Thursday, April 16, 2009

Unit 7 - Rule Breakers

SITE RULES ON FACEBOOK

Finding how to vote on the new proposed rules governing Facebook was much easier than finding out what the actual current or proposed rules are. As I was looking for the rules, within a couple clicks, I discovered a Facebook blog page that I didn’t know existed. In addition to lots of great information that has nothing to do with the rules governing this site, at this URL http://www.facebook.com/group.php?gid=54964476066 I found an invitation to comment on site governance issues:


As I scrolled down this page, I saw this link on the left side of the page:



Which led me nowhere productive! I tried several other links that looked like they would provide me with information about the rules of this site - actually I tried many links with no luck. Finally, after looking for a good 45 minutes to an hour, at the bottom of the homepage, I saw a tiny link called Terms, which got me to the rules of the site. Did everyone else but me know to click there immediately?

The set of rules that I found there is what Grimes (2008) calls the civil code. The civil code is determined by legal documents and policies which contain all of the written codified laws for a virtual world. These governing documents provide the framework for the community in the same way that Hawaii Administrative Rules and Hawaii Revised Statutes define the laws of our State in the off-line world. At URL http://www.facebook.com/terms.php?ref=pf , the civil code of Facebook can be found. There are guidelines about:
  • Eligibility: (over 13 years of age, in college or high school if between 13 & 18, or over 18),

  • Registration Data: provide accurate profile information, keep it updated and secure

  • Proprietary Rights: all content belongs to Facebook. Neither the content nor the trademarks can be reproduced without permission.

  • User Conduct (This is a huge section!): For example, the number one rule with lots of word space attributed to it is - don’t use the site for commercial use. In addition other highlights from the code of conduct include: don’t include any content that Facebook deems to be harmful, threatening, unlawful, defamatory, infringing, abusive, inflammatory, harassing, vulgar, obscene, fraudulent, invasive of privacy or publicity rights, hateful, or racially, ethnically or otherwise objectionable; no videos allowed on this site that the user didn’t take, only register as yourself – no pseudonyms, use your correct age and affiliations, no groups or businesses; don’t solicit anything especially from anyone under 18, including anyone’s social security numbers, address, phone numbers, etc.; don’t send junk mail, spam, chain letters, etc.; don’t access anybody else’s site

  • User Content: basically, you’re responsible to upload your own stuff (pictures, videos words) but Facebook has all rights to it and by using the site you agree to let the company use it anyway they want, forever and for no charge.

  • Copyright: don’t infringe on anyone else’s copyright

  • Repeat Infringer: following the Digital Millennium Copyright Act, Facebook can kick you off their site if you violate copyrights, even once but certainly if you do it a lot

  • Third Party Websites: Users can link to other sites and Facebook isn’t responsible for the content found there

  • Information about specific pages: There are lots of paragraphs containing info about the uses of the various pages, basically explaining that the content put there is created by an individual, not Facebook

  • User Disputes: basically, settle it among yourselves.

  • Privacy: When you put anything on the Facebook site, you give permission for them to transfer information into servers within the United States.

  • Disclaimers: I think they’re repeating all of the above information again here.

  • Governance & Jurisdiction: The laws of Delaware apply to this site

  • Indemnity: You can’t sue the company, any of its subsidiaries or anyone who ever before, currently or will ever work at Facebook, either now or in the future

The governing documents found on Facebook include all of the four types Grimes lists: software license agreements, terms of service or use agreements, privacy policies, and community standards and practices.

RULE BREAKERS:


OK, I’m going to admit it right off. I’m one example of a rule breaker. Because I’m concerned about security, I provided the wrong birth date on Facebook:




Well, I’m not too far off.





Would this qualify me as a rogue user? Using the loose definition of the term found in computer science literature as “individuals who are not full-fledged hackers but who have gained access to files or functions beyond their permission level” (Gazan, 2007) the answer would be, no, I sure don’t have the computer expertise to do that! Using the definition of rogue user defined by McNee et al. (in Gazan, 2007), as individuals who undermine the rating system in a collaborative filtering environment, I would again not fall under this definition. However, according to Gazan’s definition, a rogue user is an active participant in an online community who violates any of the community’s rules or spirit. Yikes, I did break a rule, I’m ‘fessing up to it – I am a rogue user! The reason why I posted an incorrect birth date is that I’m concerned that someone will use this in an inappropriate way, however, as Suler and Phillips (in Gazan, 2007) state, online participants seek the reward of recognition. Therefore, I didn’t change myself into an 18 year old or even a 37 year old, but kept my age within the 50ish range due to the recognition factor. Enough explaining and justifying – I’m guilty!



