You are here

Internet Technologies

Kernels for Complex Networks

Athens.
The second and last day of WebSci '09 starts with a session on social networking, although the first paper in this session, by Yorgos Amanatidis, has the somewhat technical title "Kernels for Complex Networks" - we'll see what that's all about... Visual network graph models, apparently, for graphs which represent relational data in an abstract way. Such graophs can be used in the analysis, simulation, and prediction of network topologies, focussing especially on aspects like scaling, clustering, and node centrality.

What can be observed in real networks is the degree distribution: as the Web grows, the average degree is constant, but there is huge variance and no concentration around the average; indeed, we see the small world phenomenon which produces networks with small diameter and strong clustering tendencies (the friend of my friend is likely also to be my friend). Kleinberg, for example, modelled the fact that in small world networks there are not only short paths between nodes, but that these nodes can find such paths effectively using local information.

WebSci '09: So Many Posters...

WebSci '09 Poster

Athens.
Finally for this first day at WebSci '09, we move to the poster session, which includes our poster on the Australian political blogosphere mapping project; the A1 poster itself is available here, and there's also a brief article to provide further background detail. From the post slideshow that's playing at the moment, there's quite a bit of really interesting stuff here - and all of the posters are also available online.

Communicating Risk in Online Transactions

Athens.
The final talk here at WebSci '09 is presented by Nick Papanikolau, whose interest is in communicating online risk more effectively to users, by drawing on lessons learnt from cognitive science. Online risks may include direct risks from user-to-user interaction as well as more indirect threats through viruses and malware - such threats are generally intangible, and user interface design may help make them more tangible.

Online security is now a concern to everyone, of course, but not everyone has a sufficient perception of the threats and risks which they are exposed to. The potential repercussions, however, are vast, and include the loss or theft of data as well as unauthorised access to it. In the offline world, there is substantial information on how humans perceive danger and risk, and this has been applied in a variety of ways (for example in communicating health risks and other medical advice) - but it does not necessarily translate directly to the online context, because of the comparative lack of tangibility.

The Net Neutrality Debate and Its Unintended Consequences

Athens.
The next speaker at WebSci '09 is Alison Powell, and she focusses on the debate around net neutrality and the behaviour of net neutrality lobbies in this context. The debate stems from a US court ruling classifying Internet services as information rather than communication services, which eliminated the requirement of common carriage - ISPs would now be able to privilege certain types of traffic or slow down others. This became a major public debate during 2006 and 2007, driven in part by the 'Save the Internet' coalition backed by Google.

Towards an Entrepreneurial Form of Regulation of the Web

Athens.
The next speaker here at WebSci '09 is Wolf Richter, who shifts our attention to the 'dark side' of the Web. He links back to John Perry Barlow's 1996 declaration of the independence of cyberspace, and points out how much in spite of such rhetoric the regulation of online spaces has continued - but at the same time, anti-'piracy' and anti-spam measures have had only a very limited effect. There is also a thriving culture of self-regulation online, of course, with a number of organisations (some with government involvement) having emerged to drive this.

Web Science and Online Marketing Research

Athens.
The next session at WebSci '09 deals with questions of openness and control. We begin with Imma Rodriguez-Ardura, who connects Web science to marketing and consumer behaviour research. If the Web really poses new marketing paradigms, the marketing modelling for the Web can enrich the Web science field as well.

There are several studies of Web-based purchasing processes, which relate consumer behaviour to a number of factors, attempt to understand consumer satisfaction and loyalty, and address the question of consumer confidence as a determinant of purchasing behaviour. Additionally, classical models for explaining consumer actions are also being applied to the study of online consumer behaviour. And finally, the Web is also perceived as a source of consumer empowerment by providing greater transparency for interactions and information.

Approaching Trust Architecture on the Web

Athens.
Finally for this trust and security panel at WebSci '09 we move on to Pavlos Spirakis. He begins by noting that the Web was initially invented as a tool for researchers who trusted one another implicitly, so no security was built in from the beginning. This is no longer the case, of course, and so theer is a need fro privacy protection and for the protection of the freedom of its users. Layers of trust must therefore be engineered into Web technology.

Trust, however, is the belief of one party in another, and distrust is not simply the lack of trust, but the belief that the other partner explicitly cannot be trusted. Such distrust is an important notion in its own right, then. Trust is a relation between two parties, then, is context-specific, and exists in varying degrees of strength. This means that trust is measurable, Pavlos suggests, and that it can be expressed mathematically (algorithms such as Google's PageRank build on this).

Privacy and Security: The Positive Sum Approach

Athens.
The next speaker at WebSci '09 (via video) is Ann Cavoukian, the Toronto privacy commissioner. She suggests that we need to think differently to protect privacy - there is a need for strong legislation and other forms of protection. but most of all privacy also needs to be embedded into technology; without privacy, she says, there is no freedom.

This may need a substantial change of attitudes amongst technology companies,but it is possible and necessary - riffing off the Obama slogan 'yes we can', Ann suggest that for this issue, it's 'yes we must', and she has been pushing for the recognition of an international data privacy day.

Moving from Organisation-Centred to User-Centred Privacy and Security

Athens.
The trust and security keynote at WebSci '09 is followed by a panel on the same topic, which starts with Kai Rannenberg. He begins by referencing the Internet of Things, and by way of example shows a prototype of a high-tech toilet (a washlet) that monitors the user's health condition on the basis of their, um, bodily products and reports such data to their doctor or other health authorities where necessary. Another key area of new Internet-based services is location-specific and builds on mobile devices to determine location, time, and identity of the user, and of course there is a wider range of datamining-based applications online.

Trust in an Open Web: The European Perspective

Athens.
The post-lunch (mmmh, baklava) session on this first day here at WebSci '09 returns us to the question of trust; the keynote speaker is Jacques Bus, head of the European Commission unit "Trust and Security" within the directorate for the Information Society and Media. He begins by noting that we have moved from a walled fortress to an open metropolis model for digital information; this is a move from securitisation, isolation, walls, and the protection of everything, to trust, agreement, communication, and the protection of goods. In this digital world, there is as yet no adequate identity management for persons and artificial entities; the protection of data is the key.

Pages

Subscribe to RSS - Internet Technologies