SlideShare a Scribd company logo
Studying Cybercrime: Raising 
Questions About Objectivity & Bias 
Presented by: 
Kristine Gloria 
The Tetherless World Constellation 
Rensselaer Polytechnic Institute, Troy, NY 
! 
With thanks to co-author John S. Erickson and the extended RPI Tetherless World Team
The Process of Web Science 
Berners-Lee, T. (2007) W3C Keynote. http://www.w3.org/2007/Talks/0509-www-keynote-tbl/#(10) 
Via the workshop call: how can we study the phenomena of cybercrime & cyberwarfare that may offer a different perspective of what other disciplines already offer 
• Begin with the cycle - where in the cycle does it make sense to start? 
• Moving away from just one side of the cycle
How may a Web Scientist explore the topic of cybercrime 
and cyberwarfare by offering an integrated study of both 
the social and technical aspects of the phenomena?
Agenda 
! 
6 
I. Objectivity & Bias 
II. Motivation and example 
III. Open questions & future 
discussion
Objectivity & Bias 
Porter (1996) traces objectivity as having multiple interpretations 
construed to include notions of fairness, mechanical objectivity, and 
non-subjectivity. [1] 
! 
Latour’s (2000) critique goes even further suggesting that “objectivity 
does not refer to a special quality of the mind . . . but to the 
presence of objects which have been rendered ‘able’ to object to 
what is told about them” [2]. 
The discourse of scientific objectivity and bias has a long debated history in varying definitions in multiple disciplines. Vocal critiques of objectivity and bias in social science has placed it in a contentious position - challenging the need for objectivity and implicit biases
So again, I turn back to this cycle. Unique about what Web Scientists may offer is this integrated/multi-disciplinary approach. However, with this integration, is the inheritance of the same critiques of the disciplines that feed/influence the study.
Examples of bias 
“Passive” data collection methods in digital social science research; 
considered by some to be more “objective” - a more “natural” method. 
! 
“. .. [that] Facebook ‘big’ data is made by users unaware 
of or unconcerned about social science researchers 
doesn’t change the fact it is made through and around a 
structure engineers have coded.” 
Jurgenson, N (2014). “Short Comment on Facebook methodology ‘more natural’”. The Society 
Pages. website. http://thesocietypages.org/cyborgology/2014/06/09/short-comment-on-facebook-as- 
methodologically-more-natural/ 
Current examples of critiques of even bias in technical execution - algorithms ! & bias; Twitter studies P!articularly apparent on the sociology level; look at work by Kate Crawford, Nathan Jurgenson, danah boyd. Kate Crawford’s example of Tweets generated during Hurricane Sandy - biased as it did not present the whole pictures; the greatest tweets came from Manhattan, while few tweets came from areas like Breezy Point, Coney Island and Rockaway - “signal problem”: data are assumed to accurately reflect the social 
world, but there are significant gaps, with little or no signal coming from particular communities < http://blogs.hbr.org/2013/04/the-hidden-biases-in-big-data/> !I!n reaction to Facebook’s sociology pre-conference ahead of the American Sociological Association; wherein the claim is that research on such a platform is more “natural” - Methodological Issues: 
1) Inadequate attention to implicit and explicit structural biases of the platform(s); most frequently used to generate datasets -
Examples of bias 
Twitter as the “model organism” for multiple research communities 
[1] 
• Due to: data availability, tools availability, simple & clean data 
structure 
• Biased and influenced ! 
by message length, rapid turnover, public 
nature, directed graph interaction 
• self-selection bias, signal problems, etc. 
Twitter used as a means for population-level research versus selected 
individuals [2] 
[1] Tufekci, Z. (2013). Big Data: Pitfalls, Methods and Concepts for an Emergent Field. SSRN 
(March 2013). http://bit.ly/1jsN0u5! 
[2] Rivers, C. M., & Lewis, B. L. (2014). Ethical research standards in a world of big data. 
F1000Research, 3. http://bit.ly/1i2eyLV 
Noted by Zeynep Tufecki (Princeton) - !- 
Twitter has emerged as a “model organism” (one selected for intensive examination by the research community) - due to data availability, tools availability / popularity etc; simple and clean data structure 
- However, not all model organisms are representative of their taxa 
- Influenced by message length, rapid turnover, public nature, and a directed graph of social network interaction (where one can follow without consent). 
- Hashtag usage; is a self-selection bias & multiple embedded layers of culture and meaning that are assumed !- 
Under non-digital circumstances, IRB/ethical guidelines suggest that collection information from a public space where people could “reasonably expect to be observed by strangers” is considered appropriate even without informed consent. —- it could be reasoned then that Tweets are texts published for the 
purpose of sharing with others/public (question: Should one still have a reasonable expectation of privacy?) 
! - It would be unethical for a researcher to follow one specific shopper around the mall and gather data exclusively without his/her consent; however if the observation is done in aggregate - then it is acceptable; what is this boundary for online?
Rally Research Example 
Fieldwork: November 2013 in Washington D.C. 
Exploratory observational study on rally/protest behavior during last year’s StopWatching.US rally. !- 
i!ndividual behavior and motivation; identification of authority, power and governance structures; and consideration of technology’s involvement as a propagator and facilitator of information flow. “ - Cybercrime” in this instance was defined not as an action of a nation-state unto another nation-state, but rather a single agent’s action onto a nation-state, a definition motivated by the U.S. government’s same use of the term in identifying Edward Snowden’s act as a cybercrime.
Reflexivity 
Practice of reflexivity 
Explicit Bias 
Explicit biases such as the 
construction of the initial interview 
questions were first examined. 
These questions focused on 
gathering information related to 
individual motivation, modes of 
information propagation, levels 
topic comprehension, etc 
Implicit Bias 
Implicit biases such as 
organizational affixation; self-selection 
bias. 
! 
For this example, the researcher 
was affiliated with one of the rally 
organizing groups and had 
access to non-public information. 
O!ne practice: Explicit Bias !Implicit Bias !H 
ow to capture/incorporate/express these biases for later research?
Open Questions/Discussion 
What ethical standards will the WS community adopt 
when exploring online platforms for insight into human 
behavior? 
How do we identify and negotiate the intersections 
between more descriptive, context-dependent (qualitative 
data) with the stand-alone graph analysis or quantitative 
data? 
How can we identify, express, capture and share both 
implicit and explicit biases in our research? 
Proponent of mixed-methods 
Paper was meant to provoke some additional thought; questions that arise include:
Questions? 
! 
Contact: glorim@rpi.edu 
or /@gloriakt 
! 
6

