SlideShare a Scribd company logo
1 of 15
The Credibility of Digital Identity Information on the Social Web: A User Study Matthew Rowe Organisations, Information and Knowledge Group University of Sheffield
Outline Problem:  Increased reliance on digital identity information Motivation:  Need for assessing the credibility of digital identity information Digital Identity The tiers of identity information Comparing Digital and Real-World Identities User study of Social Web users Findings from the Study Conclusions
Problem The World Wide Web has evolved from a Web of anonymity into an accountable Web Users are able to interact online with Web platforms Publish their thoughts and musings on blogging platforms such as LiveJournal Upload videos onto Youtube Share photos on Flickr Chat with friends on MySpace All of the above allow users to construct bespoke online personas So called “Digital Identities” Shaping how they wish to be perceived by others in an online environment
Motivation Digital identity information from Social Web platforms is used by a range of 3rd party applications and services: Dopplr uses social network information from user profiles to share travel arrangements and planned trips Google’s Social Search uses identity information to affect search listings Identity management services have begun using digital identity information Social Web platforms to support automated identity disambiguation techniques Employers use Social Web platforms to perform lateral surveillance of potential and current employees The increased reliance on digital identity information from Social Web platforms requires an assessment to be made of the credibility of this information To what extent is real identity information mirrored in a digital space?
Digital Identity The Oxford dictionary defines identity as: “the fact of being who or what a person is” and… “the characteristics of defining this” A person’s identity is comprised of a set of attributes which makes them unique Digital Identity reflects this, however in an online space the these attributes can be customised and tailored by the user The functionalities and feature sets provided by Social Web platforms facilitate this alteration Users can construct profiles containing their biographical information (name, address, email) along with their social network information
Digital Identity Digital Identity can be divided into 3 tiers: My Identity: persistent identity information such as name, date of birth and genealogical relations Shared Identity: information which is susceptible to change such as social network information Abstracted Identity: identity information derived from groupings and demographics (Ploderer et al, 2008) states that self-promotion motivates web users to create a profile (Lampe et al, 2006) found Social Web users to search for and interact with those people which they knew offline The social network which a web user maintains is a powerful tool in establishing a unique identification of the person This is used by identity disambiguation techniques to confirm person references on the Web
Comparing Digital and Real-World Identities Social network information from the shared identity tier provides a means of quantifying the similarity between digital and real-world identities: To what extent is real identity information mirrored in a digital space? To explore this question a user study was conducted using the Social Web platform Facebook Given that this is the most popular Social Web platform in the UK 22 million users in the UK http://www.clickymedia.co.uk/2009/10/uk-facebook-user-statistics-october-2009/ 50 participants were gathered from the University of Sheffield 25 male and 25 female Age range of 18-45 The experiment was conducted in November 2008
Comparing Digital and Real-World Identities The user study consisted of 3 stages: Each participant listed their real-world social network Used a web page form with 20 rows, one for each person of the network, containing their name and the relationship type More rows could be added if needed Contains strong-tied relationships (Donath & Boyd, 2004) Each participant’s digital social network was extracted from Facebook Using an application designed for this study Also analysed the behaviour of the the participant: who they appear in photos with and who they share messages with Each participant compared his/her real-world and digital social network Selected participants which appeared in both networks
