4,328 Matching Annotations
  1. Jan 2019
    1. a growing consensus on factors that moti-vate people to make contributions to these communities,including motivational factors based on self-interest (e.g.,Lakhani and von Hippel 2003, Lerner and Tirole 2002,von Hippel and von Krogh 2003), identity (Bagozzi andDholakia 2006, Blanchard and Markus 2004, Ma andAgarwal 2007, Ren et al. 2007, Stewart and Gosain2006), social capital (Nambisan and Baron 2010; Waskoand Faraj 2000, 2005; Wasko et al. 2009), and socialexchange (Faraj and Johnson 2011).

      Motivations include: self-interest, identity, social capital, and social exchange, per org studies researchers.

      Strange that Benkler, Kittur, Kraut and others' work is not cited here.

    2. For instance, knowledge collaboration in OCscan occur without the structural mechanisms tradition-ally associated with knowledge collaboration in orga-nizational teams: stable membership, convergence afterdivergence, repeated people-to-people interactions, goal-sharing, and feelings of interdependence among groupmembers (Boland et al. 1994, Carlile 2002, Dougherty1992, Schrage 1995, Tsoukas 2009).

      Differences between offline and online knowledge work

      Online communities operate with fewer constraints from "social conventions, ownership, and hierarchies." Further, the ability to remix/reuse/recombine information into new, innovative forms of knowledge are easier to generate through collaborative technologies and ICT.

    3. Knowledge collaboration is defined broadly as thesharing, transfer, accumulation, transformation, andcocreation of knowledge. In an OC, knowledge collab-oration involves individual acts of offering knowledgeto others as well as adding to, recombining, modify-ing, and integrating knowledge that others have con-tributed. Knowledge collaboration is a critical elementof the sustainability of OCs as individuals share andcombine their knowledge in ways that benefit them per-sonally, while contributing to the community’s greaterworth (Blanchard and Markus 2004, Jeppesen andFredericksen 2006, Murray and O’Mahoney 2007, vonHippel and von Krogh 2006, Wasko and Faraj 2000).

      Definition of knowledge work

    4. Online communities (OCs) are open collectives of dis-persed individuals with members who are not necessarilyknown or identifiable and who share common inter-ests, and these communities attend to both their indi-vidual and their collective welfare (Sproull and Arriaga2007).

      Definition of online communities

    1. The situated and emergent nature of coordinationdoes not imply that practices are completely uniqueand novel. On the one hand, they vary accordingto the logic of the situation and the actors present.On the other hand, as seen in our categorizationof dialogic coordination, they follow a recognizablelogic and are only partially improvised. This tensionbetween familiarity and uniqueness of response is atthe core of a practice view of work (Orlikowski 2002).

      This is an important and relevant point for SBTF/DHN work. Each activation is situated and emergent but there are similarities -- even though the workflows tend to change for reasons unknown.

      Cites Orlikowski

    2. Recently, Brown and Duguid (2001, p. 208) sug-gested that coordination of organizational knowledgeis likely to be more challenging than coordination ofroutine work, principally because the “elements to becoordinated are not just individuals but communitiesand the practices they foster.” As we found in ourinvestigation of coordination at the boundary, signif-icant epistemic differences exist and must be recog-nized. As the dialogic practices enacted in responseto problematic trajectories show, the epistemic dif-ferences reflect different perspectives or prioritiesand cannot be bridged through better knowledge

      Need to think more about how subgroups in SBTF (Core Team/Coords, GIS, locals/diaspora, experienced vols, new vols, etc.) act as communities of practice. How does this influence sensemaking, epistemic decisions, synchronization, contention, negotiation around boundaries, etc.?

    3. nature point to the limitations of a structuralist viewof coordination. In the same way that an organi-zational routine may unfold differently each timebecause it cannot be fully specified (Feldman andPentland 2003), coordination will vary each time.Independent of embraced rules and programs, therewill always be an element of bricolage reflecting thenecessity of patching together working solutions withthe knowledge and resources at hand (Weick 1993).Actors and the generative schemes that propel theiractions under pressure make up an important com-ponent of coordination’s modus operandi (Bourdieu1990, Emirbayer and Mische 1998).

      Evokes the improvisation of synchronization efforts found in coordination of knowledge work in a pluritemporal setting

    4. These practices are highly situated, emer-gent, and contextualized and thus cannot be prespec-ified the way traditional coordination mechanismscan be. Thus, recent efforts based on an information-processing view to develop typologies of coordina-tion mechanisms (e.g., Malone et al. 1999) may be tooformal to allow organizations to mount an effectiveresponse to events characterized by urgency, novelty,surprise, and different interpretations.

      More design challenges

    5. Our findings also point to a broader divide in coor-dination research. Much of the power of traditionalcoordination models resides in their information-processing basis and their focus on the design issuessurrounding work unit differentiation and integra-tion. This design-centric view with its emphasis onrules,structures,andmodalitiesofcoordinationislessuseful for studying knowledge work.

      The high-tempo, non-routine, highly situated knowledge work of SBTF definitely falls into this category. Design systems/workarounds is challenging.

    6. Boundarywork requires the ability to see perspectives devel-oped by people immersed in a different commu-nity of knowing (Boland and Tenkasi 1995, Star andGriesemer 1989). Often, particular disciplinary focilead to differences in opinion regarding what stepsto take next in treating the patient.

      Differences in boundary work can lead to contentiousness.

    7. The termdialogic—as opposed to monologic—recognizes dif-ferences and emphasizes the existence of epistemicboundaries, different understandings of events, andthe existence of boundary objects (e.g., the diagnosisor the treatment plan). A dialogic approach to coordi-nation is the recognition that action, communication,and cognition are essentially relational and highlysituated. We use the concept of trajectory (Bourdieu1990, Strauss 1993) to recognize that treatment pro-gressions are not always linear or positive.

      Cites Star (boundary objects) and Strauss, Bourdieu (trajectory)

    8. A dialogic coordination practice differs from moregeneral expertise coordination processes in that itis highly situated in the specifics of the unfoldingevent, is urgent and high-staked, and occurs at theboundary between communities of practice. Becausecognition is distributed, responsibility is shared, andepistemic differences are present, interactions can becontentious and conflict laden.

      Differences between expertise and dialogic coordination processes.

    9. xpertisecoordination refers to processes that manage knowl-edge and skill interdependencies

    10. we describe two categories ofcoordination practices that ensure effective work out-comes. The first category, which we callexpertise coor-dination practices, represents processes that make itpossible to manage knowledge and skill interdepen-dencies. These processes bring about fast response,superior reconfiguration, efficient knowledge shar-ing, and expertise vetting. Second, because of therapidlyunfoldingtempooftreatmentandthestochas-tic nature of the treatment trajectory,dialogic coordina-tion practicesare used as contextually and temporallysituated responses to occasional trajectory deviation,errors, and general threats to the patient. These dia-logic coordination practices are crucial for ensuringeffective coordination but often require contentiousinteractions across communities of practice. Figure 1presents a coordination-focused model of patienttreatment and describes the circumstances underwhich dialogic coordination practices are called for.

    11. We found that coordination in a trauma settingentails two specific practices.

      "1. expertise coordination practices"

      "2. dialogic coordination practices"

      What would be the SBTF equivalent here?

    12. Based on a practice view, we suggest the followingdefinition ofcoordination: a temporally unfolding andcontextualized process of input regulation and inter-action articulation to realize a collective performance.

      Faraj and Xiao offer two important points: Context and trajectories "First, the definition emphasizes the temporal unfolding and contextually situated nature of work processes. It recognizes that coordinated actions are enacted within a specific context, among a specific set of actors, and following a history of previous actions and interactions that necessarily constrain future action."

      "Second, following Strauss (1993), we emphasize trajectories to describe sequences of actions toward a goal with an emphasis on contingencies and interactions among actors. Trajectories differ from routines in their emphasis on progression toward a goal and attention to deviation from that goal. Routines merely emphasize sequences of steps and, thus, are difficult to specify in work situations characterized by novelty, unpredictability, and ever-changing combinations of tasks, actors, and resources. Trajectories emphasize both the unfolding of action as well as the interactions that shape it. A trajectory-centric view of coordination recognizes the stochastic aspect of unfolding events and the possibility that combinations of inputs or interactions can lead to trajectories with dreadful outcomes—the Apollo 13 “Houston, we have a problem” scenario. In such moments, coordination is more about dealing with the “situation” than about formal organizational arrangements."

    13. Theprimarygoalispatientstabilizationandini-tiating atreatment trajectory—a temporally unfolding

      Full quote (page break)

      "The primary goal is patient stabilization and initiating a treatment trajectory—a temporally unfolding sequence of events, actions, and interactions—aimed at ensuring patient medical recovery"

      Knowledge trajectory is a good description of SBTF's work product/goal

    14. rauma centersare representative of organizational entities that arefaced with unpredictable environmental demands,complexsetsoftechnologies,highcoordinationloads,and the paradoxical need to achieve high reliabilitywhile maintaining efficient operations.

      Also a good description of digital humanitarian work

    15. We sug-gest that for environments where knowledge work isinterdisciplinary and highly contextualized, the rele-vant lens is one of practice. Practices emerge from anongoing stream of activities and are enacted throughthe contextualized actions of individuals (Orlikowski2000). These practices are driven by a practical logic,thatis,arecognitionofnoveltaskdemands,emergentsituations,andtheunpredictabilityofevolvingaction.Bourdieu (1990, p. 12) definespracticesas generativeformulas reflecting the modus operandi (manner ofworking) in contrast to the opus operatum (finishedwork).

      Definition and background on practice.

