SlideShare a Scribd company logo
1 of 18
Download to read offline
IDENTITY: PHYSICAL,
CYBER, FUTURE
MATTHEW ROWE
LANCASTER UNIVERSITY, UK
WWW.LANCASTER.AC.UK/STAFF/ROWEM
@MROWEBOT
Dagstuhl Seminar: Physical-Cyber-Social Computing –
September/October 2013
Identity: Physical, Cyber, Future
1
So ‘identity’; what do we mean?
Identity: Physical, Cyber, Future
2
So ‘identity’: what do we mean?
Identity: Physical, Cyber, Future
3
My
Identity
Shared Identity
Abstracted Identity
Persistent information
Never changes
More detailed
Information
More prone
to change
Groups and demographics
Interests and tastes
Identity: Physical, Cyber, Future
4
My
Identity
Shared Identity
Abstracted Identity
Physical
My ‘real world’ name
My parents and siblings
Where I live
My friends
My neighbours
My interests & hobbies
Society memberships
Identity: Physical, Cyber, Future
5
My
Identity
Shared Identity
Abstracted Identity
Cyber
My username/handle
Where I say I live
My connections
My stated interests
My behaviour
Identity: Physical, Cyber, Future
6
My
Identity
Shared Identity
Abstracted Identity
Cyber
Intentional
(ego)
Existential
My username/handle
Where I say I live
My connections
My stated interests
My behaviour
Identity: Physical, Cyber, Future
7
Development =
conflicts
Development
happens through
stages
Identity: Physical, Cyber, Future
8
How do users’ identities develop within cyber systems over time?
Identity: Physical, Cyber, Future
9
Identity: Physical, Cyber, Future
10
by computing the cross-entropy of one probability distri-
bution with respect to another distribution from an lifecycle
period, and then selecting the distribution that minimises
cross-entropy. Assuming we have a probability distribution
(P) formed from a given lifecycle period ([t, t0
]), and a
probability distribution (Q) from an earlier lifecycle period,
then we define the cross-entropy between the distributions
as follows:
H(P, Q) =
X
x
p(x) log q(x) (5)
In the same vein as the earlier entropy analysis, we
derived the period cross-entropy for each platform’s users
throughout their lifecycles and then derived the mean cross-
entropy for the 20 lifecycle periods. Figure 3 presents the
cross-entropies derived for the different platforms and user
properties. We observe that for each distribution and each
platform cross-entropies reduce throughout users’ lifecycles,
suggesting that users do not tend to exhibit behaviour that
has not been seen previously. For instance, for the in-degree
see a consisten
forming user
set of posts
the probabil
instance, for
frequencies
discrete prob
(P[t,t0]), and
time interval
between the
As before
each platform
the mean co
Figure 4 pre
degree, out-d
periods. We
entropy of u
Identity properties @ time t
Identity properties @ time t of the social system (norms)
Dissimilarity between the properties
Identity: Physical, Cyber, Future
11
Out-degree distribution of users:
Greater
dissimilarity
Time in the system
Converge towards social norms,
before transitioning away
●
●
● ● ● ●
● ● ●
● ● ● ● ● ●
●
●
●
●
2.03.04.05.0
Lifecycle Stages
DistributionCrossEntropy
0 0.2 0.4 0.6 0.8 1
Identity: Physical, Cyber, Future
12
Lexical distribution of users:
● ●
● ●
● ●
●
●
●
●
●
● ● ● ● ●
●
●
●
6.06.57.07.58.08.5
Lifecycle Stages
DistributionCrossEntropy
0 0.2 0.4 0.6 0.8 1
Identity: Physical, Cyber, Future
13
What is happening here?!1!
● ●
● ●
● ●
●
●
●
●
●
● ● ● ● ●
●
●
●
6.06.57.07.58.08.5
Lifecycle Stages
DistributionCrossEntropy
0 0.2 0.4 0.6 0.8 1
Identity: Physical, Cyber, Future
14
Identity achievement: divergence from normsForeclosure: convergence on social norms
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online Community
Platforms. M Rowe. To appear in the proceedings of the International Conference on Social
Informatics. Kyoto, Japan. (2013)
Mining User Lifecycles from Online Community Platforms and their Application to Churn
Prediction. M Rowe. To appear in the proceedings of the International Conference on Data
Mining. Dallas, US. (2013)
Identity: Physical, Cyber, Future
15
My
Identity
Shared Identity
Abstracted Identity
Cyber Physical
Future = lens blend
•  Development being co-dependent between physical and cyber layers
•  Transcendent identity (theories, recommendations, development)
“All boundaries are conventions, waiting to be transcended”
Identity: Physical, Cyber, Future
16
¨  Informing social theory from cyber layer’s
interpretation, and vice versa
¨  Behaviour diffusion through developmental stages
¨  Pre-empting physical decisions through
understanding of the cyber lens
¨  Redefinition of cross-lens social norms
Identity: Physical, Cyber, Future
17
Questions?