More Related Content

What's hot

Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Agnis Stibe
 
Sorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum VitaeSorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum Vitae
Sorin Adam Matei
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Digital Methods Initiative
 
Internet Research Ethics and IRBs
Internet Research Ethics and IRBsInternet Research Ethics and IRBs
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
Ansgar Koene
 
Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Post-social methods? Issues in live research, by Noortje Marres and Esther We...Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Digital Methods Initiative
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social media
Farida Vis
 
Challenges of researching social media
Challenges of researching social mediaChallenges of researching social media
Challenges of researching social media
Ashley Shaw
 
Asia Triple Helix Society Summer Seminar/Conference Proceedings
Asia Triple Helix Society Summer Seminar/Conference ProceedingsAsia Triple Helix Society Summer Seminar/Conference Proceedings
Asia Triple Helix Society Summer Seminar/Conference ProceedingsHan Woo PARK
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
journal ijrtem
 
Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...
Paul Reilly
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
Liliana Bounegru
 
Who creates trends in online social media
Who creates trends in online social mediaWho creates trends in online social media
Who creates trends in online social mediaAmir Razmjou
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
Charleston Conference
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
Ka_Kinder
 
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Julius Reimer
 
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
Han Woo PARK
 

What's hot (20)

Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
 
Sorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum VitaeSorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum Vitae
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
 
Internet Research Ethics and IRBs
Internet Research Ethics and IRBsInternet Research Ethics and IRBs
Internet Research Ethics and IRBs
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Post-social methods? Issues in live research, by Noortje Marres and Esther We...Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Post-social methods? Issues in live research, by Noortje Marres and Esther We...
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social media
 