Comparing Digital and Real-World Identities To measure the extent to which digital identity information mirrors real-world identity information the following evaluation measures were used: Relevance Adapted from the information retrieval metric: precision Measures the ratio of strong-tied to weak-tied relationships in the digital social network Coverage Adapted from the information retrieval metric: recall The proportion of the real-world social network which appears in the digital social network
Comparing Digital and Real-World Identities Relevance Average relevance measure of 0.23, indicating that 23% of a digital social network contains strong-tied relationships Coverage Ranges between 0.5 and 1, with an average coverage of 0.77 This indicates that, on average, 77% of a participant’s real-world social network appears online Different from findings by (Subrahmanyam et al, 2008) which found only 49% for coverage (they define it as overlap) Possibly due to differing dates when the studies were conducted and the differing countries
Comparing Digital and Real-World Identities
Comparing Digital and Real-World Identities The covered portion of the real-world social network in the digital network was also analysed, and showed the following: Majority of relationships were with friends (62%) 24% were with family 14% were with coworkers For the different relationship types in the real-world social network 89% of friends were replicated online 73% of family were replicated online 68% of coworkers were replicated online The largest age group in the social network that was covered online was <21 Indicative of the sample used by the study
Comparing Digital and Real-World Identities Behaviour of each participant was analysed Assessing who they appeared in images with and interacted with on the platform	 Results demonstrate a tendency to interact with only a few people frequently And a large number of people rarely The graph forms a power law curve Denoted as the Social Longtail (>15) The longtail contains 92% of strong-tied relationships which appeared in the real-world network listed by participants Suggests that offline interactions and communications are continued online Demonstrated by the number of messages sent and photos in which both people appear
Conclusions Credibility of digital identity information is important to many application which rely on such information Findings from the study quantify the significant extent to which web users replicate their real-world identities in an online space Characterised by the large coverage of real-world social networks on an example Social Web platform An insight is provided into the credibility of digital identity information found on the Social Web Behavioural trends demonstrate the continuation of interaction offline in a digital environment The Social Longtail is mainly comprised of strong-tied relationships found offline, driven by frequent interactions The results also provide findings in contrast to (Subrahmanyam et al, 2008) Due to the different domains in which the studies were conducted
Twitter: @mattroweshow Web: http://www.dcs.shef.ac.uk/~mrowe Email: m.rowe@dcs.shef.ac.uk Questions? (Donath & Boyd, 2004) - J. Donath and D. Boyd. Public displays of connection. BT Technology Journal, 22(4):71–82, October 2004. (Lampe et al, 2006) - C. Lampe, N. Ellison, and C. Steinfield. A face(book) in the crowd: social searching vs. social browsing. In CSCW ’06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, pages 167–170, New York, NY, USA, 2006. ACM. (Ploderer et al, 2008) - B. Ploderer, S. Howard, and P. Thomas. Being online, living offline: the influence of social ties over the appropriation of social network sites. In CSCW ’08: Proceedings of the ACM 2008 conference on Computer supported cooperative work, pages 333–342, New York, NY, USA, 2008. ACM. (Subrahmanyam et al, 2008) - K. Subrahmanyam, S. Reich, N. Waechter, and G. Espinoza. Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology, 29(6):420–433, November 2008.

