I gave my talk at Etech on Revenge of the User today. In typical danah-mode, i spoke a mile-a-minute and, thus, folks kept asking me if i had more material. Thus, i thought that i’d offer the crib of my talk on my blog. I’ve included it in the extended entry. Please note that it was a crib for me and probably has a lot of holes and missing bits. Feel free to add what i skipped in the comments.
WHO AM I
– technologist, social scientist
– 1 year interviewing people on uses of social network software; hundreds of informants
WHY GIVE THIS TALK? WHY HERE?
– everyone is interested in technical hacking
– social hacking isn’t that much different
– we scream about constraints on our technology, but we impose those on our social
– this is dumb. social hacking teaches us about our technology, the limits, the possibilities
THE POINT OF THIS TALK
Social theorists have constructed a body of literature around social networks, to understand how people construct, maintain and utilize their networks to meet daily needs.
Researchers have learned that these networks are a critical part of people’s daily lives. People use their networks to acquire support of all different kinds. They use the structure of their network to find jobs, loved ones, get and make meaning out of recommendations.
Enamored with the value of networks, people have worked to exploit the structure. Any MBA is told that she must build a network to be valuable in business.
Recently, we’ve seen a plethora of companies trying to do the same thing. For the sake of this talk, i’m going to refer to these services as YASNS short for “Yet Another Social Network Service”, an umbrella term coined by Clay Shirky to reference the many services that have tried to explicitly and implicitly present people’s social networks. Most specifically, this term refers to sites like Friendster, Tribe.net, Ryze, LinkedIn, orkut, etc. Of course, there are many services that also draw on social networks without specifically joining the fold, such as LiveJournal, blogrolls, etc. and others who are using social networks in a more explicit nature, such as Spoke and Visible Path. Although this latter group is interesting, little is known about how these will affect social behavior. Thus, i will primarily be addressing the increasingly popular YASNS sites that have gained popularity with disparate social groups.
Many of the YASNS systems concerned themselves with what social theory told us about one’s networks; they turned it into hype. Weak ties are key to getting jobs! The best dates are friends of friends!
Thus, sites were constructed to model people’s social networks so that users could more efficiently engage with their networks. If friends of friends are so valuable, why not make people aware of who each others’ friends are?
Yet, in building these systems, the creators made assumptions about both the networks and human behavior. This is where the trouble began. Creators had a set of assumptions about how their systems would be used. Needless to say, not all users agreed with, or even understood, the philosophies of the creators. As a result, users repurposed the tools available to support their own needs and desires. Thus, what the users did did not match up to the social theory expected by creators. In some cases, these new uses horrified the creators who actively attempted to construct boundaries of acceptable behavior, further aggravating the users.
WHY DOES THIS MATTER?
So, what went wrong? And why does this matter?
First, this matters because everyone seems fascinated by social networks. They aren’t going away. Many of you are building social software or software, involving social networks in some form or another. If we continue to build technology based on loose understandings of social theory, we will continue to be disappointed in the results. Thus, the last year of YASNS gives us a perfect opportunity to understand how design decisions affected user behavior and how user behavior affects any chance of having a business out of social networks.
In order to consider what went wrong and tease out the lessons from this, i’m going to do two different types of analysis. First, i’m going to consider the relationship between the technology and the social theory upon which it is built. Second, i’m going to break down how users interacted with these systems, why this didn’t look like the social theory and how attempts by sites to regulate the scope of acceptable behavior has only made the situation more problematic.
ON SOCIAL THEORY
When i generically talk about social theory, i’m referring to the large body of knowledge about human behavior that has been generated by psychologists, sociologists, anthropologists, philosophers, etc. This work is grounded in observing and testing human behavior, but it has not built a complete model of social life. This work is developed in a cultural and intellectual context. There are assumptions and gaps in every bit of this.
One of the biggest assumptions built into social theory concerns the architecture in which we interact. Much of this work is connected with ideas on face-to-face interactions and negotiating life in the context of a city, suburbia or a village. Everyone in this room knows that technology has changed something about this. We can feel it, even if we don’t understand it. Our social life has changed; the types of people we talk to are different; the ability to find people like us is visceral. There are critical differences in everyday social interaction for those of us who’ve gone digital. Even if we can’t articulate the differences, we can feel them.
In reflecting on Mitch Kapor’s argument that architecture is politics, Larry Lessig noted that code is law. In fleshing this out, Lessig equates code to architecture. This is a critical reflection. It allows us to think about how what we build structures the underlying elements to the ways people can interact. This realization doesn’t negate social theory, but it puts it into context. It means that rather than translating everything that we learned about social life into the digital, we must critically reflect what will and won’t work as new social structures are built. The core of people isn’t different, but how they interact might be.
