation online can be carefully crafted Researchers can make credentials available online Blurred Lines Online contexts and social media blur lines between friend and researcher If a research subject is a “friend” and posts things online, where is the informed consent?
  3. Access Access issues are aided by the Internet A question of representativeness arises Risk Digital-based research may reduce risks for researchers Outcomes of angering governments do not differ Digital may make risks to participants seem less, but may increase risk because of digital records Digital research is safer, but not completely safe Credibility Have trusted connections introduce researcher online Let Facebook be your character witness Thus, authoritarian + digital can make for an easier path to trust building, although it also presents new challenges Blurred Lines Should a researcher have a disclaimer or consent agreement when accepting friend requests? How does the digital space differ from face-to-face?
  4. Computational methods can allow to see beyond the visible spectrum of traditional analysis (Cioffi-Revilla, 2010) – this is rich, detailed, interrelated, timely, and low-cost data (Kitchin, 2013) that can reveal patterns of individual and group behavior (Lazer, et al., 2009). These are patterns that would not be seen without computational tools as well as interpretation that is build on a theoretical base and contextual scholarly and applied knowledge. Context matters (boyd & Crawford, 2012) The ethics of the collection and analysis of social media data are up for debate (boyd & Crawford, 2012). Gleibs (2014) argues that social media data is not public and requires informed consent – social media users unwittingly become “human subjects” when their data is used in computational analysis and those users had an expectation of privacy, even if technically all this information is “public”. Researchers are not in the imagined audience (boyd & Crawford, 2012). Can these patterns, analysis, and interpretation put individuals at risk? Oboler, Welsh, and Cruz (2012) suggest yes. When those being analyzed are living in an authoritarian regime, and thus under greater risk already, this can be even worse. For me, as a researcher and as someone who cares about democracy in my fieldsite, I am conflicted. I know that some oppositionists have found my analyses useful. For example, being able to say that a hashtag campaign was “successful” because they saw the reach in my analysis can help a movement. My identifying government zombie social media accounts may raise morale amongst oppositionists. Embassy employees often tell me how much they appreciate these analyses as it gives them a new perspective on a situation – especially a protest or a campaign. But if oppositionists and embassy staff are reading my blog analyses, the regime itself probably is too.
  5. Can these patterns, analysis, and interpretation put individuals at risk? Oboler, Welsh, and Cruz (2012) suggest yes. When those being analyzed are living in an authoritarian regime, and thus under greater risk already, this can be even worse. For me, as a researcher and as someone who cares about democracy in my fieldsite, I am conflicted. I know that some oppositionists have found my analyses useful. For example, being able to say that a hashtag campaign was “successful” because they saw the reach in my analysis can help a movement. My identifying government zombie social media accounts may raise morale amongst oppositionists. Embassy employees often tell me how much they appreciate these analyses as it gives them a new perspective on a situation – especially a protest or a campaign. But if oppositionists and embassy staff are reading my blog analyses, the regime itself probably is too.
  6. Access Researchers face access barriers – getting visas, funding to do fieldwork, language and culture differences, finding willing participants, building rapport Risk Participants can take on great risk to speak to a researcher IRB cares more about participants than researcher Researcher can easily risk denial of visa or slanderous content Credibility Make or break Very difficult to establish Researchers are assumed to be spies Trust and credibility can be helped by demonstrating specific knowledge Using connections and dropping names can help Blurred lines Friendships or relations in an authoritarian state increase risk for all involved When does friendship begin and research end?
  7. Maybe trim down or cut all