More Related Content

What's hot

Social Media Background Searching
Social Media Background SearchingSocial Media Background Searching
Social Media Background SearchingAylin Aron (Ahmet)
 
Introduction To Social Network Analysis In Digital Age (11 June2009)
Introduction To Social Network Analysis In Digital Age (11 June2009)Introduction To Social Network Analysis In Digital Age (11 June2009)
Introduction To Social Network Analysis In Digital Age (11 June2009)Han Woo PARK
 
Effects of Social Networking in Academic Literacy
Effects of Social Networking in Academic LiteracyEffects of Social Networking in Academic Literacy
Effects of Social Networking in Academic LiteracySteve Chilton
 
Prof. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network AnalysisProf. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network AnalysisHendrik Speck
 
Characterizing Online Participation in Civic Technologies - PhD
Characterizing Online Participation in Civic Technologies - PhDCharacterizing Online Participation in Civic Technologies - PhD
Characterizing Online Participation in Civic Technologies - PhDPablo Aragón
 
Published Paper
Published PaperPublished Paper
Published PaperFaeza Noor
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis Jari Jussila
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...DERIGalway
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaDavid Thompson
 
Defense
DefenseDefense
Defenseac2182
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring processAbumere Imoukhuede
 
Stakeholder Engagement and Public Information Through Social Media: A Study o...
Stakeholder Engagement and Public Information Through Social Media: A Study o...Stakeholder Engagement and Public Information Through Social Media: A Study o...
Stakeholder Engagement and Public Information Through Social Media: A Study o...Marco Bellucci
 

What's hot (20)

Social Media Background Searching
Social Media Background SearchingSocial Media Background Searching
Social Media Background Searching
 
Introduction To Social Network Analysis In Digital Age (11 June2009)
Introduction To Social Network Analysis In Digital Age (11 June2009)Introduction To Social Network Analysis In Digital Age (11 June2009)
Introduction To Social Network Analysis In Digital Age (11 June2009)
 
Effects of Social Networking in Academic Literacy
Effects of Social Networking in Academic LiteracyEffects of Social Networking in Academic Literacy
Effects of Social Networking in Academic Literacy
 
Exploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social NetworksExploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social Networks
 
Prof. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network AnalysisProf. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network Analysis
 
Characterizing Online Participation in Civic Technologies - PhD
Characterizing Online Participation in Civic Technologies - PhDCharacterizing Online Participation in Civic Technologies - PhD
Characterizing Online Participation in Civic Technologies - PhD
 
Published Paper
Published PaperPublished Paper
Published Paper
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Studying Social Science Using E Tools
Studying Social Science Using E ToolsStudying Social Science Using E Tools
Studying Social Science Using E Tools
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
 
Online communities
Online communitiesOnline communities
Online communities
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
 
Defense
DefenseDefense
Defense
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring process
 
Stakeholder Engagement and Public Information Through Social Media: A Study o...
Stakeholder Engagement and Public Information Through Social Media: A Study o...Stakeholder Engagement and Public Information Through Social Media: A Study o...
Stakeholder Engagement and Public Information Through Social Media: A Study o...
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 

Viewers also liked

User Interface Evaluation from the ROLE user interface meetings.
User Interface Evaluation from the ROLE user interface meetings.User Interface Evaluation from the ROLE user interface meetings.
User Interface Evaluation from the ROLE user interface meetings.Sten Govaerts
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsprjpublications
 
HCI 2015 (7/10) HCI Engineering. UI Evaluation. Models
HCI 2015 (7/10) HCI Engineering. UI Evaluation. ModelsHCI 2015 (7/10) HCI Engineering. UI Evaluation. Models
HCI 2015 (7/10) HCI Engineering. UI Evaluation. ModelsSabin Buraga
 
Informal Guerilla User Study
Informal Guerilla User StudyInformal Guerilla User Study
Informal Guerilla User StudyNilo Sarraf
 
Design That Matters: Pelican Pulse Oximeter User Experience Study
Design That Matters: Pelican Pulse Oximeter User Experience StudyDesign That Matters: Pelican Pulse Oximeter User Experience Study
Design That Matters: Pelican Pulse Oximeter User Experience StudyVictoria Young
 

Viewers also liked (6)

Use and user study
Use and user study Use and user study
Use and user study
 
User Interface Evaluation from the ROLE user interface meetings.
User Interface Evaluation from the ROLE user interface meetings.User Interface Evaluation from the ROLE user interface meetings.
User Interface Evaluation from the ROLE user interface meetings.
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspects
 
HCI 2015 (7/10) HCI Engineering. UI Evaluation. Models
HCI 2015 (7/10) HCI Engineering. UI Evaluation. ModelsHCI 2015 (7/10) HCI Engineering. UI Evaluation. Models
HCI 2015 (7/10) HCI Engineering. UI Evaluation. Models
 
Informal Guerilla User Study
Informal Guerilla User StudyInformal Guerilla User Study
Informal Guerilla User Study
 
Design That Matters: Pelican Pulse Oximeter User Experience Study
Design That Matters: Pelican Pulse Oximeter User Experience StudyDesign That Matters: Pelican Pulse Oximeter User Experience Study
Design That Matters: Pelican Pulse Oximeter User Experience Study
 