      Cites Bourdieu

    16. In knowledge work, several related factors sug-gest the need to reconceptualize coordination.

      Complex knowledge work coordination demands attention to how coordination is managed, as well as what (content) and when (temporality).

      "This distinction becomes increasingly important in complex knowledge work where there is less reliance on formal structure, interdependence is changing, and work is primarily performed in teams."

      Traditional theories of coordination are not entirely relevant to fast-response teams who are more flexible, less formally configured and use more improvised decision making mechanisms.

      These more flexible groups also are more multi-disciplinary communities of practice with different epistemic standards, work practices, and contexts.

      "Thus, because of differences in perspectives and interests, it becomes necessary to provide support for cross-boundary knowledge transformation (Carlile 2002)."

      Evokes boundary objects/boundary infrastructure issues.

    17. Usinga practice lens (Brown and Duguid 2001, Orlikowski2000), we suggest that in settings where work iscontextualized and nonroutine, traditional models ofcoordination are insufficient to explain coordinationas it occurs in practice. First, because expertise is dis-tributed and work highly contextualized, expertisecoordination is required to manage knowledge andskill interdependencies. Second, to avoid error andto ensure that the patient remains on a recoveringtrajectory, fast-response cross-boundary coordinationpractices are enacted. Because of the epistemic dis-tance between specialists organized in communitiesofpractice,theselattercoordinationpracticesmagnifyknowledge differences and are partly contentious.

      Faraj and Xiao contend that coordination practices of fast-response organizations differ from typical groups' structures, decision-making processes and cultures.

      1) Expertise is distributed 2) Coordination practices are cross-boundary 3) Knowledge differences are magnified

    18. In this paper, we focus on the collective perfor-manceaspectofcoordinationandemphasizethetem-poral unfolding and situated nature of coordinativeaction. We address how knowledge work is coor-dinated in organizations where decisions must bemade rapidly and where errors can be fatal.

      Summary of paper focus

    1. Also, with disaster research having strong theoretical ties with the study of collective behavior(Wenger 1987), and with the field of collective behavior often looking at issues related to social change {e.g., riots, social move­ments), another link between disasters and social change has implicitly

      Neal connects concerns about disaster-driven social change and the natural desire for people to respond via some collective action impulse.

      Nice segue into SBTF as collection action motivated by social change

    2. Cross-cultural disaster research may also provide further insights regard­ing disaster phases.

      Evokes feminist, critical and post-colonial theory, as well as multi- and inter-disciplinary research methods/perspectives, e.g., anthropology, etc.

      These points of view may also provide insights on how disaster phases interact with wholly different notions of social time.

    3. As the field of collective behavior highlights, individuals in social settings have different perceptions of reality-social settings are not homogeneous (e.g., Turner and Killian I 987).' Thus, to tap further the mutually inclusive, multidimen­sional and social-time aspects of disaster phases, researchers should draw upon multiple publics and their definition of disaster phases.

      Neal suggests avoiding the disaster phase terminology when interviewing various stakeholders (emergency mgt, disaster-affected people, government agencies) in order to "draw upon various groups' language to describe phases" instead of the National Governors Assn phases.

    4. Consid� e�g the redefinition of disaster phases based on social time may help us WJtb the broader and more important struggle of defining disaster.

      What happened with this call to arms? Did Neal or others in the emergency management research community follow up?

      http://ijmed.org/articles/624/download/ <-- Neal's 2013 paper on "Social Time and Disaster"

    5. Consid� e�g the redefinition of disaster phases based on social time may help us WJtb the broader and more important struggle of defining disaster

      Neal wrote a more recent 2013 paper discussing the topic of social time and disaster.

      http://ijmed.org/articles/624/download/

    6. D!saster and hazard researchers have recognized the social time aspect of disasters. Dynes_ (1970) alludes to social time regarding the social consequences of a disaster. Dynes observes that social time: is important because the activities of every community vary over a period of time duri�� �e day, the week, the month, and the year. S�c� patterned acuv1nes have implications for potential damage within thecommurnty, for preventative activity within the commu­�ty, for the inventory of the meaning of the disaster, for the rmm�?1ate tasks necessary within the community, and for the mobilizanon of community effort. (Dynes 1970, p. 63)

      As early as 1970 (pre-Zerubavel, Adam, Nowotny, and Giddens), Dynes suggested that social time be taken into account for disaster response.

      ** Get this paper. What social time work did he cite?

    7. The Phases Should Reflect Social Rather Than Objective Time Giddens (I 987), although not the first, makes an important theoretical distinction between social and objective time. Giddens defines clock time as the use of quantified units. Clock time represents "day-to-day" structured activities. Typically, studies refer to disaster phases with hours, days, weeks, or years. Social time, however, is contingent upon the needs or opportunities of a society.

      Cites Giddens here to describe differences between social time (sturcturation) and clock time.

    1. The technology that favored democracy is changing, and as artificial intelligence develops, it might change further.

      i would like to see arguments around this as i further read.

    1. What social media did was to transform discovery into a passive rather than an active process.

      Nicely put observation on how social media changed the way in which we discover information.

  2. Dec 2018
    1. One is to imagine that culture is a self-contained "super-organic" reality with forces and purposes of its own; that is, to reify it. Another is to claim that it consists in the brute pattern of behavioral events we observe in fact to occur in some identifiable community or other; that is, to reduce it.

      Geertz warns about the danger of reducing or reifying culture. While this may have been a debate in anthropology in 1973 (hopefully resolved), it still seems to resonate in HCI today between the factions of technological determinism and social constructionism

    1. movements, among other things, are attempts to intervene in the public sphere through collective, coordinated action. A social movement is both a type of (counter)public itself and a claim made to a public that a wrong should be righted or a change should be made.13 Regardless of whether movements are attempt-ing to change people’s minds, a set of policies, or even a government, they strive to reach and intervene in public life, which is centered on the public sphere of their time.

      a solid definition of what a movement is

    1. His dream is to put a live Web server with easy-to-edit pages on every person's desktop, then connect them all in a robust network that feeds off itself and informs other media.

      An early statement of what would eventually become all of social media.

    2. The Weblog community is basically a whole bunch of expert witnesses who increase their expertise constantly through a sort of reputation engine."

      The trouble is how is this "reputation engine" built? What metrics does it include? Can it be gamed? Social media has gotten lots of this wrong and it has caused problems.

    3. Man, this is a beast that's hungry all the time."

      Mind you he's saying this in 2001 before the creation of more wide spread social networks.

    1. It is based on reciprocity and a level of trust that each party is actively seeking value-added information for the other.

      Seems like this is a critical assumption to examine for current media literacy/misinformation discussions. As networks become very large and very flat, does this assumption of reciprocity and good faith hold? (I'm thinking, here, of people whose expertise I trust in one domain but perhaps not in another, or the fact that sometimes I'm talking to one part of my network and not really "actively seeking information" for other parts.)

    1. On the net, you have public, or you have secrets. The private intermediate sphere, with its careful buffering. is shattered. E-mails are forwarded verbatim. IRC transcripts, with throwaway comments, are preserved forever. You talk to your friends online, you talk to the world.
    1. Maybe during this Christmas break I will find the guts to do a purge but I know that it will be a "fake purge".

      I've been seeing a lot about (Japanes) minimalism this past year in relation to physical goods, but hadn't considered what a minimal social media presence would look like.

    1. I adopted a ‘horses for courses’ approach to keep it in check. I used Facebook primarily to keep in touch with family and real-world friends, I used Twitter for tech discussions and networking, I used LinkedIn sparingly, and I dropped any social media that didn’t fulfill a specific function for me.
    1. sir

      Mr. Heywood has a point regarding resort areas. Connecting this to modern day resorts, when these things pop up, the prices of everyday things are inflated. This results in the residents of the area not being able to afford to live there and become impoverished.

    2. "move in a circle"

      This phrase is often used in Austen's works, referring to the particular society or selected families a person interacts with, and which usually indicates a level of social class. In Pride and Prejudice, Mrs. Gardener says she "moved in different circles" from the Darcys, and in Emma, Mrs. Elton hopes to install Miss Fairfax as a governess in a better circle than she might be able to procure on her own.

    3. neither able to do or suggest anything

      This might be a genuine characerization of the wife or possibly a sarcastic comment on the stereotypes of women during the time.

    4. fancy themselves equal

      Highlights the slight strife between "old" and "new" money. Lady Denham's words seem reminiscent of Sir Walter Elliot's disdain for those who made their fortune instead of inheriting it in Persuasion.

    5. The mere trash

      Many people criticized circulating libraries in the 17th and 18th centuries due to the genre they gave access to--the novel. It was thought that the novel would ruin people's minds and give them false expectations of life. Source.

    6. rich people

      A powerful final line concluding the chapter, as it reflect's Austen's larger criticism of "rich people" who she believes often behave with distasteful and contemptible motivations. In this instance, Austen labels rich people as "sordid."