In this situation, I believe that there should be no action by the site administrator. In my opinion, it’s such a minor thing that no one would know, notice or care. There is no harm done to any of the other users on this site and I feel more secure knowing that no one can steal my identity by getting my real birthdate on Facebook. As for actions the other users should take, they should send me a birthday card around that date and they will get the card to me at just about the right time.



Another example of a violation of Facebook’s code of conduct is in the case of Akamai Coffee.


While Akamai makes the best coffee and chai that I have ever tasted anywhere, (no, they’re not paying me to say this!) they are using the name of their company as the first and last name of a person which is a violation of Facebook’s code of conduct. Not to give Mr. Coffee all the blame (or all the credit which ever it might be), the same technique was used by several other businesses such as Skyline Adventures and Maui BrewingCo so it must be a fairly common use of Facebook. However, the Facebook code of conduct (which, as you recall took me an inordinate amount of time to find) specifies that businesses can’t sign up – individuals have to sign up as themselves. Although I hope the site administrators don’t do anything about this as this is a tiny family owned business struggling to make ends meet, Facebook does put out a lot of warnings on their rules page about situations in which money might be made. I personally think it’s a good marketing tool, and in these tough economic times, small businesses need all the help the can get to stay afloat. I’m not a business person, so I’m not sure what, if any, ethical issues this may bring up as far as business practices go. Facebook administrators may feel that this issue may be somewhat like Kollock and Smith (1996) termed, the free-rider problem. Although I’m using the term in a very different way than Kollock and Smith intended it, Facebook administrators may not be willing for Mr. Coffee to get free advertising when other businesses pay them for it. To go along with Kollock and Smith’s logic, when ever a person cannot be excluded from the benefits that others provide (in this case, money other businesses paid to the Facebook company for advertising), each person is motivated not to contribute to the joint effort, but to free-ride. I know I’m stretching the analogy here and going in another direction than Kollock and Smith with this analysis. It just seemed that this article was the only one that I could remotely use to comment on this situation (rogue user again, huh?)



Looking
Searching
Continuing to look
Checking another profile
Pictures, picture albums?
Videos?
Looking at another profile - still nothing
Am I the only rogue user on Facebook?


Still looking
Following video links -copyright violation? No, drat.
Another profile again


Content on the message OK? yes


Continuing to look.....




Well, it’s almost four hours later now and I’m still looking for one other instance of violations of Facebook’s rules. As a site, among the friends or friends of friends that I’m able to access, the content seems to totally be within the guidelines of their code of conduct. I hate to admit it, but the only thing I could find is in the photo album of my own son (rogue user begets rogue user, I guess). Even though I’m not offended by this picture it’s the best (or I should say, the worst) that I can find. Buried somewhere in my son's 200+ pictures is one in which someone is making an obscene gesture, giving the finger to the camera:

Because it was so difficult to find violations of the Facebook code of conduct, Facebook has met what Cosley et al. describe as the key challenge – creating interfaces, algorithms and social structures that encourage users to provide high quality contributions. In the study by Cosley, they state that administrative or user oversight increased both the quantity and quality of contributions while reducing antisocial behavior. This appears to have been the case with Facebook. As recommended by Cosley, Facebook appears to have expert oversight by their company staff and they also invite users to contribute recommendations to the sites governance. This creates an online social network system in which users' behavior and the content they post to this site basically complies with the site rules.

Thursday, April 2, 2009

Session 6: Online Identity

Question 1. How do we know online identity when we see it? Propose a working definition of online identity for a site that you’re studying and compare it with one or two definitions from those in the reading selections.

Merriam-Webster’s online dictionary defines “identity” as the distinguishing character or personality of an individual. This encompasses the main idea that I would use when describing the term, identity. The working definition of online identity that I would use simply builds upon Merriam-Webster’s definition: online identity is the online distinguishing character or personality of an individual. One interesting idea unique to online identity is that it does not exist until the individual writes himself or herself into being. Philosophers may debate whether or not we do this with our offline identity, however, the consciousness with which we create our online identity may add different aspects of self-assessment, deliberation and self-creation that I believe is distinctive to our online personality.

Have you heard the old saying that in five years you will be what you eat and who your friends are? Since we probably can’t assess online identity from the user’s diet, we could obtain clues about the person’s identity by looking at the social interactions that occur. According to Huberman, Romero and Wu (2009), online identity could be determined from the user’s attention to and interactions with other people on the network. Who their friends are, in other words. Althought the structures of social networks provide a visualization of declared “friends”, this in itself does not give a clear picture of the closeness of the relationship or the significance among people. A more accurate analysis might be the study of the interaction patterns among friends. This interaction pattern could provide the researcher with clues about a user's identity.