More Related Content

Similar to Identity: Physical, Cyber, Future

Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Nicolas Kourtellis
 
Studying user footprints in different online social networks
Studying user footprints in different online social networksStudying user footprints in different online social networks
Studying user footprints in different online social networks
IIIT Hyderabad
 

Similar to Identity: Physical, Cyber, Future (20)

Interprofessional Education - Nursing and Social Work
Interprofessional Education - Nursing and Social WorkInterprofessional Education - Nursing and Social Work
Interprofessional Education - Nursing and Social Work
 
Who Else Wants To Learn About Hire
Who Else Wants To Learn About HireWho Else Wants To Learn About Hire
Who Else Wants To Learn About Hire
 
Health Care Collaboration & Community in Virtual Worlds & Second Life
Health Care Collaboration & Community in Virtual Worlds & Second LifeHealth Care Collaboration & Community in Virtual Worlds & Second Life
Health Care Collaboration & Community in Virtual Worlds & Second Life
 
myExperiment @ Nettab
myExperiment @ NettabmyExperiment @ Nettab
myExperiment @ Nettab
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Live Social Semantics @ ESWC2010
Live Social Semantics @ ESWC2010Live Social Semantics @ ESWC2010
Live Social Semantics @ ESWC2010
 
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonIdentifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College London
 
Integrating Social Media
Integrating Social MediaIntegrating Social Media
Integrating Social Media
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a story
 
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...
 
Bowling Alone and Trust Decline in Social Network Sites
Bowling Alone and  Trust Decline in  Social Network SitesBowling Alone and  Trust Decline in  Social Network Sites
Bowling Alone and Trust Decline in Social Network Sites
 
Floral Stationery Set Purple Floral Statione
Floral Stationery Set Purple Floral StationeFloral Stationery Set Purple Floral Statione
Floral Stationery Set Purple Floral Statione
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric Identity
 
What (not) to ask users
What (not) to ask usersWhat (not) to ask users
What (not) to ask users
 
Duke talk
Duke talkDuke talk
Duke talk
 
Relationships In Wbs Ns (Tin180 Com)
Relationships In Wbs Ns (Tin180 Com)Relationships In Wbs Ns (Tin180 Com)
Relationships In Wbs Ns (Tin180 Com)
 
Stanko & richter iec slides 10-14-10
Stanko & richter   iec slides 10-14-10Stanko & richter   iec slides 10-14-10
Stanko & richter iec slides 10-14-10
 
Studying user footprints in different online social networks
Studying user footprints in different online social networksStudying user footprints in different online social networks
Studying user footprints in different online social networks
 

More from Matthew Rowe

Existing Research and Future Research Agenda
Existing Research and Future Research AgendaExisting Research and Future Research Agenda
Existing Research and Future Research Agenda
Matthew Rowe
 
Modelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online CommunitiesModelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online Communities
Matthew Rowe
 
Anticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community ForumsAnticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community Forums
Matthew Rowe
 
Semantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic DataSemantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic Data
Matthew Rowe
 
Forecasting Audience Increase on Youtube
Forecasting Audience Increase on YoutubeForecasting Audience Increase on Youtube
Forecasting Audience Increase on Youtube
Matthew Rowe
 
Predicting Discussions on the Social Semantic Web
Predicting Discussions on the Social Semantic WebPredicting Discussions on the Social Semantic Web
Predicting Discussions on the Social Semantic Web
Matthew Rowe
 

More from Matthew Rowe (20)

Social Computing Research with Apache Spark
Social Computing Research with Apache SparkSocial Computing Research with Apache Spark
Social Computing Research with Apache Spark
 
Predicting Online Community Churners using Gaussian Sequences
Predicting Online Community Churners using Gaussian SequencesPredicting Online Community Churners using Gaussian Sequences
Predicting Online Community Churners using Gaussian Sequences
 
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
 
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting RatingsSemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
 
The Semantic Evolution of Online Communities
The Semantic Evolution of Online CommunitiesThe Semantic Evolution of Online Communities
The Semantic Evolution of Online Communities
 
From Mining to Understanding: The Evolution of Social Web Users
From Mining to Understanding: The Evolution of Social Web UsersFrom Mining to Understanding: The Evolution of Social Web Users
From Mining to Understanding: The Evolution of Social Web Users
 
Mining User Lifecycles from Online Community Platforms and their Application ...
Mining User Lifecycles from Online Community Platforms and their Application ...Mining User Lifecycles from Online Community Platforms and their Application ...
Mining User Lifecycles from Online Community Platforms and their Application ...
 