    7. seen romantically situated among wood on a high eminence at some little distance

      This description of a cottage reminds me of the contrast in Austen's Sense and Sensibility between how the upper classes and the landed gentry view cottages. The upper classes view cottages in a romantic way as cute, comfy homes, however the landed gentry know that cottages result out of a neccesity brough on by an oppresive and restrictive economic system.

      https://janeaustensworld.wordpress.com/tag/19th-century-cottages/

    8. Links to common words/themes throughout the annotations

    1. Today, I had the privilege of speaking on a panel at the Comparative and International Education Society’s Annual Conference with representatives of two open education projects that depend on Creative Commons licenses to do their work. One is the OER publisher Siyavula, based in Cape Town, South Africa. Among other things, they publish textbooks for use in primary and secondary school in math and science. After high school students in the country protested about the conditions of their education – singling out textbook prices as a barrier to their learning – the South African government relied on the Creative Commons license used by Siyavula to print and distribute 10 million Siyavula textbooks to school children, some of whom had never had their own textbook before. The other are the related teacher education projects, TESSA, and TESS-India, which use the Creative Commons Attribution Share-Alike license on teacher training materials. Created first in English, the projects and their teachers rely on the reuse rights granted by the Creative Commons license to translate and localize these training materials to make them authentic for teachers in the linguistically and culturally diverse settings of sub-Saharan Africa and India. (Both projects are linked to and supported by the Open University in the UK, http://www.open.ac.uk/, which uses Creative Commons-licensed materials as well.) If one wakes up hoping to feel that one’s work in the world is useful, then an experience like this makes it a good day.

      I think contextualizing Creative Commons material as a component in global justice and thinking of fair distribution of resources and knowledge as an antidote to imperialism is a provocative concept.This blog, infojusticeorg offers perspectives on social justice and Creative Commons by many authors.

  3. Nov 2018
    1. Digital connectivity reshapes how movements connect, organize, and evolve during their lifespan.
    2. My goal in this book was above all to develop theories and to present a conceptual analysis of what digital technologies mean for how social move-ments, power and society interact, rather than provide a complete empirical descriptive account of any one movement.
    1. Facebook’s lofty aims were emblazoned even on securities filings: “Our mission is to make the world more open and connected.”

      Why not make Facebook more open and connected? This would fix some of the problems.

      As usual, I would say that they need to have a way to put some value on the "connections" that they're creating. Not all connections are equal. Some are actively bad, particularly for a productive and positive society.

    1. The opening section also lays out come key concepts for the book, including social movement capacities (“social movements’ abilities”) and signals (“their repertoire of protest, like marches, rallies, and occupations as signals of those capacities”) (xi), as well as the problem of tactical freeze (“the inability of these movements to adjust tactics, negotiate demands, and push for

      I believe this is an excellent way to share thoughts in a book club.

    1. As deepfakes make their way into social media, their spread will likely follow the same pattern as other fake news stories. In a MIT study investigating the diffusion of false content on Twitter published between 2006 and 2017, researchers found that “falsehood diffused significantly farther, faster, deeper, and more broadly than truth in all categories of information.” False stories were 70 percent more likely to be retweeted than the truth and reached 1,500 people six times more quickly than accurate articles.

      This sort of research should make it eaiser to find and stamp out from the social media side of things. We need regulations to actually make it happen however.

    1. But now it was all for the best: a law of nature, a chance for the monopolists to do good for the universe. The cheerer-in-chief for the monopoly form is Peter Thiel, author of Competition Is for Losers. Labeling the competitive economy a “relic of history” and a “trap,” he proclaimed that “only one thing can allow a business to transcend the daily brute struggle for survival: monopoly profits.”

      Sounds like a guy who is winning all of the spoils.

    1. ​BUT, our students will not (most) have the economic, cultural, historical provenances nor intention ... the reality of community college students is that most will not produce academic discourse but will eak through multiple courses with minimum academic writing (and if so, poorly) while they will continue their certain continued marginalized communities that are, per Bourdieu, decapitalized (lacking cultural capital)​, whereas critical rhetoric could address these systemics inegalitarianism.

    1. Entscheidend ist, dass sie Herren des Verfahrens bleiben - und eine Vision für das neue Maschinenzeitalter entwickeln.

      Es sieht für mich nicht eigentlich so aus als wären wir jemals die "Herren des Verfahrens" gewesen. Und auch darum geht es ja bei Marx. Denke ich.

    1. Instructional Design Strategies for Intensive Online Courses: An Objectivist-Constructivist Blended Approach

      This was an excellent article Chen (2007) in defining and laying out how a blended learning approach of objectivist and constructivist instructional strategies work well in online instruction and the use of an actual online course as a study example.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Learning Needs Analysis of Collaborative E-Classes in Semi-Formal Settings: The REVIT Example.

      This article explores the importance of analysis of instructional design which seems to be often downplayed particularly in distance learning. ADDIE, REVIT have been considered when evaluating whether the training was meaningful or not and from that a central report was extracted and may prove useful in the development of similar e-learning situations for adult learning.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. They can spew hate amongst themselves for eternity, but without amplification it won’t thrive.

      This is a key point. Social media and the way it amplifies almost anything for the benefit of clicks towards advertising is one of its most toxic features. Too often the extreme voice draws the most attention instead of being moderated down by more civil and moderate society.

    1. My work, rooted in both theory and practice, reveals three things that are essential to bringing individuals into the circle of change: autonomy, guidance, and a sense of social community, or working toward a larger meaningful goal.
    1. Humans participate in social learning for a variety of adaptive reasons, such as reducing uncertainty (Kameda and Nakanishi, 2002), learning complex skills and knowledge that could not have been invented by a single individual alone (Richerson and Boyd, 2000; Tomasello, Kruger, and Ratner, 1993), and passing on beneficial cultural traits to offspring (Palmer, 2010). One proposed social-learning mechanism is prestige bias (Henrich and Gil-White, 2001), defined as the selective copying of certain “prestigious” individuals to whom others freely show deference or respect in orderto increase the amount and accuracy of information available to the learner.Prestige bias allows a learner in a novel environment to quickly and inexpensively choose from whom to learn, thus maximizing his or her chances of acquiring adaptive behavioral so lutions toa specific task or enterprisewit hout having to assess directly the adaptiveness of every potential model’s behavior.Learners provide deference to teachers in order to ingratiate themselves with a chosen model, thus gaining extended exposure to that model(Henrich and Gil-White, 2001).New learners can then use that information—who is paying attention to whom—to increase their likelihood of choosing a good teacher.

      Throughout this article are several highlighted passages that combine to form this annotation.

      This research study presents the idea that the social environment is a self-selected learning environment for adults. The idea of social prestige-bias learning is intriguing because it is derived from the student, not an institution nor instructor. The further idea of selecting whom to learn from based on prestige-bias also creates further questions that warrant a deeper understanding of the learner and the environment which s/he creates to gain knowledge.

      Using a previously conducted experiment on success-based learning and learning due to environmental change, this research further included the ideal of social prestige-biased learning.self-selected by the learner.

      In a study of 167 participants, three hypotheses were tested to see if learners would select individual learning, social learning, prestige-biased learning (also a social setting), or success-based learning. The experiment tested both an initial learning environment and a learning environment which experienced a change in the environment.

      Surprisingly, some participants selected social prestige-biased learning and some success learning and the percentages in each category did not change after the environmental change occurred.

      Questions that arise from the study:

      • Does social prestige, or someone who is deemed prestigious, equate to a knowledgeable teacher?
      • Does the social prestige-biased environment reflect wise choices?
      • If the student does not know what s/he does not know, will the social prestige-bias result in selecting the better teacher, or just in selecting a more highly recognized teacher?
      • Why did the environmental change have little impact on the selected learning environment?

      REFERENCE: Atkinson, C., O’Brien, M.J., & Mesoudi, A. (2012). Adult learners in a novel environment use prestige-biased social learning. Evolutionary Psychology, 10(3), 519-537. Retrieved from (Prestige-biased Learning )

      RATINGS content, 9/10 veracity, 8/10 easiness of use, 9/10 Overall Rating, 8.67/10

  4. Oct 2018
    1. Why do people troll? Eight factors are given, which might boil down to:

      • Perceived lack of consequences.
      • Online mob mentality.
    1. news is stressful and has little impact on the day-to-day routines —use it for class assignments, avoid it otherwise.” While a few students like this one practiced news abstinence, such students were rare.

      This sounds a bit like my college experience, though I didn't avoid it because of stressful news (and there wasn't social media yet). I generally missed it because I didn't subscribe directly to publications or watch much television. Most of my news consumption was the local college newspaper.

    1. When students are shown quick techniques for judging the veracity of a news source, they will use them. Regardless of their existing beliefs, they will distinguish good sources from bad sources.

      https://webliteracy.pressbooks.com/

    1. While Silvia and Irene are in a very different place from Lacey, in that they are able to work and attend college, respectively, at this point in their lives, they and their children are still at risk

      Lacey no tuvo el privilegio de educación superior lo cual es uno de los mayores determinantes del ingreso y por ende de la salud.

    1. The Online Disinhibition Effect (John Suler, 2004) - the lack of restraint shown by some people when communicating online rather than in person. (It can be good as well as bad. How can we reduce the bad behavior?)

      https://en.wikipedia.org/wiki/Online_disinhibition_effect http://truecenterpublishing.com/psycyber/disinhibit.html

    1. On the other hand, though much less likely, is the possibility of the gig economy becoming a long-term fixture of capitalism.

      Whether or not the gig economy is here to stay, the result will be widespread un- or under-employment caused by technological displacement. Whether workers are gathered into a gig economy or are outright unemployed is what remains to be seen.

    1. “The purpose of education, finally, is to create in a person the ability to look at the world for himself, to make his own decisions… What societies really, ideally, want is a citizenry which will simply obey the rules of society. If a society succeeds in this, that society is about to perish. The obligation of anyone who thinks of himself as responsible is to examine society and try to change and fight it – at no matter what risk. This is the only hope that society has. This is the only way societies change.” — James Baldwin, “A Talk to Teachers,” 1963
    1. On social media, the country seems to divide into two neat camps: Call them the woke and the resentful. Team Resentment is manned—pun very much intended—by people who are predominantly old and almost exclusively white. Team Woke is young, likely to be female, and predominantly black, brown, or Asian (though white “allies” do their dutiful part). These teams are roughly equal in number, and they disagree most vehemently, as well as most routinely, about the catchall known as political correctness.
    1. The last thing most people need is another microphone. They need something to say. (And time to say it.)