Attention is a scarce commodity as the expectations of daily life and work commitments cause most people to have limited time to engage with others on the internet. In situations where the commodity of time is limited, people tend to default to interacting with those few that matter and that reciprocate their attention. Huberman, Romero and Wu determined that on a social network site, Twitter, individuals may declare a large group of friends but individualized attention occurred only within a subset of the friends and followers. One aspect of online identity could be assessed by evaluating how and how often the user interacts with other people on the network.

Liu (2007) brings up the idea that an individual’s identity can be gleaned from the person’s interests, which are typically posted on the online profile. What the person lists as interests – music, books, sports, movies, etc, can function to detect an aspect of their personality and identity. Since I think what we enjoy is a crucial part of our identity, I would add the information that the user chooses to list in the profile section is important to the working definition of online identity.


Question 2. Write two informal use scenarios based on your observations of existing users. Use scenarios are outlines of common interactions: how an individual with a predictable need enters your system, navigates through common decision points and options step by step, then (ideally) exits with what he or she came for. Include functional interactions (just user decision points relevant to the user's goal, you need not exhaustively list all options) and interpersonal interactions.

For this assignment, I will explore online identity for the social network site I am most familiar with at this point, Facebook. On the Facebook, site, users are real people, presenting themselves much as they would offline. Although it’s possible that the user may post fictional personas, made-up for some reason or the other, Facebook users don’t use easily recognizable pseudonyms as this would not be recognizable to other people already familiar with that person. On Facebook, the person’s online identity appears, on the surface, to be a relatively straightforward extension of their offline personality

On Facebook, there are many cues and signals that yield information about an individual's identity. Some, such as the photo and the self-description featured in the profile, can be readily perceived and easily evaluated. Some indications of the person’s identity, such as conventional signals (such as their interests) may be easily faked. Others, such as the network and communication patterns of the individual, provide a reliable and, if someone knows how to do it, a traceable evidence of the person’s interactions with others on the online network.

Informal Use Scenario #1
Tim, an acquaintance from high school, found my profile on Facebook within the first few days that I posted it. Tim sent me a friends request, along with a message indicating that as he started his Facebook account, my profile popped up on his home page because we graduated from the same high school in the same year. I accepted the friend request from Tim.

Figure 1: Denise and Tim Become Friends


As we began our online communication, Tim wrote daily on my wall, disclosing information about his job, telling me about changes in the area where we grew up, commenting on information that I provided to him and engaging in other general light social conversation. I asked Tim why he joined Facebook:


Figure 2: Denise writes on Tim’s Wall

Tim replied that he joined Facebook to make new friends and to reestablish older friendships - subtext – I think Tim’s real motivation is that he wanted to find a romantic relationship using Facebook. This need is only my assumption based upon Tim’s decision point to exit the communication loop after I posted family pictures:


Figure 3: My family Pictures Posted in January


After this date, Tim does not reply to any other messages from me but when I looked up information on his home page for this assignment, I noticed that he responds consistently on his wall to other females who listed their relationship status as single.


Informal Use Scenario #2:
Rebecca and I have been friends for about two years. We met at work and realized that we have many of the same interests. In addition to our other interests, Rebecca enjoys social networking for socialization opportunities and she uses this as her preferred recreation and leisure time activity. During an in person meeting in March, Rebecca let me know she is a member of Facebook as well as other online communities. We agreed to become friends on Facebook and she sent me a friend request a day or two later. In the month that Rebecca and I have been friends on Facebook, Rebecca has changed her profile picture at least twice weekly (here is the newest one). She has updated her profile every week and she provides comments on her wall at least once each day. These updates are broadcasted to each of her 203 friends every time she posts them. For example, the comment posted yesterday at 2:15 am was, “Rebecca has made reasonable progress on the lesson plan and is now going to bed”. Under each of these postings, there are from 2 – 5 comments back to her from friends, which are also broadcast to all of Rebecca’s friends. In addition, recent activity is updated daily as well, including information like that listed below which is incomprehensible to me:


Figure 5: Rebecca's Activities


Question 3. Using the scenarios, address this question: how are online identities shaped and expressed through online interactions in this community?

In the two scenarios described above, both Tim and Rebecca effectively use the scarce resource of attention in their online interactions, but they do it in very different ways. Since both Tim and Rebecca have other obligations, like working, they have limited time to engage in social network activities on Facebook. They each use different strategies to maximize the attention they pay to their Facebook friends. Tim focuses his attention on interacting individually with women who may potentially meet his goal of entering into a meaningful relationship (this is, of course my assumption of his goal from his online behavior). Rebecca maximizes her attention to her entire network of friends by posting messages on her wall at least once per day. As these are updated to each friend’s wall, everyone receives a daily update of Rebecca as well as postings from other people who comment about her post.


