The final presenter at "Compromised Data" is Kamilla Pietrzyk, whose interest is in the user experience of social media platforms which provide read receipts - as in Facebook chat, iMessage, or Snapchat. Very little research has been done about this so far, but there is growing unease about this functionality, which notifies the sender of a message that the message was opened and (presumably) read.
Email offers this functionality as well, but here the read receipt is a per-case opt-in facility; recipients can choose not to send read receipts as they read the email. Underlying this …
The next "Compromised Data" is Mariluz Sánchez, who is taking a socio-semiotic approach to the intersection between television and the Internet. This transforms the concept of interactivity, revolutionising reception and enabling the development of transmedia storytelling where viewers develop relationships with the content through various platforms.
Various resources are available to viewers online, promoting consumption and building loyalty towards the programming. Industry is now providing direct access to audiences, and viewers' ability to provide direct feedback can be seen as a form so social empowerment. Mariluz analysed these resources by examining the resources listed on the first five …
The next session at "Compromised Data" is the last I'm going to be able to liveblog, as I'll have to go to the airport this afternoon to head to my next destination on this trip (apologies to the presenters in the final session, whose papers I'll miss). We start with Gavin Adamson, whose interest is in the circulation of mental health news on Twitter. Generally, the journalistic coverage of mental illness in Canada and elsewhere is poor: mental illness is covered mainly in the context of (as a reason for) crime and violence; there are few good news …
The final speaker in this "Compromised Data" session is Anatoliy Gruzd, whose interest is in the automated discovery and visualisation of communication networks from social media data. (He's also just launched a new journal in this field, Big Data and Society.) How can such networks be discovered and visualised, and how can we evaluate the sense of community which may exist in them?
Social network analysis enables us to investigate the connections between users in social networks. It reduces large quantities of messages to a smaller number of nodes exchanging communication; it can track longitudinal developments over …
The next speaker at "Compromised Data" is Robert Gehl, whose interest is in critically reverse-engineering social media as a form of critiquing and producing alternatives to current social media platforms. This builds on reverse-engineering approaches in engineering, economics and law, on science and technology as well as software studies, and on critical humanism.
Reverse-engineering is a method of producing knowledge by dissociating human-made artefacts. Such knowledge is then used to produce new associated artefacts that bear some relation to the old. Some reverse-engineering has merely functional and pragmatic reasons, but in other cases reverse-engineering takes a more critical …
The next speaker at "Compromised Data" is Ingrid Hoofd, whose interest is in how new technologies make certain types of representation possible or impossible. The neoliberalisation of universities, for example, leads to a quantification of research data which generates poor research. This is the violence of numbers: how do we assess the way new media technologies change the face of social sciences research, then?
Social media data mining methodology provides an allegory of the technological apparatuses that use it. This hinges on these technologies' propensity to speed up, and on the associated notion of change. There is a …
The second day of "Compromised Data" starts with Lisa Blackman, who is tracking social media controversies and mapping information contagion. Can we use quantitative methods in non-positivist ways to understand these processes?
Lisa introduces the idea of haunted data, and suggests that we need to think about digital methods as performative: we need to move behind infographics when thinking about visualising data. Part of this is about priming: creating an experimental apparatus that makes people feel that their actions are self-directed, but actually generates such actions through the interventions of the apparatus. Such research is controversial because of …
The final speaker on this first day of "Compromised Data" is Sidneyeve Matrix, who shifts our focus towards geosocial information as generated by smartphones and other mobile devices. Only 12% of US users as surveyed by the Pew Centre posted Foursquare check-ins in 2013, for example, down from 18% in 2011 - but this may mask a greater take-up of other location-based services, not least the Frequent Locations functionality in iOS7.
There is a continuing trend towards the consumerisation of geodata. Geosocial cultural arrangements are explored through the use of mobile communication patterns, but such analysis is notoriously …