Skip to main content
Home
Snurblog — Axel Bruns

Main navigation

  • Home
  • Information
  • Blog
  • Research
  • Publications
  • Presentations
  • Press
  • Creative
  • Search Site

Compromised Data 2013

Snurb — Wednesday 30 October 2013 05:04

The Problematic Rise of Read Receipts in Social Media

Internet Technologies | Social Media | Compromised Data 2013 |

The final presenter at "Compromised Data" is Kamilla Pietrzyk, whose interest is in the user experience of social media platforms which provide read receipts - as in Facebook chat, iMessage, or Snapchat. Very little research has been done about this so far, but there is growing unease about this functionality, which notifies the sender of a message that the message was opened and (presumably) read.

Email offers this functionality as well, but here the read receipt is a per-case opt-in facility; recipients can choose not to send read receipts as they read the email. Underlying this …

» continue reading...
Snurb — Wednesday 30 October 2013 05:03

Online Backchannels to Television Broadcasts in Spain

Social Media | Twitter | Compromised Data 2013 | Television |

The next "Compromised Data" is Mariluz Sánchez, who is taking a socio-semiotic approach to the intersection between television and the Internet. This transforms the concept of interactivity, revolutionising reception and enabling the development of transmedia storytelling where viewers develop relationships with the content through various platforms.

Various resources are available to viewers online, promoting consumption and building loyalty towards the programming. Industry is now providing direct access to audiences, and viewers' ability to provide direct feedback can be seen as a form so social empowerment. Mariluz analysed these resources by examining the resources listed on the first five …

» continue reading...
Snurb — Wednesday 30 October 2013 05:03

Coverage of Mental Illness in Mainstream News and on Twitter

Journalism | Social Media | Compromised Data 2013 |

The next session at "Compromised Data" is the last I'm going to be able to liveblog, as I'll have to go to the airport this afternoon to head to my next destination on this trip (apologies to the presenters in the final session, whose papers I'll miss). We start with Gavin Adamson, whose interest is in the circulation of mental health news on Twitter. Generally, the journalistic coverage of mental illness in Canada and elsewhere is poor: mental illness is covered mainly in the context of (as a reason for) crime and violence; there are few good news …

» continue reading...
Snurb — Wednesday 30 October 2013 02:27

Distinguishing Chain and Name Networks in Social Network Analysis

'Big Data' | Social Media | Social Media Network Mapping | Compromised Data 2013 |

The final speaker in this "Compromised Data" session is Anatoliy Gruzd, whose interest is in the automated discovery and visualisation of communication networks from social media data. (He's also just launched a new journal in this field, Big Data and Society.) How can such networks be discovered and visualised, and how can we evaluate the sense of community which may exist in them?

Social network analysis enables us to investigate the connections between users in social networks. It reduces large quantities of messages to a smaller number of nodes exchanging communication; it can track longitudinal developments over …

» continue reading...
Snurb — Wednesday 30 October 2013 02:27

Reverse-Engineering Twitter?

Social Media | Twitter | Compromised Data 2013 |

The next speaker at "Compromised Data" is Robert Gehl, whose interest is in critically reverse-engineering social media as a form of critiquing and producing alternatives to current social media platforms. This builds on reverse-engineering approaches in engineering, economics and law, on science and technology as well as software studies, and on critical humanism.

Reverse-engineering is a method of producing knowledge by dissociating human-made artefacts. Such knowledge is then used to produce new associated artefacts that bear some relation to the old. Some reverse-engineering has merely functional and pragmatic reasons, but in other cases reverse-engineering takes a more critical …

» continue reading...
Snurb — Wednesday 30 October 2013 02:26

Bottom-Up Measurements of Network Performance

Internet Technologies | 'Big Data' | Compromised Data 2013 |

The next session at "Compromised Data" starts with Fenwick McKelvey, who begins with a reference to the emergence of digitised methods for the study of the Web during the mid-2000s. This was the time around which the latest generation of social media emerged, enabling us to begin thinking about society through the study of the Internet, requiring the development of new research methods by repurposing computer science methods for social science research.