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
 
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
 
Measuring the Topical Specificity of Online Communities
Measuring the Topical Specificity of Online CommunitiesMeasuring the Topical Specificity of Online Communities
Measuring the Topical Specificity of Online Communities
 
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
 
Attention Economics in Social Web Systems
Attention Economics in Social Web SystemsAttention Economics in Social Web Systems
Attention Economics in Social Web Systems
 
Existing Research and Future Research Agenda
Existing Research and Future Research AgendaExisting Research and Future Research Agenda
Existing Research and Future Research Agenda
 
Tutorial: Social Semantics
Tutorial: Social SemanticsTutorial: Social Semantics
Tutorial: Social Semantics
 
Modelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online CommunitiesModelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online Communities
 
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsUsing Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
 
Anticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community ForumsAnticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community Forums
 
Semantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic DataSemantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic Data
 
Forecasting Audience Increase on Youtube
Forecasting Audience Increase on YoutubeForecasting Audience Increase on Youtube
Forecasting Audience Increase on Youtube
 
Predicting Discussions on the Social Semantic Web
Predicting Discussions on the Social Semantic WebPredicting Discussions on the Social Semantic Web
Predicting Discussions on the Social Semantic Web
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Identity: Physical, Cyber, Future

  • 1. IDENTITY: PHYSICAL, CYBER, FUTURE MATTHEW ROWE LANCASTER UNIVERSITY, UK WWW.LANCASTER.AC.UK/STAFF/ROWEM @MROWEBOT Dagstuhl Seminar: Physical-Cyber-Social Computing – September/October 2013
  • 2. Identity: Physical, Cyber, Future 1 So ‘identity’; what do we mean?
  • 3. Identity: Physical, Cyber, Future 2 So ‘identity’: what do we mean?
  • 4. Identity: Physical, Cyber, Future 3 My Identity Shared Identity Abstracted Identity Persistent information Never changes More detailed Information More prone to change Groups and demographics Interests and tastes
  • 5. Identity: Physical, Cyber, Future 4 My Identity Shared Identity Abstracted Identity Physical My ‘real world’ name My parents and siblings Where I live My friends My neighbours My interests & hobbies Society memberships
  • 6. Identity: Physical, Cyber, Future 5 My Identity Shared Identity Abstracted Identity Cyber My username/handle Where I say I live My connections My stated interests My behaviour
  • 7. Identity: Physical, Cyber, Future 6 My Identity Shared Identity Abstracted Identity Cyber Intentional (ego) Existential My username/handle Where I say I live My connections My stated interests My behaviour
  • 8. Identity: Physical, Cyber, Future 7 Development = conflicts Development happens through stages
  • 10. How do users’ identities develop within cyber systems over time? Identity: Physical, Cyber, Future 9
  • 11. Identity: Physical, Cyber, Future 10 by computing the cross-entropy of one probability distri- bution with respect to another distribution from an lifecycle period, and then selecting the distribution that minimises cross-entropy. Assuming we have a probability distribution (P) formed from a given lifecycle period ([t, t0 ]), and a probability distribution (Q) from an earlier lifecycle period, then we define the cross-entropy between the distributions as follows: H(P, Q) = X x p(x) log q(x) (5) In the same vein as the earlier entropy analysis, we derived the period cross-entropy for each platform’s users throughout their lifecycles and then derived the mean cross- entropy for the 20 lifecycle periods. Figure 3 presents the cross-entropies derived for the different platforms and user properties. We observe that for each distribution and each platform cross-entropies reduce throughout users’ lifecycles, suggesting that users do not tend to exhibit behaviour that has not been seen previously. For instance, for the in-degree see a consisten forming user set of posts the probabil instance, for frequencies discrete prob (P[t,t0]), and time interval between the As before each platform the mean co Figure 4 pre degree, out-d periods. We entropy of u Identity properties @ time t Identity properties @ time t of the social system (norms) Dissimilarity between the properties
  • 12. Identity: Physical, Cyber, Future 11 Out-degree distribution of users: Greater dissimilarity Time in the system Converge towards social norms, before transitioning away ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 2.03.04.05.0 Lifecycle Stages DistributionCrossEntropy 0 0.2 0.4 0.6 0.8 1
  • 13. Identity: Physical, Cyber, Future 12 Lexical distribution of users: ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 6.06.57.07.58.08.5 Lifecycle Stages DistributionCrossEntropy 0 0.2 0.4 0.6 0.8 1
  • 14. Identity: Physical, Cyber, Future 13 What is happening here?!1!
  • 15. ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 6.06.57.07.58.08.5 Lifecycle Stages DistributionCrossEntropy 0 0.2 0.4 0.6 0.8 1 Identity: Physical, Cyber, Future 14 Identity achievement: divergence from normsForeclosure: convergence on social norms Changing with Time: Modelling and Detecting User Lifecycle Periods in Online Community Platforms. M Rowe. To appear in the proceedings of the International Conference on Social Informatics. Kyoto, Japan. (2013) Mining User Lifecycles from Online Community Platforms and their Application to Churn Prediction. M Rowe. To appear in the proceedings of the International Conference on Data Mining. Dallas, US. (2013)
  • 16. Identity: Physical, Cyber, Future 15 My Identity Shared Identity Abstracted Identity Cyber Physical Future = lens blend •  Development being co-dependent between physical and cyber layers •  Transcendent identity (theories, recommendations, development) “All boundaries are conventions, waiting to be transcended”
  • 17. Identity: Physical, Cyber, Future 16 ¨  Informing social theory from cyber layer’s interpretation, and vice versa ¨  Behaviour diffusion through developmental stages ¨  Pre-empting physical decisions through understanding of the cyber lens ¨  Redefinition of cross-lens social norms
  • 18. Identity: Physical, Cyber, Future 17 Questions?