Challenges of researching social media
Challenges of researching social mediaChallenges of researching social media
Challenges of researching social media
 
Asia Triple Helix Society Summer Seminar/Conference Proceedings
Asia Triple Helix Society Summer Seminar/Conference ProceedingsAsia Triple Helix Society Summer Seminar/Conference Proceedings
Asia Triple Helix Society Summer Seminar/Conference Proceedings
 
ELPUB 2010
ELPUB 2010ELPUB 2010
ELPUB 2010
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
 
Ica cs spanelv2
Ica cs spanelv2Ica cs spanelv2
Ica cs spanelv2
 
Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...Peace on Facebook? Problematising social media as spaces for intergroup conta...
Peace on Facebook? Problematising social media as spaces for intergroup conta...
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
 
Who creates trends in online social media
Who creates trends in online social mediaWho creates trends in online social media
Who creates trends in online social media
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...
 
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
빅데이터 시대의 미디어&커뮤니케이션 교육과 연구
 

Similar to Studying Cybercrime: Raising Awareness of Objectivity & Bias

Platforms and Analytical Gestures
Platforms and Analytical GesturesPlatforms and Analytical Gestures
Platforms and Analytical Gestures
Bernhard Rieder
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
The Higher Education Academy
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
University of Southern California
 
Objectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative ConnotationsObjectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative Connotations
Beth Johnson
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
Josh Cowls
 
Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)
Han Woo PARK
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)
Han Woo PARK
 
Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing
Domino Data Lab
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
Kandy Woodfield
 
Mapping Movements: Social movement research and big data: critiques and alter...
Mapping Movements: Social movement research and big data: critiques and alter...Mapping Movements: Social movement research and big data: critiques and alter...
Mapping Movements: Social movement research and big data: critiques and alter...
Tim Highfield
 
Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...
Sociology@Essex
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
Stefanie Panke
 
Digital literacy &amp; reserach ethics
Digital literacy &amp; reserach ethicsDigital literacy &amp; reserach ethics
Digital literacy &amp; reserach ethics
Djamel Eddine Benchaib
 
Research Proposal Writing
Research Proposal Writing Research Proposal Writing
Research Proposal Writing
Mark Raygan Garcia
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
Farida Vis
 
Filter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speechFilter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speech
Sabina Cisek
 
Unit 1 cape sociology
Unit 1 cape sociologyUnit 1 cape sociology
Unit 1 cape sociology
Andreen18
 
Qualitative research on the internet: highlights
Qualitative research on the internet: highlightsQualitative research on the internet: highlights
Qualitative research on the internet: highlights
Katrina Pritchard
 
Ralph schroeder and eric meyer
Ralph schroeder and eric meyerRalph schroeder and eric meyer
Ralph schroeder and eric meyeroiisdp
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"summersocialwebshop
 

Similar to Studying Cybercrime: Raising Awareness of Objectivity & Bias (20)

Platforms and Analytical Gestures
Platforms and Analytical GesturesPlatforms and Analytical Gestures
Platforms and Analytical Gestures
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Objectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative ConnotationsObjectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative Connotations
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)
 
Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Mapping Movements: Social movement research and big data: critiques and alter...
Mapping Movements: Social movement research and big data: critiques and alter...Mapping Movements: Social movement research and big data: critiques and alter...
Mapping Movements: Social movement research and big data: critiques and alter...
 
Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Digital literacy &amp; reserach ethics
Digital literacy &amp; reserach ethicsDigital literacy &amp; reserach ethics
Digital literacy &amp; reserach ethics
 
Research Proposal Writing
Research Proposal Writing Research Proposal Writing
Research Proposal Writing
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
Filter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speechFilter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speech
 
Unit 1 cape sociology
Unit 1 cape sociologyUnit 1 cape sociology
Unit 1 cape sociology
 
Qualitative research on the internet: highlights
Qualitative research on the internet: highlightsQualitative research on the internet: highlights
Qualitative research on the internet: highlights
 
Ralph schroeder and eric meyer
Ralph schroeder and eric meyerRalph schroeder and eric meyer
Ralph schroeder and eric meyer
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"
 