Take spam as an example. There are real life spammers – people who try to sell us things at any moment. There are varying levels, from the street vendors to the marketers. Many of us have structured our everyday lives to avoid these people. We don’t go into that part of the city. We can block these people out. If we create a society where people have easier access to everyone’s attention, spammers are going to utilize this as much as we are! Complex ecosystems all have parasites and energy-sinks. Once your email system scales to a certain size, it will accumulate inefficiencies. We can damn them for existing, but we are simultaneously building tools that meet their needs just as much if not more than our own!
So, let’s ground this a bit and think about the theories being used by the YASNS phenomenon.
First, let’s discuss the argument of 6 degrees of separation. For anyone who didn’t know, this isn’t a term coined by Milgram. His research was called “Small Worlds.” It’s a term coined by a playwright. What Milgram did was question how many hops it would take to get from one person in Nebraska to a person in Massachusetts. For those who aren’t aware, he asked people in Nebraska to send a packet along to someone in Massachusetts. If they knew the target personally, they were asked to send the packet to the target. If they didn’t, they were asked to send the packet on to someone who might know the target. Each person was asked to continue passing on the packet until the target was reached. Thus, someone in Nebraska might send it on to their neighbor who used to live in Massachusetts, who would send it on to someone who lived in the appropriate town, etc.
He found that the average number of steps necessary was around 5.5. Thus, everyone professed that people are, on average, separated by 6 hops! From Milgram’s perspective, if we build a model of a network, the average person will be separated by 6 people!
There’s a crucial missing step in this logic. What Milgram asked people to do was GUESS who would be the likely next candidate in passing on the message. The person did not have a whole networks view. She did not KNOW who should be the next candidate based on shortest path. She only guessed. Without a whole networks view, we don’t actually know the average path length between two people. We only know the how long it took for a message to get through a string of guesses within the network.
Next, take the number 150. I’ve heard over and over again how the average person only knows 150 people. This is referring to research done by Dunbar. He was interested in understanding how many people humans could “groom.” In other words, how many people did a human keep in their social network at any one point in time. Dunbar was interested in how monkeys groomed each other to keep up their social network. What he found was that there was a similarity between monkey grooming and human gossip. Just as monkeys groomed to maintain their networks, humans gossiped to maintain theirs! He found that the MAXIMUM number of people that a person could keep up with socially at any given time, gossip maintenance, was 150. This doesn’t mean that people don’t have 150 people in their social network, but that they only keep tabs on 150 people max at any given point.
What about Granovetter’s “Strength of Weak Ties”? In his seminal work, Granovetter found that the majority of people found out about jobs through weak ties, not strong ones.
First, people have corrupted the definition of weak tie to equate it with friends of friends. This is not accurate, but it’s also not egregious. The idea is that with a strong tie, you are aware of all of their strong ties. What kind of best friend are you if you aren’t aware of your best friend’s other best friends? These people are not inherently your strong ties and, thus, they become weak ties in your world. You have a connection to them; that connection is because they are important in your friend’s life.
But there’s a problem here. Not everyone that you know is a strong tie. And not everyone that you know’s friends are weak ties. In the States, we have a totally different conception of the term Friend compared to the rest of the world. We call everyone that we’ve ever met our Friend. It’s socially appropriate! But this is not what the sociologists meant. As such, most of the people in our Rolodexes are weak ties, not strong ones. We do not have rich interpersonal connections with them.
Before you object, think who you would call if you were in an emotional crisis; think of who knows all about the ups and downs of your anxieties. There’s no doubt that some folks love to blog their woes to the world, but most of us only have a few people we would call and who we could guarantee would support us through our troubles. Those are strong ties.
Pulling back from tie strength, let’s also look at the logic of the argument. When Granovetter found that people found their jobs through weak ties, he did not find that all weak ties help us find our jobs. Furthermore, he did not say that our weak ties had the power necessary to get us those jobs, simply that they helped us find them.
There’s a reason for this. And this is the most overlooked issue in all of the YASNS phenomenon. Context.
Our relationships have a context to them, not just a strength. That context is crucial for many distributions of information, support and trust.
Consider a weak tie that you party with; he’s dating someone who runs a big tech company. Your connection to him is a weak tie; his connection to his boyfriend is a strong one. He hears that the tech company has an opening. As Granovetter acutely noted, when he hears that you’re looking for a job in that field, he’s likely to tell you about that job, even though he knows nothing of your expertise. Why? The favor of spreading information gives him power as a bridge.
But this does not mean that he’s going to risk his reputation with his strong tie over a weak tie. Say that you want the chief engineering position. He doesn’t know you in that context; he has no way to vouch for your worthiness. Thus, he’s taking a much bigger risk in hyping you to his boyfriend. Even if he lets his boyfriend know that some guy from the clubs wants the job, he’ll make it very clear that he doesn’t really know you, but will just offer that information just in case. He’ll do it in passing, to see if his ears perk up. If they don’t, he’ll let it pass.