      Interesting to hear this from 2006 and looking back now...

    1. In the past, technology has extended the human body, providing it with tools to act upon the world. But at some point, a tool becomes something more. When does it become part of its user?

      In this passage, the author is claiming that with transhumanism and the growing appeal of technology as tools to advance or "extend" the human body, it can blur the lines between what is considered human and what is considered technology. For example, the author previously mentions social media and cell phone use in today's world. In today's society, using smartphones has become second nature. The author is implying that in the near future tools and technology such as anabolic steroids, laser surgery, advanced prosthetic limbs, etc can also become as prominent to humans as cellphones/social media is now.

  5. Sep 2018
    1. Snap is also confident that it can reach a high amount of new voters: 80 percent of its users are over 18, so this campaign won't just fall on well-meaning (but still too young) thumbs

      Snapchat becomes confident due to being the new form of communication and it happens to be the most activated and number one form of social media. This allows people to be reached out because almost everyone has a Snapchat account.

    1. We can’t force two people to become friends, nor should we want to.

      How many social engineers does it take to change a light bulb? An infinite number. That's why they leave you in the dark till you become the change you seek and make your own light to live by.

      If you cant force two people to become friends, then how do 'diplomats' (political manipulators?) profess to do the same thing with entire nations? Especially while so often, using the other hand to deal the deck for other players, in a game of "let's you and him fight"; or just being bloody mercenaries with sheer might is right political ethos installed under various euphemistic credos. 'My country right or wrong' or 'Mitt Got Uns' or ...to discover weapons of mass destruction...etc.

      So much for politics and social engineering, but maybe we can just be content with not so much forcing two people to be friends, as forcing them to have sex while we're filming them, so we can create more online amateur porn content. LOL ;)

    1. Facebook does not allow third-party apps to display your newsfeed. This applies to Hootsuite. For this reason, you’ll always have to use Facebook natively. The same pretty much goes for Instagram.

      Facebook does not allow third-party apps to display your newsfeed. This applies to Hootsuite. For this reason, you’ll always have to use Facebook natively. The same pretty much goes for Instagram.

    1. This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods. WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.
    1. All of these platforms are different and they focus on different needs. And yet, the foundation is all the same: people subscribing to receive posts from other people. And so, they are all compatible. From within Mastodon, Pleroma, Misskey, PixelFed and PeerTube users can be followed and interacted with all the same.
    1. ActivityPub is a decentralized social networking protocol based on the ActivityStreams 2.0 data format. ActivityPub is an official W3C recommended standard published by the W3C Social Web Working Group. It provides a client to server API for creating, updating and deleting content, as well as a federated server to server API for delivering notifications and subscribing to content.
    1. <link rel="pingback" href="https://webmention.io/username/xmlrpc" /> <link rel="webmention" href="https://webmention.io/username/webmention" />
    1. promuoverne
    2. Appare necessario, per quell’indispensabile ripristino delle condizioni della fiducia, avere la massima attenzione alle diversità di ogni tipologia di amministrazione, dal piccolo comune al grande ente centrale, mettendo in evidenza sempre le tante eccellenze presenti, nate spesso dell’impegno di una unità organizzativa e dei suoi dirigenti, che devono trovare pubblicità, apprezzamento dell’opinione pubblica, effettivi riconoscimenti da parte del governo centrale. Anche appoggiandosi a agenzie indipendenti, il governo dovrebbe curare un catalogo ricco e aggiornato di “buoni esempi”, che porti con sé anche la strumentazione amministrativa utile per replicarlo.

      … Valorizzare le buone pratiche realizzate dagli enti italiani e promuoverne la diffusione dovrebbe essere un obiettivo prioritario utilizzando il bando Horizon 2020 "Blockchains for Social Good", links: [https://ec.europa.eu/research/eic/index.cfm?pg=prizes_blockchains] [https://ec.europa.eu/research/eic/pdf/infographics/eic_horizon-prize-blockchains.pdf] Il bando ha il seguente Timetable aggiornato a maggio 2018:<br> 16 May 2018 – contest opens ; 2 April 2019 – deadline for registration of interest ; 3 September 2019 – deadline to submit applications.<br> This prize aims to develop solutions to social innovation challenges using distribute ledger technology. The contest is open to individuals, groups, organisations and companies.

    1. Oh no I’m sure any delta is brighter than an epsilon like those. That’s one of the wonderful things about being a gamma. We’re not too stupid and we’re not too bright to be a gamma is to be just right

      this part of the dialogue creates a great sense of social and class inequality in the world created by this movie. Deltas are considered wise and have greater responsibilities whereas gammas are considered somewhere in between and are in charge of more mundane matters.

    1. Rather than imagine a timeless world of connection and multiple paths, the Stream presents us with a single, time ordered path with our experience (and only our experience) at the center.
    1. Trump’s digital strategy, Singer and Brooking argue, is not unlike militant groups and street gangs that leverage the viral web to tell a compelling story about policy, religious dogma, or their own perceived fearsomeness, all in an engaging voice, while repeatedly targeting exactly the right audience to trigger a dopamine response or sheer terror, both online and IRL. "To 'win' the internet, one must learn how to fuse these elements of narrative, authenticity, community, and inundation," Singer and Brooking write. "And if you can 'win' the internet, you can win silly feuds, elections, and deadly serious battles."
    2. In 1968, two psychologists wrote a paper theorizing that computers could become communications devices. The US Department of Defense ran with the idea, and in 1969 the precursor of the internet as we know it today, the military-operated ARPANET, went live. The National Science Foundation took over in the 1980s before business began to dominate in the 90s, at which point, things started to grow in exponential leaps. There were 28,000 internet users in 1987, according to Singer and Brooking. Today, there are billions.
    3. Trump's unlikely rise to the White House was symptomatic of social, political, and technological trends decades in the making—trends that gave rise to the internet and social media and which, in turn, transformed the way we control, spy on, and kill each other.
    1. All tribes need tribal leaders, who in turn need loyalty. Followers of Corbyn and Trump will both detest the comparison, but note how both have the merch, the chants, the hagiography. They’re radically different, but both are products of the tribalism that social media has accidentally brought about.
    1. My relationship is a lot healthier with blogs that I visit when I please. This is another criticism I have with RSS as well—I don’t want my favorite music blog sending me updates every day, always in my face. I just want to go there when I am ready to listen to something new. (I also hope readers to my blog just stop by when they feel like obsessing over the Web with me.)

      Amen!

  6. Aug 2018
    1. Our empirical example also highlighted the value of achieving virtual temporal symmetry for members of a geographically dispersed community. As electronic me­dia become increasingly central to organizational life, in­dividuals may use asynchronous media in various ways to shape devices of virtual symmetry that help them co­ordinate across geographical distance and across multiple temporal structures. This suggests that when studying the use of electronic media, researchers should pay attention to the conditions in which virtual temporal symmetry may be enacted to coordinate distributed activities, and with what consequences. Interesting questions for empirical research include the following. As work groups in orga­nizations become more geographically dispersed and/or more dependent on electronic media, do members enact virtual temporal symmetry for certain purposes? If so, for which types of purposes? And how? If not, how do such work groups achieve temporal coordination?

      virtual coordination across geographic distance via electronic media and how it shapes/is shaped by temporal structures

    1. social ecology formally emerged with the work of Murray Bookchin

      We should clarify that the term "social ecology" is not Bookchin's, but, at least according to Janet Biehl's Ecology or Catastrophe: The Life of Murray Bookchin, originated with E.A. Gutkind. In 1953, Gutkind authored Community and Environment: A Discourse on Social Ecology. Use of the term may go back even further.

    2. the critique of a thing is inherent in the alternative presented

      Posing alternatives to capitalism and the nation-state simultaneously: 1) asserts the inadequacy of those institutions (a "negative" critique), and 2) asserts the superiority of the alternative being posed (a "positive" critique).

    3. We refer to the plural

      From our perspective, we are seeking to develop a social ecological theory within a broader ecosocialist movement in which there is no privileged praxis, but a plurality of mutually reinforcing practical strategies.

      Already, we can see that "Libertarian Municipalist," dual power, revolutionary syndicalist, and prefigurative approaches can be taken. Often, the praxes that emerge from the broadly ecosocialist sphere start from a high degree of theoretical agreement, but diverge strategically and not antagonistically.

    4. About

      Greetings! Potemkin here (one of the primary authors), just getting the hang of this annotation system. It's open-source. I like the idea of using annotation to facilitate deeper discussion, and perhaps as a more civilized and precise method of commenting or interacting with a website. I think this can facilitate virtual study groups and other remote collaborations. Exciting stuff!

      Please annotate, comment on blog posts that are open for comments, and let's try to build a positive, supportive, open ecosocialist community dedicated to creating Better Worlds and Brighter Futures!

    1. tri-fold pamphlet created around 2007

      I attempted to keep some of the formatting of the original, but this was not very successful. There are no doubt better overviews of Esperanto out there, but I wanted to highlight the little information I could find at the time on Esperanto's radical history, particularly among anarchists.

      I still believe in the potential of Esperanto. It's very simple and accessible for working-class and impoverished people--taking little time and with an abundance of free resources--to learn. After that, a world of potential is opened, being able to speak with any other Esperantist the world over and sharing information in a universal way.