Similar to The Credibility of Digital Identity Information on the Social Web: A User Study

Social Media Networking Site Usage Demographics Stats
Social Media Networking Site Usage Demographics StatsSocial Media Networking Site Usage Demographics Stats
Social Media Networking Site Usage Demographics Statsrishibajaj8
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Interlinking semantics, web2.0, and the real-world
Interlinking semantics, web2.0, and the real-worldInterlinking semantics, web2.0, and the real-world
Interlinking semantics, web2.0, and the real-worldThe Open University
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, WikisSocial Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, WikisShelly D. Farnham, Ph.D.
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchDaqing He
 
Be presentation social network.61,65,70
Be presentation   social network.61,65,70Be presentation   social network.61,65,70
Be presentation social network.61,65,70domsr
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Final social network_analysis
Final social network_analysisFinal social network_analysis
Final social network_analysisTarvinder Singh
 
Social Media @Home and @Work: Understanding Who Is Using and Why
Social Media @Home and @Work:Understanding Who Is Using and WhySocial Media @Home and @Work:Understanding Who Is Using and Why
Social Media @Home and @Work: Understanding Who Is Using and WhyCaroline Dangson
 
Analysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic studentsAnalysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic studentsJahangeer Qadiree
 
Privacy Management and the Social Web
Privacy Management and the Social Web Privacy Management and the Social Web
Privacy Management and the Social Web Jan Schmidt
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processPreeti Bhaskar
 
The use of social media in the recruitment process
The use of social media in the recruitment processThe use of social media in the recruitment process
The use of social media in the recruitment processBhagyashree Zope
 

Similar to The Credibility of Digital Identity Information on the Social Web: A User Study (20)

Social Media Networking Site Usage Demographics Stats
Social Media Networking Site Usage Demographics StatsSocial Media Networking Site Usage Demographics Stats
Social Media Networking Site Usage Demographics Stats
 
Gibbs 2011
Gibbs 2011Gibbs 2011
Gibbs 2011
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Interlinking semantics, web2.0, and the real-world
Interlinking semantics, web2.0, and the real-worldInterlinking semantics, web2.0, and the real-world
Interlinking semantics, web2.0, and the real-world
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, WikisSocial Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People Search
 
Facebook vs google+
Facebook vs google+Facebook vs google+
Facebook vs google+
 
Be presentation social network.61,65,70
Be presentation   social network.61,65,70Be presentation   social network.61,65,70
Be presentation social network.61,65,70
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Final social network_analysis
Final social network_analysisFinal social network_analysis
Final social network_analysis
 
Social Media @Home and @Work: Understanding Who Is Using and Why
Social Media @Home and @Work:Understanding Who Is Using and WhySocial Media @Home and @Work:Understanding Who Is Using and Why
Social Media @Home and @Work: Understanding Who Is Using and Why
 
204
204204
204
 
Analysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic studentsAnalysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic students
 
Privacy Management and the Social Web
Privacy Management and the Social Web Privacy Management and the Social Web
Privacy Management and the Social Web
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-process
 
The use of social media in the recruitment process
The use of social media in the recruitment processThe use of social media in the recruitment process
The use of social media in the recruitment process
 

More from Matthew Rowe

Social Computing Research with Apache Spark
Social Computing Research with Apache SparkSocial Computing Research with Apache Spark
Social Computing Research with Apache SparkMatthew Rowe
 
Predicting Online Community Churners using Gaussian Sequences
Predicting Online Community Churners using Gaussian SequencesPredicting Online Community Churners using Gaussian Sequences
Predicting Online Community Churners using Gaussian SequencesMatthew Rowe
 
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...Matthew Rowe
 
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting RatingsSemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings Matthew Rowe
 
The Semantic Evolution of Online Communities
The Semantic Evolution of Online CommunitiesThe Semantic Evolution of Online Communities
The Semantic Evolution of Online CommunitiesMatthew Rowe
 
