+ All Categories
Home > Documents > The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by...

The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by...

Date post: 23-Oct-2019
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
101
Transcript
Page 1: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 2: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

The anxiety of hyper-influence

Geoffrey BilderDirector of Strategic Initiatives

UKSGLondon

June 14th, 2007

Page 3: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 4: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Trust

Page 5: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

“Internet Trust Anti-Pattern”

• System is started by self-selecting core of high-trust technologists (or specialists of some sort)

• System is touted as authority-less, non-hierarchical, etc.- But this is not true (see A)

• The unwashed masses start using the system.

• The system nearly breaks under the strain of untrustworthy users.

• Regulatory systems are put into place in order to restore order. Sometimes they are automated, sometimes not.

• System is again touted as authority-less, non-hierarchical, etc. But this is not true (see E).

Page 6: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

• BBSs

• Email

• Usenet

• Internet Relay Chat (IRC)

• Web Search

• P2P

• Etc.

“Internet Trust Anti-Pattern”

Page 7: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Publisher: Icon BooksISBN: 184046531X

Page 8: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Local Global

Page 9: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Through personal acquaintance

● Sometimes Transitive

Local Global

Page 10: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Through personal acquaintance

● Sometimes Transitive

● Extends trust through proxy

● Proxy transitively extends trust to “strangers”

Local Global

Page 11: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Through personal acquaintance

● Sometimes Transitive

● Extends trust through proxy

● Proxy transitively extends trust to “strangers”

Doesn’t scale

Local Global

Page 12: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Through personal acquaintance

● Sometimes Transitive

● Extends trust through proxy

● Proxy transitively extends trust to “strangers”

Doesn’t scale Increasessystemic risk

Local Global

Page 13: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Horizontal Vertical

Page 14: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Amongst equals

● Little possibility of coercion

Horizontal Vertical

Page 15: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Amongst equals

● Little possibility of coercion

● Within hierarchy (possibly through deference)● Coercion can be used to enforce behavior

Horizontal Vertical

Page 16: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Amongst equals

● Little possibility of coercion

● Within hierarchy (possibly through deference)● Coercion can be used to enforce behavior

Not enforceable

Horizontal Vertical

Page 17: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

● Amongst equals

● Little possibility of coercion

● Within hierarchy (possibly through deference)● Coercion can be used to enforce behavior

Not enforceable Subject to abuse

Horizontal Vertical

Page 18: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Internet Trust v.s. Scholarly Trust

Vertical

Horizontal

Local Global

Page 19: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Internet Trust v.s. Scholarly Trust

Vertical

Horizontal

Local Global

Internet Trust

Page 20: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Internet Trust v.s. Scholarly Trust

Vertical

Horizontal

Local Global

Internet Trust

Scholarly Trust

Page 21: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Avoiding the Internet trust anti-pattern

Page 22: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 23: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 24: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 25: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 26: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 27: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 28: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 29: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

The Connection?

• Their success is largely attributable to their early adoption of simple “trust metrics”

• Based on user-provided “stealth metadata”

• Volunteered

• Inferred

• Resulting in a built-in “social feedback loop”.

Page 30: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

The Problems?

• Trust metrics restricted to their particular site.

• Trust metric context is still primitive.

Page 31: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Social software

Page 32: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 33: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 34: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 35: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 36: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 37: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 38: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 39: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 40: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 41: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 42: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Resources

Social Software

Community

Webservices Encourage Linking

Links influence reputation

Encourages usage

Page 43: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

Page 44: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

And how do they measure this?

Page 45: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 46: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 47: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 48: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 49: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Ping!

Page 50: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 51: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 52: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 53: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 54: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 55: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 56: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

All links are not equal

Page 57: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

Page 58: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

Page 59: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

Page 60: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 61: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Citation source pioneer credit leads eponymBackgroundFutureWorkRefutationSupportMethodology DataGeneralizeSpecializeAbstractionExampleFormalizationApplicationArgument deduction induction analogy intuition solutionSummarizationDetailAlternateViewRewriteExplanationSimplificationComplicationUpdateCorrectionContinuation

Comment critical supportiveRelatedWork misrepresents vacuum ignores is Superseded By is Refuted By is Supported By redundantProblemPosing trivial unimportant impossible ill-posed solved ambitiousThesis trivial unimportant irrelevant redherring contradict dubious counterexample inelegant simplistic arbitrary unmotivated

Argumentation invalid insufficient immaterial misleading alternative strawmanData inadequate dubious ignores irrelevant inapplicable misinterpretedStyle boring unimaginative incoherent arrogant rambling awkward

Randy Trigghttp://www.workpractice.com/trigg/thesis-chap4.html

Page 62: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

Page 63: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

Page 64: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http:/

/www.fo

o.com

<a href=”http://www.foo.com” rel=”nofollow”>

Page 65: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 66: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

<a href="http://dx.doi.org/10.1016/0022-2852(80)90314-8" class="external text" title="http://dx.doi.org/

10.1016/0022-2852(80)90314-8" rel="nofollow">10.1016/0022-2852(80)90314-8</a>

Page 67: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

<a href="http://dx.doi.org/10.1016/0022-2852(80)90314-8" class="external text" title="http://dx.doi.org/

10.1016/0022-2852(80)90314-8" rel="nofollow">10.1016/0022-2852(80)90314-8</a>

Page 68: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 69: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 70: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Some practical challenges

Page 71: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 72: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 73: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 74: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 75: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 76: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 77: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 78: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

“Just because most blog entries aren’t written for posterity doesn’t mean that many can’t be or shouldn’t be. My view is that blogs are becoming our resumes, our digital portfolios, our public identities. We’re already forced to think long-term about the consequences of what we put into those public portfolios because, though no real persistence infrastructure exists, stuff does tend to hang around. And if it’s going to be remembered, it should be remembered properly.”

Page 79: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 80: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 81: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 82: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 83: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Geoffrey Whitson BilderBilder, Geoffrey Whitson

Geoffrey W. BilderBilder, Geoffrey W.

Bilder, G. W.G. W. Bilder

Geoffrey BilderBilder, Geoffrey

G. BilderBilder, G.

Page 84: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

John SmithJohn SmithJohn SmithJohn SmithJohn SmithJohn SmithJohn SmithJohn Smith

Page 85: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Li (Lee), Wang, Zhang, Liu, Chen, Yang, Huang, Zhao, Zhou, Wu, Xu, Sun, Zhu, Ma, Hu, Guo, Ln, He, Gao, Liang, Zheng, Luo, Song, Xie, Tang, Han, Cao, Xu,

Deng, Xiao

Page 86: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Jane Doe Jane Bloggs

Page 87: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Walter Carlos Wendy Carlos

Page 88: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Wisdom of crowds

Page 89: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

“Now there are some businesses built on scarcity of information- publishing and filmmaking, and

even some trades like travel agents and consultants. These businesses have honorable and talented practitioners who bring

home the bacon because the information they peddle is

scarce. Abundance will put a lot of these people out of

business.” - Cory DoctorowMake vol. 07

Page 90: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 91: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 92: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 93: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 94: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

http://www.gapingvoid.com/Moveable_Type/archives/000583.html

Page 95: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

The Early Modern Internet

Page 96: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 97: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 98: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 99: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 100: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System
Page 101: The anxiety of hyper-influence · “Internet Trust Anti-Pattern” •System is started by self-selecting core of high-trust technologists (or specialists of some sort) •System

Thank [email protected]


Recommended