Take the dating realm. Have you ever had a close friend set you up on a date? Now, have you ever had a weak tie set you up on a date? One of the things you will find is that when a weak tie sets you up on a date, you often have NOTHING in common with this person. Again, context. Or better yet, focus.
Focus is a researched concept in social networks. Scott Feld talks about the power of foci in understanding networks. You and your strong ties have things in common, the foci of the relationship. Often, the closer you are, the more you share in common. This is why you often have things in common with friends of friends. You and your friend have lots of overlapping things; she and her friend have lots of overlapping things; there’s a high probability that you and that person have some things in common. As Feld noticed, the more you have in common with someone, the more likely you are to be a strong tie, particularly when the things in common are rare.
But, pulling back, shared foci between friends of friends does NOT mean shared foci between a string of weak ties. Foci are not transitive and the less you have in common with someone, the lower the probability will be that you have something in common with someone they know. Take two hops down a weak tie chain and the probability is random.
TRANSLATING TO THE SITES
So, i’ve just thrown a bunch of social network theory at you. Let’s situate it in the YASNS phenomenon.
1) Friends on these sites are not close ties. In fact, they’re barely weak ties! I’ll explain why in a moment. Thus, anything that can be assumed about transitivity across ties is 100% lost. This only gets worse as we go down the chain. As one of my informants reminded me, why would i want to date my hairdresser’s brother’s drug dealer’s second-cousin?
2) Asking favors is fundamentally different than offering them. People gain by being bridges. Thus, to be able to tell you about a job gives me whuffie in our relationship. Feeling pressured to connect you to an open job makes me uncomfortable. In all of the networks described above, the bridge got to control the information flow. In Milgram’s “Small Worlds,” if you didn’t know that i knew the target person, you may not have tried to pass it on to me. If you don’t know that i am dating someone who has something that you want, you won’t try to pressure me into giving you access to it. Thus, i can choose when to reveal my connections in a situation where i can come across as being helpful, rather than being put in a position to feel cornered. Revealing the network shifts the power.
Of course, that’s part of the point, right? All of these sites want you to USE your friends to gain access to jobs, dates and recommendations. But what’s in it for your friends? And what are the consequences?
To answer this, lets go back to who your “Friends” are. After Friendster came out, you’d go to a club in San Francisco or New York and people would be talking about their Friendsters. They weren’t referring to their Friends… they were referring to the people that they connected with on the system. When sociologists asked people about their network, they did not pass on the descriptions. Thus, people could speak candidly about how well they knew people, in what context, and what they really thought of them. Thus, when they were building maps of relationships, they could make sense of these variations.
There are three problems with these sites:
1) There are SIGNIFICANT consequences to publicly articulating who you know, how you feel about them, etc. That’s bloody well uncomfortable. Try saying no to that boss of yours you hate but need to play nice with. You would express this as a negative relationship to a sociologist, but you have to put them up on Friendster as equivalent to your lover. Your evil boss and your lover are not the same! Public articulation means that you can’t distinguish them without awkward feelings.
2) People aren’t good at systematizing this. Sociologists didn’t ask people who their weak ties were; they asked about all of their ties and then came up with a uniform metric to gauge everyone’s network. People can’t honestly say how “sexy” someone is on a scale from 1-3. Nor can they discuss trustworthiness without a context.
3) Not all relationships are bi-directional. This has to do with fandom and power. Just because you believe you really know Angelina Jolie does not mean that she knows you. On a more local level, not everyone knows the same about someone they know. For example, your shrink probably knows more about you than you know about her. And frankly, the kinds of questions that your superior can ask about your family and personal life are vastly different than the kinds of question you can ask her. Furthermore, just because you read someone’s blog does not mean that you know them. Even if you comment. It has to be reciprocal and dive beyond the actual public forum.
THE NEXT LAYER
So, we realize that these networks don’t look real. It’s too socially awkward. They’re not built to give us a way to express the subtleties of how we know people, the power differentials, the contexts, the strengths.
Furthermore, they expose more about us to different groups of people than we would ever do in real life. All of a sudden, we have to reconcile the bar-hopping facet of our identity with the proper work facet.
The reason that this became quickly apparent for people is because they usually signed on with one group of friends. On Friendster, it was most clearly demonstrated by the Burning Man crowd. If your Burner friends joined, you signed up and created a Burner profile. This didn’t mean that you were only a Burner, but it was the image appropriate to your group of friends. You dress and act differently amongst Burner friends than you do amongst colleagues. Then the colleagues appeared. Do you shift your profile to look like them? Do you find a middle ground? Doesn’t matter, really… Because your colleagues can see that all of your friends are Burners. Guilt by association.