Social network research classifies ties as strong or weak, heterogeneous or homogeneous. In the scenarios described above, Rebecca’s daily comment strategy uses frequency of posting information to a large group of people to create stronger ties. Tim uses the strategy of selectively limiting his number of interactions to only those people who may meet his need for a meaningful relationship in order to create stronger ties with these individuals. Strong ties that both Rebecca and Tim are trying to establish and maintain are, or could become, close confidants, people relied upon in an emergency and with whom one is likely to share multiple interests. A close-knit network of strong ties can supply extensive support. Being a member of such a group requires a large commitment of time and attention. Both Rebecca and Time engage in frequent contact among the members of their respective group.


Compared to the small group of individuals that Tim corresponds with, Rebecca’s ties may be relatively weak. She corresponds daily with a large group of people, many of whom may be distant acquaintances, people known in a specific context and towards whom she feels less responsibility. Most of her friends do not know each other, for example, out of her 203 friends, she and I have only two (2) mutual friends. In this case, it is a sparsely connected network of weak but heterogeneous ties. As Donath (2007) reported, this provides access to a great variety of ideas and experiences. In Rebecca’s case, the use of her Facebook social network system makes establishing and sustaining large numbers of such ties very efficient.


How else can we analyze online identities? According to Donath (2007), one way is to analyze the interactions on a social network site through the use of signaling theory. Signaling theory assesses the way individuals signal interactions with each other and it analyzes why some signals are reliable and others are not. Signaling theory is based on the idea that everyday interactions are rife with divergent goals and small (or large) deceptions. People want to make the best possible impression, to appear important, creative, and popular, while others want to know if they really possess those qualities. When the costs of being deceived are low, people may not care if something is an exaggeration. However, when the costs are high, they may demand a more reliable signal.


One class of signals, termed assessment signals, is inherently reliable, because producing the signal requires possessing the indicated quality. Donath gives the illustration that lifting a 500-pound weight is a reliable signal of strength; a weaker person simply cannot do it. On Facebook the first assessment signal that is available is the user’s picture. Providing a photo is optional, so the participant can choose to use the default graphic or add their own photo. The photograph can provide a strong assessment signal. Does this person’s picture appear to match the information presented in their profile? Are they old, fat, young, pretty? Does the picture match the person I’m already familiar with? Do I want to connect with this person? The picture provides me with a strong assessment signal to determine whether or not I already know, or want to know this person. Regarding the identities for Rebecca and Tim, shortly after Tim and I became friends in January, he posted a picture which has remained the same over these past few months. It looked like someone of the age I would expect and I thought it could resemble the kid I knew in high school. Rebecca’s picture changes at least weekly. At times she uses her own image and at other times she uses a scene or, like the current image, a cartoon. Facebook friends can use the photos provided to assess the reliability of the identity of the person or to make assumptions about the person’s online identity based on how strong the photo acts as an assessment signal.


Are there any "Strategic" or "handicap" signals on Facebook? Strategic or handicap signals are assessment signals that suggest that a great deal of some scarce resource is available to the individual because they can afford to waste that resource. The idea is that only someone who has an excess of a given resource can afford to expend it for communicative display. Zahavi (in Donath, 2007) emphasized that these costly signals are only reliable in the domain of the cost. The owner of an expensive car may use it to signal both wealth and attractiveness, but its high price only guarantees that the owner is wealthy; it is an unreliable indicator of attractiveness. In the cases of Rebecca and Tim, both use attention to their friends as a strategic signal. By providing attention through personal messages, they indicate that they are willing to spend their resource (time) to establish or maintain a relationship with an individual. Rebecca uses the comment strategy to communicate with her entire network, broadening her impact to her entire network, while Tim communicates individually with a small number of friends.

In general, conventional signals, or self descriptions, are relatively reliable on Facebook. The user has the discretion to disclose as much or as little information as they choose. Conventional signals are kept honest on Facebook because the user needs some sort of accurate identifying information to engage other people known to them in the online social relationship. To ensure that people link only with those they truly know, one design approach is to increase the amount of knowledge about the other that potential linkers need to provide. Both Rebecca and Tim provided descriptors of themselves that seemed to me, on the surface, to match what I know about their offline personalities.


In summary, on Facebook, online identities are shaped through assessment signals such as photographs, conventional signals such as profile information and disclosing interests and patterns of interactions with friends, including method of contact and frequency of contact.

REFERENCE

Donath, Judith. (2007). Signals in Social Supernets. Journal of Computer-Mediated Communication 13(1). http://jcmc.indiana.edu/vol13/issue1/donath.html

Huberman, Bernardo, Daniel Romero and Fang Wu (2009). Social Networks That Matter: Twitter Under the Microscope" First Monday 14(1).
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2317/2063

Liu, H. (2007). Social Network Profiles as Taste Performances. Journal of Computer-Mediated Communication, 13(1), article 13. http://jcmc.indiana.edu/vol13/issue1/liu.html