From Mining to Understanding: The Evolution of Social Web Users
From Mining to Understanding: The Evolution of Social Web UsersFrom Mining to Understanding: The Evolution of Social Web Users
From Mining to Understanding: The Evolution of Social Web UsersMatthew Rowe
 
Mining User Lifecycles from Online Community Platforms and their Application ...
Mining User Lifecycles from Online Community Platforms and their Application ...Mining User Lifecycles from Online Community Platforms and their Application ...
Mining User Lifecycles from Online Community Platforms and their Application ...Matthew Rowe
 
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...Matthew Rowe
 
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...Matthew Rowe
 
Identity: Physical, Cyber, Future
Identity: Physical, Cyber, FutureIdentity: Physical, Cyber, Future
Identity: Physical, Cyber, FutureMatthew Rowe
 
Measuring the Topical Specificity of Online Communities
Measuring the Topical Specificity of Online CommunitiesMeasuring the Topical Specificity of Online Communities
Measuring the Topical Specificity of Online CommunitiesMatthew Rowe
 
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...Matthew Rowe
 
Attention Economics in Social Web Systems
Attention Economics in Social Web SystemsAttention Economics in Social Web Systems
Attention Economics in Social Web SystemsMatthew Rowe
 
What makes communities tick? Community health analysis using role compositions
What makes communities tick? Community health analysis using role compositionsWhat makes communities tick? Community health analysis using role compositions
What makes communities tick? Community health analysis using role compositionsMatthew Rowe
 
Existing Research and Future Research Agenda
Existing Research and Future Research AgendaExisting Research and Future Research Agenda
Existing Research and Future Research AgendaMatthew Rowe
 
Tutorial: Social Semantics
Tutorial: Social SemanticsTutorial: Social Semantics
Tutorial: Social SemanticsMatthew Rowe
 
Modelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online CommunitiesModelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online CommunitiesMatthew Rowe
 
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsUsing Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsMatthew Rowe
 
Anticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community ForumsAnticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community ForumsMatthew Rowe
 
Semantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic DataSemantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic DataMatthew Rowe
 

More from Matthew Rowe (20)

Social Computing Research with Apache Spark
Social Computing Research with Apache SparkSocial Computing Research with Apache Spark
Social Computing Research with Apache Spark
 
Predicting Online Community Churners using Gaussian Sequences
Predicting Online Community Churners using Gaussian SequencesPredicting Online Community Churners using Gaussian Sequences
Predicting Online Community Churners using Gaussian Sequences
 
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
Transferring Semantic Categories with Vertex Kernels: Recommendations with Se...
 
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting RatingsSemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings
 
The Semantic Evolution of Online Communities
The Semantic Evolution of Online CommunitiesThe Semantic Evolution of Online Communities
The Semantic Evolution of Online Communities
 
From Mining to Understanding: The Evolution of Social Web Users
From Mining to Understanding: The Evolution of Social Web UsersFrom Mining to Understanding: The Evolution of Social Web Users
From Mining to Understanding: The Evolution of Social Web Users
 
Mining User Lifecycles from Online Community Platforms and their Application ...
Mining User Lifecycles from Online Community Platforms and their Application ...Mining User Lifecycles from Online Community Platforms and their Application ...
Mining User Lifecycles from Online Community Platforms and their Application ...
 
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...
 
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
Changing with Time: Modelling and Detecting User Lifecycle Periods in Online ...
 
Identity: Physical, Cyber, Future
Identity: Physical, Cyber, FutureIdentity: Physical, Cyber, Future
Identity: Physical, Cyber, Future
 
Measuring the Topical Specificity of Online Communities
Measuring the Topical Specificity of Online CommunitiesMeasuring the Topical Specificity of Online Communities
Measuring the Topical Specificity of Online Communities
 
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
Who will follow whom? Exploiting Semantics for Link Prediction in Attention-I...
 