Take this a step further. They expose the PEOPLE from each facet to each other with us as the only bridge. If the focus of our interactions between two groups were similar, we would comfortably expose them over time. If you find out that your colleague likes jazz, you might take him with you to meet your jazz-going friends. But if he hates jazz, you probably won’t think to introduce him to the jazz aficionados. On Friendster, your ability to connect people because of their similarities is lost. The only similarity that matters is you. Furthermore, they get to interact through the system without you even negotiating whether or not they should meet. All of a sudden, your drunken friends are asking your boss out on a date cause she’s hot. Yikes! Not only does this disempower you, remove the ability for you to connect them as need be, but it now makes you have to deal with the consequences of two different groups with two different standards of social norms.
Of course, this gives people a fright. While many of us in this room live, breathe and sleep techno-world, most people have clearer distinctions between their work and personal lives. I came across this regularly in my fieldwork. Imagine the horror that a young teacher in San Francisco felt when her students accused her friends of being pedophiles because they found his profile on Friendster and it jokingly said that he likes to corrupt young girls. She is required to keep her professional world separate from her personal one; this is a code of ethics of teachers. Yet, the technology collapsed this. Furthermore, it exposed a joke that amongst friends is quite funny, but to outsiders looks offensive. Jokes have context. Consequences.
NEXT LAYER
Not only are the networks not real, they have unrealized consequences. This is where things got interesting because users went in a million different directions.
Faced with an uncertainty of what strength was necessary to link, every user came up with her own scheme of who to accept as friends. On Friendster, users tried to institute a mechanism for employing foci. They created fake characters that would collect people of like minds.
Faced with uncomfortable situations, some users killed accounts or simply stopped logging in. Other users created fake characters to hide behind the social awkwardness and only be seen by a smaller group of users.
Fake characters – Fakesters – were also used to make it fun, not serious. It was a way of relieving the social tension. Fakesters were people who joined the network, putting up fake personas. They represented themselves as Giant Squid or Homer Simpson.
Some users were upset that they couldn’t see everyone so they tried to scheme the system to be able to do so. Suddenly having access to people different than them, some users used the network to attack. On Friendster, the Neo-Nazis went wild, going after people of visible color. They used the power of the network to connect to large groups of people, pseudo-anonymously. For many, this was the ideal case. But for those being attacked, this was horrifying. The Neo-Nazis weren’t the only group connecting en masse in a way that is startling. Informants tell me that people on the east coast use the network to deal cocaine.
Friendster was the first company faced with a situation truly out of control. Users were demanding contradictory things. Behavior ran the gauntlet! But Friendster played in to the cardinal no-no learned from science and technology studies: they tried to configure the user.
CONFIGURE THE USER
When technologies are built, the creators often have a very limited scope of desired and acceptable behavior. They build the systems aimed at the people who will abide by their desires. Often, their users don’t have the same views about how the technology should be used. They use it differently. Creators get aggravated. They don’t understand why users won’t behave. The demand behavior. First, the creator messages the user, telling them that this isn’t what is expected of them. Then, the creator starts carrying a heavier and heavier stick. This is called configuring the user. And y’know what… it doesn’t work.
Sure, Friendster stopped some bad behavior, but at what cost? They succeeded in getting rid of most of the people playing games with the site, but they also lost the foci elements that let people find people like them (often a better mechanism for dating) and the ability for people to safely guard themselves from others. And guess what? Their heavy handedness didn’t make the network any more real. Most of the things that make it peculiar to use come from the social awkwardness.
People often tell me that it worked because people are actually dating. So what? Give anyone a room full of attractive people and peopel will try to find a date, even if it is a tech conference. That doesn’t mean that the model is working or that it’s sustainable.
The Fakester chaos was a *reaction* to being configured. They were making it light on the outside, because no one can take it seriously on the inside. Some were so frustrated at being condemmed that they created a Fakster Revolution, complete witha manifesto. People are still faced with a set of friends that demonstrate the people that they might have known at the time that they connected to Friendster (but often don’t actually know). As more people get on the network and their lives shift, their Friendster representation will get more outdated and more difficult to negotiate.
On average, people only remove friends because of serious fights; they rarely clean out their friends, unless there are specific reasons to do so (i.e. minimize social awkwardness). Friends lists are not an accurate portrayal of who people know now, who they could ask favors of, who they would feel comfortable introducing at the moment. They’re a weird product of people from the past, people from the present, people unknown, people once met. Killing Fakesters doesn’t make social networks any more real. It misses the point.
Yet, the more we try to force users into desired behavior, the less we pay attention to why they’re doing what they’re doing. Users are reacting the designs that creators choose.
Why did people try to amass innumerable friends in Friendster? They wanted to see more of the network. In the early days, they wanted to be listed as one of the most popular people in others’ networks. Friendster used to list this but they removed this feature when they realized how problematic it was. Yet, it came back in full force with Orkut where every list is based on popularity. Guess what? It came back with the same problem. The more popular someone is, the more others see them and try to link to them because one might assume that this person will take on friends or because other people recognize this person or because it seems like a way to meet more people. It doesn’t get us any closer to having a social network that means something.