      To me, Esperanto has the potential to facilitate a truly international revolutionary movement and its use helps dissolve borders and embodies the humanistic, anarchistic, cosmopolitan idea of "unity-in-diversity."

    1. This approach, I believe, works well for digital ethics, where we try to articulate rules that govern how we interact with each other through digital technologies. For example, when social media emerged, there was no fixed rule about when it is appropriate to tag someone in a picture and when it isn’t. So we figured out a netiquette and ethical norms as we were going along, based on experience, existing norms, insights from experts etc. There still might be areas of disagreement, but I would argue that overall we have come to an understanding of what is acceptable and what isn’t on this issue, and these norms are passed on to new users of social media.
    2. Phillip Kitcher, in the introduction of The Ethical Project describes the project of this pragmatic naturalism as follows: “Ethics emerges as a human phenomenon, permanently unfinished. We, collectively, made it up, and have developed, refined, and distorted it, generation by generation. Ethics should be understood as a project --the ethical project-- in which we have been engaged for most of our history as a species.” This a functionalist view sees ethics as a set of guidelines that make communal living possible. A successful ethical system is one that can fulfill this function.
    3. For a pragmatist, documenting this change and questioning what perpetuated it in order to better understand our current norm is the more interesting endeavor. From this understanding, ethical guidelines can be crafted, but the descriptive process precedes the prescriptive one.
    4. According to pragmatics, our attitudes and norms change in response to societal changes. For example, in an episode of Mad Men a guest at a party could be seen slapping a child that wasn’t his. It was one of the many (and one of the milder) examples in which the show’s creators’ reminded their audience that in the 1960s different rules governed social interactions.
    1. The social foci hypothesis predicts that links are more likely to form among individuals who, for example, are classmates, co-workers, or go to the same gym (they share a social foci). The triadic closure hypothesis predicts that links are more likely to form among individuals that share “friends” or acquaintances. Finally, the homophily hypothesis predicts that links are more likely to form among individuals who share social characteristics, such as tastes, cultural background, or physical appearance (Lazarsfeld and Merton 1954), (McPherson et al. 2001).

      definitions of social foci, triadic closure, and homophily within network science.

    1. merican public life has become increasingly ideologically segregated as newspapers have given way to screens. But societies have experienced extremism and fragmentation without the assistance of Silicon Valley for centuries. And the polarization in the US began long ago, with the rise of 24-hour cable news. So just how responsible is the internet for today’s divisions? And are they really as bad as they seem?
    1. Social media is well-understood to be contributing to identity politics, but I’d argue it’s contributing to something deeper: identity paralysis. This condition is one in which we have a forced awareness of how everything we say and do — even the seemingly inconsequential, like the shoes we wear, or the airline we fly — reflects on us.

      This relates to another article on gender dysphoria in teens.

      Among the noteworthy patterns Littman found in the survey data: 21 percent of parents reported their child had one or more friends become transgender-identified at around the same time; 20 percent reported an increase in their child’s social media use around the same time as experiencing gender dysphoria symptoms; and 45 percent reported both.

      Is rapid-onset gender dysphoria a response—if only partially—to the identity paralysis borne out of an age of pervasive social media?

    1. we can’t just recreate the same thing we’re trying to escape, and we can’t expect the solution to be precisely as easy on us as the problem was.
    2. Just like in real life, where your bar trivia team doesn’t really overlap with your work softball team or your church bowling league, all of your online communities gathered in their own places, ones best suited to them, and you didn’t have to act as all facets of yourself simultaneously when trying to only interact with one.
    1. You might have seen the hashtag #BlackLivesMatter in the previous step. In this 6-minute video, #BlackTwitter after #Ferguson, we meet activists who were involved in the movement and learn about their own uses of Twitter as a platform of protest. Hashtags, when used like this, can be extremely complex in the way they represent ideas, communities and individuals.
    1. To start you thinking, here’s a quote from lead educator Jean Burgess. Jean considers how Twitter has changed since 2006 and reflects on her own use of the platform in the context of changing patterns of use. In response to the suggestion that Twitter is a dying social media platform, Jean states that: the narratives of decline around the place at the moment […] have to do with a certain loss of sociability. And to those of us for whom Twitter’s pleasures were as much to do with ambient intimacy, personal connections and play as they were to do with professional success theatre, celebrity and breaking news, this is a real, felt loss: sociability matters.
    1. Leaming viewed as situated activity has as its central defining characteristic a process that we call legitimate peripheral par­ticipation. By this we mean to draw attention to the point that learners inevitably participate in communities of practitioners and that the mastery of knowledge and skill requires newcom­ers to move toward full participation in the sociocultural practices of a community.

      LPP definition

      The phrase "situated learning" is contested (see pp. 31-35). Lave and Wenger use this definition:

      "In our view, learning is not merely situated in practice — as if it were some independently reifiable process that just happened to be located somewhere; learning is an integral part of generative social practice in the lived-in world. The problem — and the central preoccupation of this monograph — is to translate this into a specific analytic approach to learning. Legitimate peripheral participation is proposed as a descriptor of engagement in social practice that entails learning as an integral constituent."

      At the end of the chapter, Lave and Wenger offer this description:

      "In conclusion, we emphasize the significance of shifting the analytic focus from the individual as learner to learning as participation in the social world, and from the concept of cognitive processes to the more-encompassing view of social practice."

    2. "Legitimate peripheral participation" provides a way to speak about the relations between newcom­ers and old-timers, and about activities, identities, artifacts, and communities of knowledge and practice. It concerns the process by which newcomers become part of a community of practice. A person's intentions to learn are engaged and the meaning of learning is configured through the process of be­coming a full participant in a sociocultural practice. This so­cial process includes, indeed it subsumes, the learning of knowledgeable skills.

      This is an apt description for how SBTF volunteers are onboarded and learn how to contribute to a crowdsourcing process.

    1. Thus, an enacted environment has both a public and a private face. Publicly, it is a construction that is usually visible to observers other than the actor. Privately, it is a map of if-then assertions in which actions are related to out- comes. These assertions serve as expectations about what will happen in the future.

      How does the process of social coordination influence the actions, interpretations, and predictions that are enacted from the map?

    2. At the heart of enactment is the idea that cognition lies in the path of the action. Action precedes cognition and focuses cognition. The sensemaking sequence implied in the phrase, ‘How can I know what I think until I see what I say?’ involves the action of talking, which lays down traces that are examined, so that cognitions can be inferred. These inferred cognitions then become pre- conceptions which partially affect the next episode of talk, which means the next set of traces deposited by talk are affected partially by previous labels and partially by current context. These earlier inferences also affect how the next episode of talk is examined and what is seen.

      Related to the preceding annotation, how does the social coordination process influence enactment?

      Are the volunteers "talking out loud" on Slack as a means of sensemaking to themselves or with others?

    1. Another way to use a classification system is to consider if there are other possible values that could be used for a given dimension.

      Future direction: Identify additional sample values and examples in the literature or in situ to expand the options within each dimension.

    2. For researchers looking for new avenues within human computation, a starting point would be to pick two dimensions and list all possible combinations of values.

      Future direction: Apply two different human computation dimensions to imagine a new approach.

    3. These properties formed three of our dimensions: motivation, human skill, and aggregation.

      These dimensions were inductively revealed through a search of the human computation literature.

      They contrast with properties that cut across human computational systems: quality control, process order and task-request cardinality.

    4. A subtle distinction among human computation systems is the order in which these three roles are performed. We consider the computer to be active only when it is playing an active role in solving the problem, as opposed to simply aggregating results or acting as an information channel. Many permutations are possible.

      3 roles in human computation — requester, worker and computer — can be ordered in 4 different ways:

      C > W > R // W > R > C // C > W > R > C // R > W

    5. The classification system we are presenting is based on six of the most salient distinguishing factors. These are summarized in Figure 3.

      Classification dimensions: Motivation, Quality control, Aggregation, Human skill, Process order, Task-Request Cardinality

    6. "... groups of individuals doing things collectively that seem intelligent.” [41]

      Collective intelligence definition.

      Per the authors, "collective intelligence is a superset of social computing and crowdsourcing, because both are defined in terms of social behavior."

      Collective intelligence is differentiated from human computation because the latter doesn't require a group.

      It is differentiated from crowdsourcing because it doesn't require a public crowd and it can happen without an open call.

    7. Data mining can be defined broadly as: “the application of specific algorithms for extracting patterns from data.” [17]

      Data mining definition

      No human is involved in the extraction of data via a computer.

    8. “... applications and services that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge...” [48]

      Social computing definition

      Humans perform a social role while communication is mediated by technology. The interaction between human social role and CMC is key here.

    9. The intersection of crowdsourcing with human computation in Figure 1 represents applications that could reasonably be considered as replacements for either traditional human roles or computer roles.

      Authors provide example of language translation which could be performed by a machine (when speed and cost matter) or via crowdsourcing (when quality matters)

    10. “Crowdsourcing is the act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.” [24

      Crowdsourcing definition

      Labor process of worker replaced by public.

    11. modern usage was inspired by von Ahn’s 2005 dissertation titled "Human Computation" [64] and the work leading to it. That thesis defines the term as: “...a paradigm for utilizing human processing power to solve problems that computers cannot yet solve.”

      Human computation definition.

      Problem solving by human reasoning and not a computer.

    12. When classifying an artifact, we consider not what it aspires to be, but what it is in its present state.

      Criterion for determining when/if the artifact is a product of human computation.

    13. human computation does not encompass online discussions or creative projects where the initiative and flow of activity are directed primarily by the participants’ inspiration, as opposed to a predetermined plan designed to solve a computational problem.

      What human computation is not.

      The authors cite Wikipedia as not an example of human computation.