More from gloriakt

A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
gloriakt
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
gloriakt
 
Big Data: A Survey of Technical and Sociotechnical Concepts
Big Data: A Survey of Technical and Sociotechnical ConceptsBig Data: A Survey of Technical and Sociotechnical Concepts
Big Data: A Survey of Technical and Sociotechnical Concepts
gloriakt
 
Building A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orgBuilding A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.org
gloriakt
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
gloriakt
 
Performativity of Data
Performativity of Data Performativity of Data
Performativity of Data
gloriakt
 
Multiple Truths of the Semantic Web - Web Science 2013
Multiple Truths of the Semantic Web - Web Science 2013Multiple Truths of the Semantic Web - Web Science 2013
Multiple Truths of the Semantic Web - Web Science 2013
gloriakt
 
WOW13_RPITWC_Web Observatories
WOW13_RPITWC_Web ObservatoriesWOW13_RPITWC_Web Observatories
WOW13_RPITWC_Web Observatories
gloriakt
 

More from gloriakt (8)

A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Big Data: A Survey of Technical and Sociotechnical Concepts
Big Data: A Survey of Technical and Sociotechnical ConceptsBig Data: A Survey of Technical and Sociotechnical Concepts
Big Data: A Survey of Technical and Sociotechnical Concepts
 
Building A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orgBuilding A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.org
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
Performativity of Data
Performativity of Data Performativity of Data
Performativity of Data
 
Multiple Truths of the Semantic Web - Web Science 2013
Multiple Truths of the Semantic Web - Web Science 2013Multiple Truths of the Semantic Web - Web Science 2013
Multiple Truths of the Semantic Web - Web Science 2013
 
WOW13_RPITWC_Web Observatories
WOW13_RPITWC_Web ObservatoriesWOW13_RPITWC_Web Observatories
WOW13_RPITWC_Web Observatories
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Studying Cybercrime: Raising Awareness of Objectivity & Bias