Of course, maybe this is just a foolish goal to begin with. Maybe we need to discontinue our rhetoric that we’re trying to build social networking software. Why don’t we do this? We don’t do this because that’s how we’re trying to build a business model. We’re relying on this to be real to sell to investors, to convince new users that this is useful, etc.
We’re at a cross-roads with social networking software.
We can pretend that the current path we’re on – Friendster, orkut, LinkedIn, Tribe, etc. – is all the hype. We can pretend like it’s really possible to force these users to create everyday social networks that will make all the theory fall into place. We can sell this fantasy to VCs, bankroll money and hope that users will play along long enough to make it all worth it.
OR
We can wake up and make sense of what we’ve done. Together, developers have created a new social architecture; users have created a new set of social norms that sit on top of that architecture. Certainly, it’s sociologically fascinating – that’s why i’m here! But it’s also teaching us a lot about how people can and will use technology to socialize, what they’re weaknesses are and why. The discomforts that users feel are calling for new technology, new ways to handle social behavior. The more we try to force them into behaving the way we want, the less we’ll be able to solve the problem.
But that’s the problem. Social behavior doesn’t have a technological solution. We’re all involved with social software because we see needs that technology can solve. Yet, by building the technology, we don’t simply address or fail to address those needs; we create new realities. At this point, we need to think in a new way. We need to think about what new realities we formed, what new problems evolved, what new needs happened. Then we need to iterate.
We’ve learned a lot for YASNS. Perhaps, we just need to sit back and figure out how to iterate these lessons into social software. Here are a few major issues that i think emerge and need to be addressed in the next iteration:
1) How do we create a nuanced way for people to negotiate different social contexts without creating unbearable collisions?
People should be able to comfortable, and EASILY, determine who should be introduced to who. If we figure out how to empower the bridge without wearing them down, they’re far more likely to want to participate in the technology we create. Right now, we disempower them AND wear them down; this is not a survivable model. When Jason Kottke posted to Craigslist looking for someone to manage his social networks, he was dead on: this is more of a pain in the ass than valuable.
2) How do we let people show face? In other words, how do we let them be socially appropriate?
LiveJournal has figured this out in part. Everyone can read a kid’s LJ. But the parent that reads it gets a different view than the friends. Why? Because it’s one presentation with different access to different people. How do we model this in social software applications?
3) Some people want to be seen; some people want to be hidden. By making everyone far more accessible, those who have something desired become more visible targets. While trying to elevate those in need, give them newfound access to their networks, we can’t overwhelm the targets and expect them to play along. How do we meet the needs of different people?
In LinkedIn, we expect our friends to block connections to us that don’t require our attention. This isn’t sustainable; it’s exhausting. Most of the time, our friends would rather let us deal and feel guilty being put in the position to decide whether or not something should be passed on. It’s awkward to have a pending request that needs to be forward.
In Friendster or open networks, everyone’s fair game. Nowhere is this more painful than hearing the horror from people subject to hate attacks. Sure, there’s hate offline, but the social norms control it with greater intensity offline than online. How do we create a system that protects these people from those who want to attack them? No one wants to go online to be attacked.
4) Finally, how do we create architecture that will allow for regulation through social norms? This is a huge challenge! Sure, we can all think back to MUDs and MOOs where social norms created the boundary cases of acceptable behavior. But we also all know the story of LamdaMOO and why it failed. The code that we build does not currently allow for rich regulation based on social norms. Trolls ruin it for all of us. This is part social problem and part technological problem. If we open our eyes to the social, perhaps we can figure out how to iterate on the technological?
The technology will not solve the social, but each design decision made in the technology affects the social. There is no formula though, no clear algorithm. No social scientist can predict what social behavior will emerge from each technology you build. But we can make sense out of what is going on and we can help you iterate.
The biggest trick in social software is to realize that, just like we can’t predict the behavior that users will have, we can’t force them into behaving the way we want them to behave while simultaneously giving them freedom to be social. The only thing that we can do is try to understand what is motivating new behaviors and figure out how to adjust the technology accordingly. We must recognize that, for any social software, disparate users will have disparate uses. But like any good city, we have to figure out how to create a live and let live environment, where those who want to visit XXX stores will do their thing without driving the moms with small children insane. You can’t kill unwanted behavior without also killing desirable behavior. This is a design challenge, an architectural challenge and a social challenge. And, of course, a business challenge. If we want to make social software that meets the needs of a disparate group of people and not just ourselves, it’s time to take up this challenge. Otherwise, we’ll spend forever frustrated, failing to understand why other people aren’t like us.
danah boyd: notes on Revenge of the User talk
danah boyd : detailed notes on Revenge of the User talk.
danah’s revenge on Revenge of the User
Wow! It is great to see all her points articulated in a comprehensive argument. Wish I had been there 🙁
I just read your crib notes and it is interesting to realise how much sociology is being dedicated to the whole phenomenon. As a newbie to studying/using social networks I have found your site very useful. What strikes me from your presentation Revenge of the User are two general thoughts/questions:
1 Redefining methods and norms of social networking has happened before. Media development (the development of a postal service, the telephone, etc.) and social change (urbanisation, emancipation of women) have created social networks that didn’t exist before. So I guess my question would be, how do changes created by other forces compare to the changes being wrought now by social networking software? Is it like everything else on the net (commerce, communications speed) – as revolutionary as changes wrought by the telephone/printing press/elctrical telegraph, only more so to an exponential value of one zillion?