      "Wikipedia was designed not to fill the place of a machine but as a collaborative writing project in place of the professional encyclopedia authors of yore."

    14. Human computation is related to, but not synonymous with terms such as collective intelligence, crowdsourcing, and social computing, though all are important to understanding the landscape in which human computation is situated.

    1. Because of both the content that people upload and the behavioral traces that they leavebehind, social network sites have unprecedented quantities of data concerning humaninteraction. This presents unique opportunities and challenges. On one hand, SNSs offera vibrant “living lab” and access to behavioral data at a scale inconceivable to manysocial scientists. On the other, the data that are available present serious research ethicsquestions and introduce new types of biases that must be examined (boyd and Crawford2012)

      The scope and scale of trace data —from settings, public facing fatures, and server-side — presents similar challenges as technological platform changes = new ethics/privacy issues.

    2. For those of us who believe that social network sites are socio-technical systems, in whichsocial and technical factors shape one another, failing to describe the site under studyignores the fact that the technological constraints and affordances of a site will shapeuser practices and that social norms will emerge over time. Not including informationabout what the feature set was at the time of data collection forecloses the possibility ofidentifying patterns that emerge over time and through the accumulated scholarshipacross a range of sites and user samples. Unfortunately, because they have no knowledgeabout how things will continue to evolve and which features will becomeimportant to track, researchers may not be able to identify the salient features to reportand may struggle with devoting scarce publication space to these details, but this doesn’tundermine the importance of conscientious consideration towards describing the artifactbeing analyzed.

      What about documenting technological features/artifacts on a stand-alone website or public repository, like Github to account for page limits?

    3. In order to produce scholarship that will be enduring, the onus is on social mediaresearchers to describe the technological artifact that they are analyzing with as muchcare as survey researchers take in describing the population sampled, and with as muchdetail as ethnographers use when describing their field site. This is not to say thatresearchers must continue to describe technologies as if no one knows what they are—weare beyond the point where researchers must explain how electronic mail or “email” islike or unlike postal mail. But, rather, researchers must clearly describe the socio-technical context of the particular site, service, or application their scholarship isaddressing. In addition to attending to the technology itself, and the interchange betweentechnical and social processes, we believe SNS researchers should make a concertedeffort to include the date of data collection and to describe the site at the moment of datacollection and the relevant practices of its users. These descriptions will enable laterresearchers to synthesize across studies to identify patterns, much in the same wayreporting exact effect sizes allows for future meta-analyses

      Excellent point and important for my SBTF studies.

    4. One key challenge of studying social media is that designers of these tools are innovatingat a very rapid timeframe and often with little advance notice. Given the rapidly changinginfrastructure and the timeframe of academic publishing, the site at the time of datacollection is likely to be very different from its incarnation at the point of publication.

      Challenges of studying SNSs:

      Temporal effects of platform changes.

      Later in the passage, the authors encourage researchers to fully describe the SNS/platform features studied and any potential effects on user behavior, practices, and norms to avoid orphaned research.

    5. Because of howpeople's position within the SNS shapes their experiences of it, activity-centric analysesrequire contextualization and translation, not unlike what social scientists studyingdiffering cultural practices have had to do for decades.

      Challenges of studying SNSs:

      User's position with the social graph shapes experience and interactions.

    6. What oneexperiences on SNSs and the content to which one is exposed differs depending on thestructure of one's network, a user's individual preferences and history, and her activitiesat that moment.

      Challenges of studying SNSs:

      Content varies by network structure, preferences, history and user activity -- but also site technology/upgrades/new features/deprecated features.

    7. By far the most pressing challengefor SNS scholars lies in the rapid pace at which innovations and technical changes areimplemented in this space. For scholarship in this arena to develop, SNS researchersneed to be mindful of the ways in which these sites evolve over time and the effects thismay have on the interpersonal, psychological, and sociological processes they arestudying.

      Challenges of studying SNSs.

      Evolution of site and the way people use it.

    8. What makes “social media” significant as a category is not the technology, butrather the socio-technical dynamics that unfolded as millions of people embraced thetechnology and used it to collaborate, share information, and socialize. Popular genres ofsocial media integrated the public nature of interest-driven CMC with the more intimatedynamics of interpersonal CMC.

      I'm curious why the authors don't mention the UI/UX advancements in SNS that allowed non-technical people to participate online, rather than passively read. Even most blogs in the early 00s were challenging to use, let alone publish on, without some technical savvy.

    9. All SNSs support multiple modes of communication: one-to-many and one-to-one,synchronous and asynchronous, textual and media-based

      This functionality is the make-or-break for collecting user-generated content during humanitarian crises by DHNs.

    10. Many of the weak tie relationships articulatedon SNSs would fade away were it not for the ease with which people can communicate,share, and maintain simple connections. For this reason, this new definition positionssocial network sites first and foremost as a communication platform, while alsohighlighting the importance of sharing content, typically consumed through a stream.

      Evolution of the new definition of social network site emphasizes its use as a communication platform, followed by content sharing.

    11. A social network site is anetworked communication platformin which participants1) haveuniquely identifiable profilesthat consist of user-supplied content, contentprovided by other users, and/or system-level data; 2) canpublicly articulateconnectionsthat can be viewed and traversed by others; and 3) can consume,produce, and/or interact withstreams of user-generated contentprovided by theirconnections on the site.

      Updated social network site definition.

    12. As social network sites have become mainstream, traversing the connections betweenpeople to view profiles is no longer the sole—or, even primary—way of participation.Content is surfaced through streams, and each piece of content is embedded withnumerous links to other content nuggets.

      Streamed content has supplanted the social graph for traversing SNSs.

      Like the API robots, this also contributes to mis/disinformation campaigns that influence on- and offline behavior.

    13. Yet, one significant shift has unfolded: the traversability ofconnections has become more important for machines than users. As APIs make thesocial graph available to broader audiences, algorithms are being designed to traversethe graph and learn about the individual nodes’ relationship to one another.

      For the SNS, crawlers help serve recommended content, ads, search, and drive prediction models.

      Also, very likely contributes to ease of launching mis/disinformation campiagns.

    14. The ability to see—andtraverse—others’ contact lists was innovative and important in several ways. From anadoption perspective, it enabled users to find shared contacts easily, thus lowering thebarriers to initiating contact with other users and enabling users to harness networkeffects more easily. From a social perspective, it allowed people to easily see therelationships between others, to reconnect with old friends and acquaintances, and totravel through the network in a way that enhanced social interactions.

      Value of viewing/traversing connections.

      Early on, this capacity was a critical and defining feature. The default site design is to "display one's articulated network..."

    15. The rise of open APIs and developer platforms meant that these collections of articulatedcontacts became valuable in contexts outside that particular SNS. Engineers andentrepreneurs alike began talking about the “social graph”—the global network oflinkages between all individuals within a system (Fitzpatrick and Recordon2007). Thislanguage emerged at a time when commercial entities began to believe that the socialgraph hadvalue beyond the individual's relationship with a given social networksite.

      Social graph definition.

    16. As SNSs became more popular with a wider range ofindividuals, many individuals’ contact lists became more diverse as these users Friendedpeople representing a range of contexts (family, professional contacts, church members,etc.). This growing diversity has contributed to cases of “context collapse,” whichdescribes the ways in which individuals that we know from different social contexts cometogether in SNSs in potentially uncomfortable ways (Marwick and boyd2011)

      Context collapse definition.

    17. For users, these connections represent what sociologistsrefer to as a person'ssocial network—the collection of social relations of varyingstrengths and importance that a person maintains

      Social network definition.

    18. Earlier communication tools enabled individuals to create a private list ofcontacts (for instance a buddy list on instant messaging), to establish a group of contactsthat were shared by others (such as a listserv membership list), or to publish a list ofrelated links (such as a blogroll), but SNSs extended the practice of creating a publiclyvisible, personally curated list of contacts and made it a mainstream practice.

      Differences between SNS and CMC.

    19. Streams of quotidian,ephemeral content encourage people to participate more in that they provide an initialartifact around which others can engage. Features that support actions associated withstatus updates—the ability to post comments to, share, or register interest in an update—also encourage a stream of activity that is prompted by an update but often takes on a lifeof its own in the central stream. Today's SNSs are more like news aggregators than theyare like profile-based contexts, even if the algorithm for displaying content is quiteobfuscated.

      Essentially, this is the hook to motivate user-generated content.

    20. In boyd and Ellison (2007), we attempted to stabilize the discussion by offeringa definition of social network sites:web-based services that allow individuals to (1) construct a public or semi-publicprofile within a bounded system, (2) articulate a list of other users with whom theyshare a connection, and (3) view and traverse their list of connections and thosemade by others within the system.

      Early definition of social network sites. Later Ellison and boyd redefine SNS per evolving Web 2.0 standards, CMC studies and social norms.

    1. hus it becomes possible to see how ques-tions around data use need to shift from asking what is in the data, to include discussions of how the data is structured, and how this structure codifies value systems and social practices, subject positions and forms of visibility and invisi-bility (and thus forms of surveillance), along with the very ideas of crisis, risk governance and preparedness. Practices around big data produce and perpetuate specific forms of social engagement as well as understandings of the areas affected and the people being served.

      How data structure influences value systems and social practices is a much-needed topic of inquiry.

    2. Big data is not just about knowing more. It could be – and should be – about knowing better or about changing what knowing means. It is an ethico- episteme-ontological- political matter. The ‘needle in the haystack’ metaphor conceals the fact that there is no such thing as one reality that can be revealed. But multiple, lived are made through mediations and human and technological assemblages. Refugees’ realities of intersecting intelligences are shaped by the ethico- episteme-ontological politics of big data.