Attention Economics in Social Web Systems
Attention Economics in Social Web SystemsAttention Economics in Social Web Systems
Attention Economics in Social Web Systems
 
What makes communities tick? Community health analysis using role compositions
What makes communities tick? Community health analysis using role compositionsWhat makes communities tick? Community health analysis using role compositions
What makes communities tick? Community health analysis using role compositions
 
Existing Research and Future Research Agenda
Existing Research and Future Research AgendaExisting Research and Future Research Agenda
Existing Research and Future Research Agenda
 
Tutorial: Social Semantics
Tutorial: Social SemanticsTutorial: Social Semantics
Tutorial: Social Semantics
 
Modelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online CommunitiesModelling and Analysis of User Behaviour in Online Communities
Modelling and Analysis of User Behaviour in Online Communities
 
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsUsing Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
 
Anticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community ForumsAnticipating Discussion Activity on Community Forums
Anticipating Discussion Activity on Community Forums
 
Semantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic DataSemantic Technologies: Representing Semantic Data
Semantic Technologies: Representing Semantic Data
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

The Credibility of Digital Identity Information on the Social Web: A User Study

  • 1. The Credibility of Digital Identity Information on the Social Web: A User Study Matthew Rowe Organisations, Information and Knowledge Group University of Sheffield
  • 2. Outline Problem: Increased reliance on digital identity information Motivation: Need for assessing the credibility of digital identity information Digital Identity The tiers of identity information Comparing Digital and Real-World Identities User study of Social Web users Findings from the Study Conclusions
  • 3. Problem The World Wide Web has evolved from a Web of anonymity into an accountable Web Users are able to interact online with Web platforms Publish their thoughts and musings on blogging platforms such as LiveJournal Upload videos onto Youtube Share photos on Flickr Chat with friends on MySpace All of the above allow users to construct bespoke online personas So called “Digital Identities” Shaping how they wish to be perceived by others in an online environment
  • 4. Motivation Digital identity information from Social Web platforms is used by a range of 3rd party applications and services: Dopplr uses social network information from user profiles to share travel arrangements and planned trips Google’s Social Search uses identity information to affect search listings Identity management services have begun using digital identity information Social Web platforms to support automated identity disambiguation techniques Employers use Social Web platforms to perform lateral surveillance of potential and current employees The increased reliance on digital identity information from Social Web platforms requires an assessment to be made of the credibility of this information To what extent is real identity information mirrored in a digital space?
  • 5. Digital Identity The Oxford dictionary defines identity as: “the fact of being who or what a person is” and… “the characteristics of defining this” A person’s identity is comprised of a set of attributes which makes them unique Digital Identity reflects this, however in an online space the these attributes can be customised and tailored by the user The functionalities and feature sets provided by Social Web platforms facilitate this alteration Users can construct profiles containing their biographical information (name, address, email) along with their social network information
  • 6. Digital Identity Digital Identity can be divided into 3 tiers: My Identity: persistent identity information such as name, date of birth and genealogical relations Shared Identity: information which is susceptible to change such as social network information Abstracted Identity: identity information derived from groupings and demographics (Ploderer et al, 2008) states that self-promotion motivates web users to create a profile (Lampe et al, 2006) found Social Web users to search for and interact with those people which they knew offline The social network which a web user maintains is a powerful tool in establishing a unique identification of the person This is used by identity disambiguation techniques to confirm person references on the Web
  • 7. Comparing Digital and Real-World Identities Social network information from the shared identity tier provides a means of quantifying the similarity between digital and real-world identities: To what extent is real identity information mirrored in a digital space? To explore this question a user study was conducted using the Social Web platform Facebook Given that this is the most popular Social Web platform in the UK 22 million users in the UK http://www.clickymedia.co.uk/2009/10/uk-facebook-user-statistics-october-2009/ 50 participants were gathered from the University of Sheffield 25 male and 25 female Age range of 18-45 The experiment was conducted in November 2008