In Toronto, Infoscape Labs developed a number of tools for the exploration of political discourse in Web 2.0, including the Blogometer. This is the emergence of …

» continue reading...
Snurb — Wednesday 30 October 2013 00:37

Archiving Our Personal Digital Milieux

'Big Data' | Internet Content Preservation | Compromised Data 2013 |

The final presenter in this morning session at "Compromised Data" is Yuk Hui, who will present a social media self-archiving project. He has worked for years on audiovisual archives, but much of the work on this field has focussed on institutional rather than personal archives, with the latter often concerned mainly with privacy issues.

But another set of problems relates to data management instead: we are working with multiple cloud-based systems, but rarely archive our digital objects effectively - archiving is not just about storing, but about preserving the context of digital objects as well: the digital milieu. …

» continue reading...
Snurb — Wednesday 30 October 2013 00:37

Social Media Data and Their Utopian Assumptions

'Big Data' | Social Media | Compromised Data 2013 |

The next speaker at "Compromised Data" is Ingrid Hoofd, whose interest is in how new technologies make certain types of representation possible or impossible. The neoliberalisation of universities, for example, leads to a quantification of research data which generates poor research. This is the violence of numbers: how do we assess the way new media technologies change the face of social sciences research, then?

Social media data mining methodology provides an allegory of the technological apparatuses that use it. This hinges on these technologies' propensity to speed up, and on the associated notion of change. There is a …

» continue reading...
Snurb — Wednesday 30 October 2013 00:34

Haunted Data in Cross-Media Controversies

'Big Data' | Social Media | Compromised Data 2013 |

The second day of "Compromised Data" starts with Lisa Blackman, who is tracking social media controversies and mapping information contagion. Can we use quantitative methods in non-positivist ways to understand these processes?

Lisa introduces the idea of haunted data, and suggests that we need to think about digital methods as performative: we need to move behind infographics when thinking about visualising data. Part of this is about priming: creating an experimental apparatus that makes people feel that their actions are self-directed, but actually generates such actions through the interventions of the apparatus. Such research is controversial because of …

» continue reading...
Snurb — Tuesday 29 October 2013 12:09

Easy Data, Hard Data? Twitter Research and the Politics of Data Access (CD 2013)

'Big Data' | Social Media | Social Media Network Mapping | New Media and Public Communication (ARC Discovery) | Twitter | Compromised Data 2013 |

Compromised Data 2013

Easy Data, Hard Data? Twitter Research and the Politics of Data Access

Axel Bruns and Jean Burgess

  • 28 Oct. 2013 – Compromised Data symposium, Toronto
Easy Data, Hard Data? Twitter Resedarch and the Politics of Data Access from Axel Bruns

» continue reading...

Pagination

  • 1
  • Next page
Compromised Data 2013
INFORMATION
BLOG
RESEARCH
PUBLICATIONS
PRESENTATIONS
PRESS
CREATIVE

Recent Work

Presentations and Talks

Beyond Interaction Networks: An Introduction to Practice Mapping (ACSPRI 2024)

» more

Books, Papers, Articles

Untangling the Furball: A Practice Mapping Approach to the Analysis of Multimodal Interactions in Social Networks (Social Media + Society)

» more

Opinion and Press

Inside the Moral Panic at Australia's 'First of Its Kind' Summit about Kids on Social Media (Crikey)

» more

Creative Work

Brightest before Dawn (CD, 2011)

» more

Lecture Series


Gatewatching and News Curation: The Lecture Series

Bluesky profile

Mastodon profile

Queensland University of Technology (QUT) profile

Google Scholar profile

Mixcloud profile

[Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence]

Except where otherwise noted, this work is licensed under a Creative Commons BY-NC-SA 4.0 Licence.