      Big, sweeping statement that helps frame how big data could be better conceptualized as a complex, socially contextualized, temporal artifact.

    3. Burns (2015) builds on this to investigate how within digital humanitarianism discourses, big data produce and perform subjects ‘in need’ (individuals or com-munities affected by crises) and a humanitarian ‘saviour’ community that, in turn, seeks answers through big data

      I don't understand what Burns is arguing here. Who is he referring to claims that DHN is a "savior" or "the solution" to crisis response?

      "Big data should therefore be be conceptualized as a framing of what can be known about a humanitarian crisis, and how one is able to grasp that knowledge; in short, it is an epistemology. This epistemology privileges knowledges and knowledge- based practices originating in remote geographies and de- emphasizes the connections between multiple knowledges.... Put another way, this configuration obscures the funding, resource, and skills constraints causing imperfect humanitarian response, instead positing volunteered labor as ‘the solution.’ This subjectivity formation carves a space in which digital humanitarians are necessary for effective humanitarian activities." (Burns 2015: 9–10)

    4. Crises are often not a crisis of information. It is often not a lack of data or capacity to analyse it that prevents ‘us’ from pre-venting disasters or responding effectively. Risk management fails because there is a lack of a relational sense of responsibility. But this does not have to be the case. Technologies that are designed to support collaboration, such as what Jasanoff (2007) terms ‘technologies of humility’, can be better explored to find ways of framing data and correlations that elicit a greater sense of relational responsibility and commitment.

      Is it "a lack of relational sense of responsibility" in crisis response (state vs private sector vs public) or is it the wicked problem of power, class, social hierarchies, etc.?

      "... ways of framing data and correlations that elicit a greater sense of responsibility and commitment."

      That could have a temporal component to it to position urgency, timescape, horizon, etc.

    5. In some ways this constitutes the production of ‘liquid resilience’ – a deflection of risk to the individuals and communities affected which moves us from the idea of an all-powerful and knowing state to that of a ‘plethora of partial projects and initiatives that are seeking to harness ICTs in the service of better knowing and governing individuals and populations’ (Ruppert 2012: 118)

      This critique addresses surveillance state concerns about glue-ing datasets together to form a broader understanding of aggregate social behavior without the necessary constraints/warnings about social contexts and discontinuity between data.

      Skimmed the Ruppert paper, sadly doesn't engage with time and topologies.

    6. Indeed, as Chandler (2015: 9) also argues, crowdsourcing of big data does not equate to a democratisation of risk assessment or risk governance:

      Beyond this quote, Chandler (in engaging crisis/disaster scenarios) argues that Big Data may be more appropriately framed as community reflexive knowledge than causal knowledge. That's an interesting idea.

      *"Thus, It would be more useful to see Big Data as reflexive knowledge rather than as causal knowledge. Big Data cannot help explain global warming but it can enable individuals and household to measure their own energy consumption through the datafication of household objects and complex production and supply chains. Big Data thereby datafies or materialises an individual or community’s being in the world. This reflexive approach works to construct a pluralised and multiple world of self-organising and adaptive processes. The imaginary of Big Data is that the producers and consumers of knowledge and of governance would be indistinguishable; where both knowing and governing exist without external mediation, constituting a perfect harmonious and self-adapting system: often called ‘community resilience’. In this discourse, increasingly articulated by governments and policy-makers, knowledge of causal connections is no longer relevant as communities adapt to the real-time appearances of the world, without necessarily understanding them."

      "Rather than engaging in external understandings of causality in the world, Big Data works on changing social behaviour by enabling greater adaptive reflexivity. If, through Big Data, we could detect and manage our own biorhythms and know the effects of poor eating or a lack of exercise, we could monitor our own health and not need costly medical interventions. Equally, if vulnerable and marginal communities could ‘datafy’ their own modes of being and relationships to their environments they would be able to augment their coping capacities and resilience without disasters or crises occurring. In essence, the imaginary of Big Data resolves the essential problem of modernity and modernist epistemologies, the problem of unintended consequences or side-effects caused by unknown causation, through work on the datafication of the self in its relational-embeddedness.42 This is why disasters in current forms of resilience thinking are understood to be ‘transformative’: revealing the unintended consequences of social planning which prevented proper awareness and responsiveness. Disasters themselves become a form of ‘datafication’, revealing the existence of poor modes of self-governance."*

      Downloaded Chandler paper. Cites Meier quite a bit.

    7. ut Burns finds that humanitarian staff often describe the local communities and ‘crowds’ as the ‘eyes, ears and sensors’ of UN staff, which does not index a genuine collaborative relationship. He states: ‘In all these cases, the discourse talks of putting local people “in the driving seat” when in reality the direction of the journey has already been decided’ (Burns 2015: 48). Burns (2015: 42) also notes that this leads to a transformation of social responsibility into individual responsibility.Neoliberalism’s promotion of free market norms is therefore much more than the simple ideology of free market economics. It is a specific form of social rule that institutionalises a rationality of competition, enterprise indi-vidualised responsibility. Although the state ‘steps back’ and encourages the free conduct of individuals, this is achieved through active intervention into civil society and the opening up of new areas to the logic of private enter-prise and individual initiative. This is the logic behind the rise of resilience

      Burns criticism of humanitarian response as not truly collaborative and an abdication of the state's responsibility for social welfare to the private sector.

    8. The UNHCR has even called for the refugees themselves to also develop their own data solutions and ideas (see Palmer 2014) as a way to help build their ideologies into the data infrastructures and thus bring their prisms into view. This could create a richer situational awareness and a better ability to understand and deal with unfolding and future crises by supporting resilient communities through giving them the means of data producing and sharing

      Participatory-design and community-centered design could be very helpful in this regard but this argument seems overstated.

      Evokes concerns about "distant suffering" (see: Chouliaraki, 2008): Who gets to share? What community? Refugees are not homogeneous.

    9. Doing so switches the discourse from vulnerability, where there is a need for external protection mobilised from above to come in and rescue the refugees, to one of resilience, where self- sufficiency and autonomy are part of the equation (Meier 2013).

      The dichotomy between state-led response vs community-coordinated response as the only ways to deliver aid seems unnecessarily limited.

      It can be both and other models/new ideas.

      Conflict- and persecution-driven humanitarian needs are often rife with complexity and receive scant attention outside of the humanitarian INGO sector.

    10. Yet, at the same time as power is exercised by both the state and corporations, power is gathering from the bottom up in new ways. In disaster response, a dynamic interplay between publics and experts is captured by the concept of social collective intelligence (Büscher et al. 2014); a disruptive innovative force that is challenging the social, economic, political and organisational practices that shape disaster response.

      Cited paper references social media and DHN work.

    11. Since the data is already being collected on a regular basis by ubiquitous private firms, it is thought to contain information that will increase opportunities for intelligence gathering and thereby security. This marks a shift from surveillance to ‘dataveillance’ (van Dijck 2014), where the impetus for data processing is no longer motivated by specific purposes or suspicions, but opportunistic discovery of anomalies that can be investigated. For crisis management this could mean benefits such as richer situation awareness, increased capacity for risk assess-ment, anticipation and prediction, as well as more agile response

      Dataveillance definition.

      The supposed benefits for crisis management don't correspond to the earlier criticisms about data quality, loss of contextualization, and predictive analytics accuracy.

      The following paragraph clears up some of the overly optimistic promises. Perhaps this section is simply overstated for rhetorical purposes.

    12. lthough Snowden’s revelations shocked the world and prompted calls for a public debate on issues of privacy and transparency

      I understand the desire to use a topical hook to explain a complex topic but referring to the highly contentious Snowden scandal as a frame seems risky (alienating) and could potentially undermine an important argument about the surveillance state should new revelations be revealed about his motives/credibility.

    13. While seemingly avoiding the traps of exerting top- down power over people the state does not yet have formal control over, and simultaneously providing support for self- determination and choice to empower individuals for self- sufficiency rather than defining them as vulnerable and passive recipients of top- down protection (Meier 2013), tying individual aid to mobile tracking puts refugees in a situation where their security is dependent upon individual choice and the private sector. Apart from disrupting traditional dynamics of responsibility for aid and protection, public–private sharing of intel-ligence brings new forms of dataveillance

      If the goal is to improve rapid/efficient response to those in need, is it necessarily only a dichotomy of top-down institutional action vs private sector/market-driven reaction? Surely, we can do better than this.

      Data/predictive analytics abuses by the private sector are legion.

      How does social construction vs technological determinism fit here? In what ways are the real traumas suffered by crisis-affected people not being taken into account during the response/relief/resiliency phases?

    14. However, with these big data collections, the focus becomes not the individu-al’s behaviour but social and economic insecurities, vulnerabilities and resilience in relation to the movement of such people. The shift acknowledges that what is surveilled is more complex than an individual person’s movements, communica-tions and actions over time.

      The shift from INGO emergency response/logistics to state-sponsored, individualized resilience via the private sector seems profound here.

      There's also a subtle temporal element here of surveilling need and collecting data over time.

      Again, raises serious questions about the use of predictive analytics, data quality/classification, and PII ethics.

    15. Andrejevic and Gates (2014: 190) suggest that ‘the target becomes the hidden patterns in the data, rather than particular individuals or events’. National and local authorities are not seeking to monitor individuals and discipline their behaviour but to see how many people will reach the country and when, so that they can accommodate them, secure borders, and identify long- term social out-looks such as education, civil services, and impacts upon the host community (Pham et al. 2015).

      This seems like a terribly naive conclusion about mass data collection by the state.