2. My second comment would be although this clearly needs study, do we need to actualy WORRY about the progress of these social software environments and how we explain them in the non-tech world? Afterall, surely the process in its early evolutionary stage. I think back to the early dark ages (well, about 8 years ago) when I first experimented with internet dating. I had no end of discussions with people who basically attacked the very notion. At least I had the historical perspective to point out that nowadays meet people meet their life partner either at a bar (or party), or at the office. 150 years ago if a guy met a woman at a bar she would have been a prostitute. If she worked in an office then she would have been a) very rare and b) regarded as an oddity. But still, I found people very antigonistic to the very idea of internet dating. Now that attitude has changed, and I know hundreds (well, obviously not more than 150) people who have dated from online contacts. My point is that things we worry about today in terms of social innovation on the web which cross into offline lives, are tomorrow normalised.
Anyway, thanks for posting up your presentation. It really is interesting for the newbie like me.
http://www.abstractdynamics.org/linkage/archives/001673.html
danah boyd: revenge of the user…
Social networks! Blog this, FOAF that! Mobile urban international youth culture! User-centered flux capacitors! Emergent democratic empowerment of post-protean societies, YEAH!
Well, it’s official! I created a site for blog sceptics called, surprisingly enough, The Blog Sceptic (blogsceptic.blogspot.com).
Anyone is welcome to email me ideas or particularly egregious examples of navel-gazing
thanks for a quick summary of a lot of the theories. i always mean to read some of the flood of books on the subject but get overwhelmed.
i think you’ve got a very accurate perseption of what’s going on.
-someone who’s burner image has run away with them.
thanks for a quick summary of a lot of the theories. i always mean to read some of the flood of books on the subject but get overwhelmed.
i think you’ve got a very accurate perception of what’s going on.
-someone who’s burner image has run away with them.
Two Boyds on YASNSes
First up is the crib of danah boyd’s “Revenge of the User” presentation at the O’Reilly emerging technology conference, which offers a quick rundown of relevant sociological research then dives into an excellent illustrated tour…
danah boyd: ++good
Seb has already posted on danah’s notes from her etech talk, revenge of the user, so I’m not pointing to anything new here. I do want to say however, that it is a fantastic piece, and to say “go read…
danah boyd: ++good
Seb has already posted on danah’s notes from her etech talk, revenge of the user, so I’m not pointing to anything new here. I do want to say however, that it is a fantastic piece. Go read it now. Here’s…
ETech: Social Software
Danah Boyd (Apophenia):The biggest trick in social software is to realize that, just like we can’t predict the behavior that users will have, we can’t force them into behaving the way we want them to behave while simultaneously giving them
danah boyd: Revenge of the User
Mer kritiska tankar kring social software services. my etech talk: revenge of the user r en summering av danah boyds Emerging Technology-session Revenge of the User: Lessons from Creator/User Battles. …Yet, in building these systems [social software…
danah at etech 2004
danah boyd, sociologist to the Internet 😉 shares with us her pespective on all the new social networking services this…
danah at etech 2004
danah boyd, sociologist to the Internet 😉 shares with us her pespective on all the new social networking services this…
danah at etech 2004
danah boyd, sociologist to the Internet 😉 shares with us her pespective on all the new social networking services this…
danah boyd – revenge of the user
Everybody else has already blogged this, but the last paragraph is so great that I must blog it.
Interesting discussion of social networking software
This is mostly a placeholder so I have Danah Boyd’s comments to hand when I have time to post more fully, but I’d be interested in other people’s reactions. For Harris, and anyone else who might be interested, does social
Social Networking and Orkut.