  • 8. Comparing Digital and Real-World Identities The user study consisted of 3 stages: Each participant listed their real-world social network Used a web page form with 20 rows, one for each person of the network, containing their name and the relationship type More rows could be added if needed Contains strong-tied relationships (Donath & Boyd, 2004) Each participant’s digital social network was extracted from Facebook Using an application designed for this study Also analysed the behaviour of the the participant: who they appear in photos with and who they share messages with Each participant compared his/her real-world and digital social network Selected participants which appeared in both networks
  • 9. Comparing Digital and Real-World Identities To measure the extent to which digital identity information mirrors real-world identity information the following evaluation measures were used: Relevance Adapted from the information retrieval metric: precision Measures the ratio of strong-tied to weak-tied relationships in the digital social network Coverage Adapted from the information retrieval metric: recall The proportion of the real-world social network which appears in the digital social network
  • 10. Comparing Digital and Real-World Identities Relevance Average relevance measure of 0.23, indicating that 23% of a digital social network contains strong-tied relationships Coverage Ranges between 0.5 and 1, with an average coverage of 0.77 This indicates that, on average, 77% of a participant’s real-world social network appears online Different from findings by (Subrahmanyam et al, 2008) which found only 49% for coverage (they define it as overlap) Possibly due to differing dates when the studies were conducted and the differing countries
  • 11. Comparing Digital and Real-World Identities
  • 12. Comparing Digital and Real-World Identities The covered portion of the real-world social network in the digital network was also analysed, and showed the following: Majority of relationships were with friends (62%) 24% were with family 14% were with coworkers For the different relationship types in the real-world social network 89% of friends were replicated online 73% of family were replicated online 68% of coworkers were replicated online The largest age group in the social network that was covered online was <21 Indicative of the sample used by the study
  • 13. Comparing Digital and Real-World Identities Behaviour of each participant was analysed Assessing who they appeared in images with and interacted with on the platform Results demonstrate a tendency to interact with only a few people frequently And a large number of people rarely The graph forms a power law curve Denoted as the Social Longtail (>15) The longtail contains 92% of strong-tied relationships which appeared in the real-world network listed by participants Suggests that offline interactions and communications are continued online Demonstrated by the number of messages sent and photos in which both people appear
  • 14. Conclusions Credibility of digital identity information is important to many application which rely on such information Findings from the study quantify the significant extent to which web users replicate their real-world identities in an online space Characterised by the large coverage of real-world social networks on an example Social Web platform An insight is provided into the credibility of digital identity information found on the Social Web Behavioural trends demonstrate the continuation of interaction offline in a digital environment The Social Longtail is mainly comprised of strong-tied relationships found offline, driven by frequent interactions The results also provide findings in contrast to (Subrahmanyam et al, 2008) Due to the different domains in which the studies were conducted
  • 15. Twitter: @mattroweshow Web: http://www.dcs.shef.ac.uk/~mrowe Email: m.rowe@dcs.shef.ac.uk Questions? (Donath & Boyd, 2004) - J. Donath and D. Boyd. Public displays of connection. BT Technology Journal, 22(4):71–82, October 2004. (Lampe et al, 2006) - C. Lampe, N. Ellison, and C. Steinfield. A face(book) in the crowd: social searching vs. social browsing. In CSCW ’06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, pages 167–170, New York, NY, USA, 2006. ACM. (Ploderer et al, 2008) - B. Ploderer, S. Howard, and P. Thomas. Being online, living offline: the influence of social ties over the appropriation of social network sites. In CSCW ’08: Proceedings of the ACM 2008 conference on Computer supported cooperative work, pages 333–342, New York, NY, USA, 2008. ACM. (Subrahmanyam et al, 2008) - K. Subrahmanyam, S. Reich, N. Waechter, and G. Espinoza. Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology, 29(6):420–433, November 2008.