  • 1. Studying Cybercrime: Raising Questions About Objectivity & Bias Presented by: Kristine Gloria The Tetherless World Constellation Rensselaer Polytechnic Institute, Troy, NY ! With thanks to co-author John S. Erickson and the extended RPI Tetherless World Team
  • 2. The Process of Web Science Berners-Lee, T. (2007) W3C Keynote. http://www.w3.org/2007/Talks/0509-www-keynote-tbl/#(10) Via the workshop call: how can we study the phenomena of cybercrime & cyberwarfare that may offer a different perspective of what other disciplines already offer • Begin with the cycle - where in the cycle does it make sense to start? • Moving away from just one side of the cycle
  • 3. How may a Web Scientist explore the topic of cybercrime and cyberwarfare by offering an integrated study of both the social and technical aspects of the phenomena?
  • 4. Agenda ! 6 I. Objectivity & Bias II. Motivation and example III. Open questions & future discussion
  • 5. Objectivity & Bias Porter (1996) traces objectivity as having multiple interpretations construed to include notions of fairness, mechanical objectivity, and non-subjectivity. [1] ! Latour’s (2000) critique goes even further suggesting that “objectivity does not refer to a special quality of the mind . . . but to the presence of objects which have been rendered ‘able’ to object to what is told about them” [2]. The discourse of scientific objectivity and bias has a long debated history in varying definitions in multiple disciplines. Vocal critiques of objectivity and bias in social science has placed it in a contentious position - challenging the need for objectivity and implicit biases
  • 6. So again, I turn back to this cycle. Unique about what Web Scientists may offer is this integrated/multi-disciplinary approach. However, with this integration, is the inheritance of the same critiques of the disciplines that feed/influence the study.
  • 7. Examples of bias “Passive” data collection methods in digital social science research; considered by some to be more “objective” - a more “natural” method. ! “. .. [that] Facebook ‘big’ data is made by users unaware of or unconcerned about social science researchers doesn’t change the fact it is made through and around a structure engineers have coded.” Jurgenson, N (2014). “Short Comment on Facebook methodology ‘more natural’”. The Society Pages. website. http://thesocietypages.org/cyborgology/2014/06/09/short-comment-on-facebook-as- methodologically-more-natural/ Current examples of critiques of even bias in technical execution - algorithms ! & bias; Twitter studies P!articularly apparent on the sociology level; look at work by Kate Crawford, Nathan Jurgenson, danah boyd. Kate Crawford’s example of Tweets generated during Hurricane Sandy - biased as it did not present the whole pictures; the greatest tweets came from Manhattan, while few tweets came from areas like Breezy Point, Coney Island and Rockaway - “signal problem”: data are assumed to accurately reflect the social world, but there are significant gaps, with little or no signal coming from particular communities < http://blogs.hbr.org/2013/04/the-hidden-biases-in-big-data/> !I!n reaction to Facebook’s sociology pre-conference ahead of the American Sociological Association; wherein the claim is that research on such a platform is more “natural” - Methodological Issues: 1) Inadequate attention to implicit and explicit structural biases of the platform(s); most frequently used to generate datasets -
  • 8. Examples of bias Twitter as the “model organism” for multiple research communities [1] • Due to: data availability, tools availability, simple & clean data structure • Biased and influenced ! by message length, rapid turnover, public nature, directed graph interaction • self-selection bias, signal problems, etc. Twitter used as a means for population-level research versus selected individuals [2] [1] Tufekci, Z. (2013). Big Data: Pitfalls, Methods and Concepts for an Emergent Field. SSRN (March 2013). http://bit.ly/1jsN0u5! [2] Rivers, C. M., & Lewis, B. L. (2014). Ethical research standards in a world of big data. F1000Research, 3. http://bit.ly/1i2eyLV Noted by Zeynep Tufecki (Princeton) - !- Twitter has emerged as a “model organism” (one selected for intensive examination by the research community) - due to data availability, tools availability / popularity etc; simple and clean data structure - However, not all model organisms are representative of their taxa - Influenced by message length, rapid turnover, public nature, and a directed graph of social network interaction (where one can follow without consent). - Hashtag usage; is a self-selection bias & multiple embedded layers of culture and meaning that are assumed !- Under non-digital circumstances, IRB/ethical guidelines suggest that collection information from a public space where people could “reasonably expect to be observed by strangers” is considered appropriate even without informed consent. —- it could be reasoned then that Tweets are texts published for the purpose of sharing with others/public (question: Should one still have a reasonable expectation of privacy?) ! - It would be unethical for a researcher to follow one specific shopper around the mall and gather data exclusively without his/her consent; however if the observation is done in aggregate - then it is acceptable; what is this boundary for online?
  • 9. Rally Research Example Fieldwork: November 2013 in Washington D.C. Exploratory observational study on rally/protest behavior during last year’s StopWatching.US rally. !- i!ndividual behavior and motivation; identification of authority, power and governance structures; and consideration of technology’s involvement as a propagator and facilitator of information flow. “ - Cybercrime” in this instance was defined not as an action of a nation-state unto another nation-state, but rather a single agent’s action onto a nation-state, a definition motivated by the U.S. government’s same use of the term in identifying Edward Snowden’s act as a cybercrime.
  • 10. Reflexivity Practice of reflexivity Explicit Bias Explicit biases such as the construction of the initial interview questions were first examined. These questions focused on gathering information related to individual motivation, modes of information propagation, levels topic comprehension, etc Implicit Bias Implicit biases such as organizational affixation; self-selection bias. ! For this example, the researcher was affiliated with one of the rally organizing groups and had access to non-public information. O!ne practice: Explicit Bias !Implicit Bias !H ow to capture/incorporate/express these biases for later research?
  • 11. Open Questions/Discussion What ethical standards will the WS community adopt when exploring online platforms for insight into human behavior? How do we identify and negotiate the intersections between more descriptive, context-dependent (qualitative data) with the stand-alone graph analysis or quantitative data? How can we identify, express, capture and share both implicit and explicit biases in our research? Proponent of mixed-methods Paper was meant to provoke some additional thought; questions that arise include:
  • 12. Questions? ! Contact: glorim@rpi.edu or /@gloriakt ! 6