A funny thing happened on the way to the Orkut. I got a friend invitation from someone I didn’t recognize. If that was you, apologies for declining. But I didn’t recognize the handle, the e-mail address, the graphic didn’t clue me in, and the bio gave…
The Crossroads of SNS 1.0 and 2.0
The evolution of Social Networking Software is a constant and intriguing topic for many studying and interacting with this industry. I’m starting to consider adding a SNS 2.0 category to the Twister to provide some more organization. Danah Boyd posts…
emerging technology
Just missed it! Doh. I want to go to this next year. This would of been an excellent conference. So much of this emerging tech is reaching the tipping point. Great stuff. Next year.. must go.. next year. Microsoft comes…
On the Unintended Uses of Information Technologies
Danah writes up her Etech talk on “Revenge of the User”, and she notes: When technologies are built, the creators often have a very limited scope of desired and acceptable behavior. They build the systems aimed at the people who…
When things become portable, they become marketable
In Collision Detection, Clive writes: On Ebay today, someone is auctioning their mobile number “867-5309” — which was, of course, made hummably famous by the Tommy TuTone hit “Jenny (867-5309)”. It’s available in the 212 area code. When I checked in, …
When things become portable, they become marketable
In Collision Detection, Clive writes: On Ebay today, someone is auctioning their mobile number “867-5309” — which was, of course, made hummably famous by the Tommy TuTone hit “Jenny (867-5309)”. It’s available in the 212 area code. When I checked in, …
Revenge of the User
Via Mathemagenic, fascinating thoughts from Danah Boyd – a summary of her presentation at Etech about how people’s use of social software inevitably breaks out of the tidy boundaries imagined by the sites’ creators. From the closing points: The technol…
Revenge of the User
Via Mathemagenic, fascinating thoughts from Danah Boyd – a summary of her presentation at Etech about how people’s use of social software inevitably breaks out of the tidy boundaries imagined by the sites’ creators. From the closing points: The technol…
A very interesting overview.
Just a few small points for your consideration:
Social networks are influenced by broader societal constructs such as vertical order and horizontal order. In this way, the “need” to feign a strong relationship with a boss is significantly societally determined. Deference, generically speaking, to authority in Sweden would be less than in the United States and, deference to authority in China greater than in the United States. Thus, social networks need a societal context.
I think the feasibility of group membership another factor, as would be the case with a reference group. There are not many African-American members with strong ties to the KKK:
A strong tie of my wife and thus an associate-strong tie of mine sent me a job vacancy email, which came to her via women’s in-house affirmative action group at her university. When the email reached me, I sent my friend, a “thank you” style reply. However, it happened that owing to the way the email system was set-up, my reply went the entire clandestine “jobs for the girls” network. Subsequently, the network members berated my associate-strong tie friend. Thus, networks are not merely acted upon – networks respond. In this instance, there appears have been a clash between (a) idealism and the need to address social wrongdoings on one hand, and, (b) a friend’s support and perceived meritocracy on the other. By trying to help me my friend presumably lost status in her network. Thus, networking involves the dynamism of the network itself.
A very interesting overview.
Just a few small points for your consideration:
Social networks are influenced by broader societal constructs such as vertical order and horizontal order. In this way, the “need” to feign a strong relationship with a boss is significantly societally determined. Deference, generically speaking, to authority in Sweden would be less than in the United States and, deference to authority in China greater than in the United States. Thus, social networks need a societal context.
I think the feasibility of group membership another factor, as would be the case with a reference group. There are not many African-American members with strong ties to the KKK:
A strong tie of my wife and thus an associate-strong tie of mine sent me a job vacancy email, which came to her via women’s in-house affirmative action group at her university. When the email reached me, I sent my friend, a “thank you” style reply. However, it happened that owing to the way the email system was set-up, my reply went the entire clandestine “jobs for the girls” network. Subsequently, the network members berated my associate-strong tie friend. Thus, networks are not merely acted upon – networks respond. In this instance, there appears have been a clash between (a) idealism and the need to address social wrongdoings on one hand, and, (b) a friend’s support and perceived meritocracy on the other. By trying to help me my friend presumably lost status in her network. Thus, networking involves the dynamism of the network itself.
A very interesting overview.
Just a few small points for your consideration:
Social networks are influenced by broader societal constructs such as vertical order and horizontal order. In this way, the “need” to feign a strong relationship with a boss is significantly societally determined. Deference, generically speaking, to authority in Sweden would be less than in the United States and, deference to authority in China greater than in the United States. Thus, social networks need a societal context.
I think the feasibility of group membership another factor, as would be the case with a reference group. There are not many African-American members with strong ties to the KKK:
A strong tie of my wife and thus an associate-strong tie of mine sent me a job vacancy email, which came to her via women’s in-house affirmative action group at her university. When the email reached me, I sent my friend, a “thank you” style reply. However, it happened that owing to the way the email system was set-up, my reply went the entire clandestine “jobs for the girls” network. Subsequently, the network members berated my associate-strong tie friend. Thus, networks are not merely acted upon – networks respond. In this instance, there appears have been a clash between (a) idealism and the need to address social wrongdoings on one hand, and, (b) a friend’s support and perceived meritocracy on the other. By trying to help me my friend presumably lost status in her network. Thus, networking involves the dynamism of the network itself.
ETCON: Social networking tools
A roundup of some key ideas and demos relating to social networking tools at ETCON 2004
The need to allow social networks to evolve rather than being to a construct of appropriate, but limiting and ultimately network ecosystem impoverishing behavior norms is very interesting. So how do you make the software adapt to the properties of emergent social networks?