      Also:

      "Yet even if capacities to analyse the haystack for needles more adequately were available, there would be questions about the quality of the haystack, and the meaning of analysis. For ‘Big Data is not self-explanatory’ (Bollier 2010: 13, in boyd and Crawford 2012). Neither is big data necessarily good data in terms of quality or relevance (Lesk 2013: 87) or complete data (boyd and Crawford 2012)."

    16. as boyd and Crawford argue, ‘without taking into account the sample of a data set, the size of the data set is meaningless’ (2012: 669). Furthermore, many tech-niques used by the state and corporations in big data analysis are based on probabilistic prediction which, some experts argue, is alien to, and even incom-prehensible for, human reasoning (Heaven 2013). As Mayer-Schönberger stresses, we should be ‘less worried about privacy and more worried about the abuse of probabilistic prediction’ as these processes confront us with ‘profound ethical dilemmas’ (in Heaven 2013: 35).

      Primary problems to resolve regarding the use of "big data" in humanitarian contexts: dataset size/sample, predictive analytics are contrary to human behavior, and ethical abuses of PII.

    17. Second, this tracking and tracing of refugees has become a deeply ambiguous process in a world riven by political conflict, where ‘migration’ increasingly comes to be discussed in co- location with terrorism.

      Data collection process for refugees is underscored as threat surveillance, whether it is intended or not.

    18. Surveillance studies have tracked a shift from discipline to control (Deleuze 1992; Haggerty and Ericson 2000; Lyon 2014) exemplified by the shift from monitoring confined populations (through technologies such as the panopticon) to using new technologies to keep track of mobile populations.

      Design implication for ICT4D and ICT for humanitarian response -- moving beyond controlled environment surveillance to ubiquitous and omnipresent.

    19. As Coyle and Meier (2009) argue, disasters are often seen as crises of information where it is vital to make sure that people know where to find potable water, how to ask for help, where their relatives are, or if their home is at risk; as well as providing emergency response and human-itarian agencies with information about affected populations. Such a quest for information for ‘security’, in turn, provides fertile ground for a quest for technological solutions, such as big data, which open up opportunities for the extended surveillance of everyday life. The assumption is that if only enough information could be gathered and exchanged, preparedness, resilience and control would follow. This is particularly pertinent with regard to mobile pop-ulations (Adey and Kirby 2016)

      The Information is Aid perspective that drives my research agenda.

    20. hird, at this juncture, control is being equated with visibility and visibility with personal security. But how these individuals are made visible matters for both privacy and security, let alone the politics of conflating refugees, migration and terrorism. Indeed, working with specific data framing mechanisms affects how the causes and effects of disasters are identified and what elements and people are considered (Frickel 2008

      A finer point on threat surveillance that stems from how classifications and categories are framed.

      This also gets at post-colonial interpretations of people, places, and events.

      See: Winner, Do Artifacts Have Politics? See: Bowker and Star, Sorting things out: Classification and its consequences. See: Irani, Post-Colonial Computing

    21. First, there is a double dynamic to the generation of data in the refugee crisis.

      Data is used by the state to mobilize resources for protective services (border management and immigration/asylum systems) and data is used to count/track refugees in order to provision assistance.

    22. Datafication refers to the fact that ‘we can now capture and calculate at a much more comprehensive scale the physical and intangible aspects of existence and act on them’ (Mayer- Schönberger and Cukier 2013: 97

      Datafication definition

      It also incorporates metadata as well as information gleaned from typical sources.

    23. There is an uneasy coming together of diverse computational and human intelligences in these intersections, and the ambiguous nature of intelligence – understood, on the one hand, as a capacity for perceiving, learning and under-standing and, on the other, as information obtained for strategic purposes – marks complex relationships between ‘good’ and ‘dark’ aspects of big data, surveil-lance and crisis management.

      The promise and peril of gathering collective intelligence, surveillance, and capturing big data during humanitarian crises.

    1. The goal of this framework is to envision afuture of crowd work that cansupport more complex, creative, and highly valued work. At the highest level, a platformis needed for managing pools of tasksandworkers. Complex tasks must be decomposed into smaller subtasks, each designed with particular needs and characteristics which must be assignedto appropriate groups of workerswho themselves must be properly motivated, selected(e.g., through reputation), and organized (e.g., through hierarchy). Tasks may be structured through multi-stage workflowsin which workers may collaborateeither synchronously or asynchronously. As part of this, AImay guide (and be guided by) crowd workers. Finally, quality assuranceis needed to ensure each worker’s output is of high quality and fits together.

      Proposed framework to address crowdwork management challenges: shared resources, relationships, and crowd labor.

    2. n human computation, people act as computational components and perform the work that AI systemslack the skillstocomplete

      Human computation definition.

    3. A promising approach that addresses some worker output issues examines the way that workers do their work rather than the output itself, using machine learning and/or visualization to predict the quality of a worker’s output from their behavior [119,120]

      This process improvement idea has some interesting design implications for improving temporal qualities of SBTF data: • How is the volunteer thinking about time? • Where does temporality enter into the data collection workflow? • What metadata do they rely on? • What is their temporal sensemaking approach?

    4. Of the research foci, quality control has arguably received the most attention so far. Approaches for quality control largely fall into two camps: up-front task design and post-hoc result analysis. Task design aimsto design tasks that are resistant to low-quality work.

      Quality control processes is definitely a tension for SBTF.

      A better integrated task design and verification process at the end of activations could be more effectively address information quality concerns.

    5. Many tasks worth completing require cooperation –yet crowdsourcing has largely focused on independent work. Distributed teams have always facedchallenges in cultural differences and coordination[60], but crowd collaboration now must createrapport over much shorter timescales(e.g., one hour) and possibly wider culturalor socioeconomic gaps

      In Kittur's example, synchronous collaboration describes a temporal aspect (timescale and tempo of the work) related to how the collaboration is structured or not.

      "Short periods of intense crowd collaboration call for fast teambuilding and may require the automatic assignment of group members to maximize collective intelligence."

    6. Finally, it will be amajor research undertaking to invent and describe the tasks and techniques that succeed with synchronous collaboration

      Could this be a theme of the SBTF time study?

    7. The two core challenges for realtime crowdsourcing will be 1) scaling upto increased demand for realtime workers, and 2) making workers efficient enough to collectively generateresultsahead of time deadlines.

      One aspect of temporality in Kittur's study is related to "realtime" which they describe as the time need to scale up workers and efficiency speed of workers.

      The other temporal aspect is synchronicity of workers.

    8. Volunteer crowdsourcing platforms have evolved their own hierarchies and decision-making processes [104,156], appropriating techniques from other online communities where appropriate [101]. Most paid approaches have workers make hierarchical decisions collectively: for example, task decomposition and integration[75,80],quality oversight of each others’ contributions[78,100], and leader elections to represent collective opinions[83].

      Examples of hierarchical decision-making by both volunteer and paid crowd workers.

    9. Complex tasks have dependencies, changing requirements, and require multiple types of expertise.

      Characteristics of complex crowd work.

      Later, Kittur refers to complex crowd work as those involving "creativity, brainstorming, essay writing, music composition or civic planning."

      Temporality is definitely a work flow issue for SBTF.

      However, "realtime" is the only temporal attribute noted in this study but it seems to relate only to completion speed and present/immediacy of tasks.

    10. n the sections below, we survey and analyze the 12research focithat comprise our model. First, we consider the future of the work processesand how the workis organized and accomplished. Second, we consider the integration of crowd work and computation, including the symbiosis between human cognition, artificial intelligence(AI), and computationally-enabled crowd platforms. Finally, we consider crowd workers and how we can develop jobs, reputation systems, motivations, and incentives that will benefit them.

      Research foci

      Crowd work processes: Workflow, task assignment, hierarchy, realtime crowd work, synchronous collaboration. quality control

      Crowd computation: Crowds guiding AI, AIs guiding crowds, crowdsourcing platforms

      Crowd worker future: Job design, reputation/credentials, motivation/rewards

    11. Unlike traditional organizations in which workers possess job security and managers can closely supervise and appropriately reward or sanction workers, or distributed computing systems in which processors are usually highly reliable, crowd work poses uniquechallenges for both workers and requestersranging fromjob satisfactiontodirection-setting, coordination, and quality control.

      In the literature, quality tends to be used as an attribute of the output (content, HIT, etc.) but could/should it also refer to the crowd worker experience, as Kittur notes: "job satisfaction, direction-setting, coordination, and quality control"?

      How are these factors incorporated into the process and incentive system?

    12. These same requirements exist in distributed computing, in which tasks need to be scheduled so that they can be completed in the correct sequence and in a timely manner, with data being transferred between computing elements appropriately.

      time factors in crowd work include speed, scheduling, and sequencing

    13. However, crowd work can bea double-edged sword,equally capable of enhancing or diminishing the quality of workers’ lives.We maysee echoes of past labor abuses in globally distributed crowd work: extremely low pay for labor,with marketplaces such as Amazon’s Mechanical

      Crowd work offers flexibility to both workers and requesters to overcome labor shortages, need for expertise, and geographic boundaries.

      However, they are very real concerns about exploitation, piecemeal wages, unethical/dubious work, emphasis on speed over quality, and dehumanizing work conditions.

    14. We focus this paper on paid,onlinecrowd work, which we define here as the performance of tasks online by distributed crowd workers who are financially compensated by requesters(individuals, groups, or organizations). In this sense, crowd work is a socio-technical work systemconstituted through a set of relationships that connect organizations, individuals, technologies and work activities

      Kittur's definition of crowd work:

      "...performance of online tasks by crowd workers who are financially compensated by requesters."