Isn’t the idea of having a Blog Sceptic site to examine the over-examination of blogs because blogs are over analysed a paradox? I quote Alanis: Isn’t that ironic?
(No, Alanis, in your case it’s not)
There are some great gems in your presentation. I think the advocacy movement (environmental, civil rights, Dean, whatever) suffer from many of these same troubles. We construct movements and advocacy groups and advocacy strategy that wears down rather than empowers. We create a new context with the evolution of each organization (issue) which seems like they never go away and create a new reality of “advocacy toxicity”- so many call to action, request for support that the public does nothing.
I hope to pick up on your thread of thoughts in the advocacy context. Thanks for posting.
Casually Connected
Technology has been working its way into the minds of almost everyone it seems these days. As a developer, it’s particularly encouraging to see many of the technologies I work with and develop for rising to the top. In particular,…
Kevin – this is why i’m interested in understanding more about evolving architectures. I remember reading “How Buildings Learn” and being in awe of what it means to build structures that can evolve as the social needs change. What are the parallels for technology? I think that there is much to learn, but that what is going on now is breaking open the door.
The issues you raise remind me of the challenges I faced in my old job running communities for Excite.com … uh, before the massive bankruptcy. With 80MB of disk space and easy photo upload (this was back in the early days — i.e. 1999) we found ourselves quite popular with folks interested in adult content. No surprise. Such has been the history of technological advance from Usenet to the VCR. The tough part was keeping smut in it’s place (say, out of Hobbies or Teens). What we found was that our best bet was to develop strategies in which users could control their own experience — blocking, filtering, and in the most extreme cases, such as child pornography, report such transgressions. Orkut has something similar w/ its “report as bogus” function. Not perfect — you’re still relying on some centralized person to make a judgement call on standards for an entire community. The fringe cases — hate, exploitation, illegal acts — push at the edges more than anything. But the lessons and challenges of putting power in the hands of the user continue to apply as new technologies, particularly ones operating at large scales, continue to evolve.
Danah Boyd gives a good summary of the problems with social network software
What I can’t understand is why designers of social network software keep making the same (fairly obvious) mistakes that she outlines.
Orkut, or Cut?
I had my Orkut profile deleted yesterday. I’d played with the system for a few weeks, accumulated nearly 100 “friends,” many of whom asked me to be part of their network not vice versa. But, still, I was uncomfortable with the kinds of behavior and cho…
Configuring the User in Social Network Software
Social networks, “Small Worlds,” code as law, and the “YASNS phenomenon” form the threads of Danah Boyd’s notes from her recent E-Tech presentation, “Revenge of the User” at the February 2004 O’Reilly Emerging Technology Conference. Comments on Milgram…
Configuring the User in Social Network Software
Social networks, “Small Worlds,” code as law, and the “YASNS phenomenon” form the threads of Danah Boyd’s notes from her recent E-Tech presentation, “Revenge of the User” at the February 2004 O’Reilly Emerging Technology Conference. Comments on Milgram…
Hi, this is Huy Zing, orkut.com fugitive.
How’s everybody doing?
cuz the kkk is here to stay…
cuz the kkk is here to stay…
cuz the kkk is here to stay…
The Dunbar Number as a Limit to Group Sizes
Lately I’ve been noticing the spread of a meme regarding “Dunbar’s Number” of 150 that I believe is misunderstanding of his ideas. (post continues with a discussion of Dunbar’s Number, the size of groups, some empirical and anecdotal experience with si…
Configuring the User in Social Network Software
Social networks, “Small Worlds,” code as law, and the “YASNS phenomenon” form the threads of Danah Boyd’s notes from her recent E-Tech presentation, “Revenge of the User” at the February 2004 O’Reilly Emerging Technology Conference. Comments on Milgram…
Took the day off and was just reading up some blogs and thought I would post here
Taking a longer view…
I briefly attended a user-centered design seminar thingy yesterday, and one of the things that came up was the increasing acceptance of the importance of ethnography in design research. More and more companies are “getting” that they’ve got to observe…
The Dunbar Number as a Limit to Group Sizes
Lately I’ve been noticing the spread of a meme regarding “Dunbar’s Number” of 150 that I believe is misunderstanding of his ideas. (post continues with a discussion of Dunbar’s Number, the size of groups, some empirical and anecdotal experience with si…
today’s (re-)readings
Some articles I’ve been re-reading, in no particular order:Macintosh Production Introduction Plan, part of Stanford’s Making the Macintosh: Technology and Culture in Silicon ValleyThe Anti-Mac Interface and Towards the Anti-MacApophenia: Revenge of the…
Pingback: Why SMBs Need Social Software – Dunbar’s Number Limits Metcalfe’s Law « I’m Not Actually a Geek