Monday, April 18, 2011

Session 7: Management and Conflict


I chose to analyze the rules of Facebook for this week’s assignment.  For the final project, I will compare the different features of Facebook with a similar, Korean social network site (Cyworld). The official rules governing Facebook can be found on the main page by clicking the “Terms” tab on the bottom; you are automatically linked to the Statement of Rights and Responsibilities (http://www.facebook.com/terms.php) page, and this statement includes additional links to a detailed privacy policy (http://www.facebook.com/policy.php), safety policy, etc. Also, these rules can be found on the Help Center page (http://www.facebook.com/help/); this also provides a useful guide for Facebook users.


Broken Rules


1. This group of people created a group page to discuss their Anti-Israel thoughts; many of them used hate speech (using “F” words) towards Jews based on ethnicity, religion, or national origin. This violates the safety policy that You will not post content that is hateful, threatening… or [that] contains graphic or gratuitous violence. Because there is a systemic feature, other users can report their hate speech or violent behavior. If I were an administrator, I would first let users leave feedback before removing the group for sharing inappropriate content. Answerbag, which also has a feedback system that allows users to flag content as spam or inappropriate for administrator review, uses a similar system (Gazan, 2009). However, if the plan of the group is terrorism or the collection of money to support threats, I would remove the group immediately; the security policy states that “Any credible threats to harm others will be removed. We may also remove support for violent organizations that intimidate or harass any user

 


 
2. This user continuously posted pornographic content to their wall and promoted their adult video website with a link. This violates Facebook’s strict rule that “there is no nudity or pornography policy and any content that is inappropriately sexual will be removed. Because there is a feature for other users to report the person for inappropriate wall posts or even to block the person, administrators can remove the pornographic content and suspend the account immediately after receiving feedback. As Gazan (2007) explains, many rogue behaviors are reported by site moderators by reviewing and monitoring users’ feedback. However, unlike Flickr or YouTube, which both have safety mode as the default setting, Facebook does not have a feature to filter content that is not suitable for minors. As such, I would create such a feature that supports the idea that administrators or designers should listen to users’ feedback and never stop creating a user-centered design (Grimes et al, 2008). 


 
3. There are several fake Facebook accounts or fan pages of Justin Bieber in the search results that violate the Registration and Account Security policy that “You will not provide any false personal information on Facebook, or create an account for anyone other than yourself without permissionYou will not post content or take any action on Facebook that infringes or violates someone else's rights or otherwise violates the law.   




 
I heard there are fans that create fake accounts to promote their favorite celebrities. Even though there is already an official account, like the screenshot above, the user of the below screenshot uses almost the same images and structure to imitate Justin Bieber. What is worse is that there are some people who believe, because the name of the page includes the word “Official”, that it is real. Because impersonation is not allowed on Facebook, there is a feature that allows you to report the person by choosing the option, “This profile is impersonating someone or is fake".  However, in the real world, people can create multiple accounts using false information with different email accounts; as such, these fake accounts are not easily removed, since the process of verifying identities takes time and leads to privacy issues. However, in order to build trust between users, I would rather limit an IP address to creating only one account. Also, there are many groups that are created for reporting abuse and violation of Facebook. It is good that people gather and send feedback at the same time so that administrators can pay attention, “By working collectively, users have a much stronger ability to influence producers to make alterations. Functioning as a collective group in the form of a team or guild allows users the ability to exert more formidable pressure than they could ever accomplish individually” (Grimes et al, 2008). I also feel that there are so many similar groups that separate people into smaller groups; given this I would combine the groups into one under the heading “Feedback Center”, which I  would also build using updated documents of community standards and policies, “Oversight increased both the quantity and quality of contributions while reducing antisocial behavior, and peers were as effective at oversight as experts” (Cosley et al, 2005).
Finally, here are Five Unwritten Rules that I came up with for users:
  1. Do not share personal information with anyone.
  2. Use freedom of speech and expression, unless it violates the Facebook rules.
  3. Be aware of the importance of diversity.
  4. Always learn newly featured applications.
  5. Act like you are in the real world; treat other users with respect and good faith.
References
Cosley, Dan, Dan Frankowski, Sara Kiesler, Loren Terveen, John Riedl (2005). How Oversight Improves Member-Maintained Communities. CHI 2005, April 2-7 2005, Portland, Oregon.
Grimes, Justin, Paul Jaeger and Kenneth Fleischmann (2008).  Obfuscatocracy: A stakeholder analysis of governing documents for virtual worlds. First Monday 13(9).
Gazan, Rich (2009).  When Online Communities Become Self-Aware. Proceedings of the 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, 5-8 January 2009.
Gazan, Rich (2007).  Understanding the Rogue User. In: Diane Nahl and Dania Bilal, eds.  Information & Emotion: The Emergent Affective Paradigm in Information Behavior Research and Theory. Medford, New Jersey: Information Today, 177-185.

Sunday, April 3, 2011

Session 6: Online Identity and Interaction


For this assignment, I chose caloriesperhour.com, which provides weight loss tips (food calories calculator, weight loss calculator, etc.) and has a diet and weight loss forum where many people discuss weight loss (posting users’ own diet success and failure stories, sharing body images to get self-esteem, asking about medical issues, such as eating disorders, surgery, diet pills, and supplements).

Sunny Day, Scenario 1
·         A user is on a diet. She has lost a tremendous amount of weight. However, she hasn’t lost weight during past two weeks but has even gained a few pounds. Struggling, she is becoming exhausted and giving up the diet.
·         She posts her before and after body images to ask for suggestions.
·         Many users share their experiences dealing with struggles (changing types of exercise, food, etc.) and applaud her efforts.
·         Her self-esteem grows and, after a while, her diet is successful.

Sunny Day, Scenario 2
·         A user who has never tried a diet wants to lose weight.
·         Because he doesn’t have any knowledge of diet plans, he joins the forum to seek the successful diet plans other people have tried.
·         He reads threads and followed the diet plan with the largest view counts.
·         He succeeds with the diet.

Rainy Day Scenario
·         A user wants to lose weight by using diet pills.
·         She begins a post asking other forum users for recommendations.
·         Many people leave comments recommending a diet pill and telling of their successful outcomes.
·         She chooses a diet pill that has been recommended many times.
·         She takes the diet pill and suffers side effects (nausea, diarrhea, and dehydration); then she falls victim to depression.
    Users share knowledge of variety of diet pills and supplements.

                            
How is online identity shaped and expressed through interactions in this community?

Donath (2007) explains that the strong ties in networks can give support to members of the group and weak ties make people feel less responsibility but provide more access to a variety of information. Users of caloriesperhour have both strong and weak ties. They give emotional support to each other, even though they don’t meet offline, and they interact often by sending private messages. Weak ties are characterized by the fact that most people don’t know each other but share information that they can’t get offline freely because of the limits of time, place, or accessibility. 
Users give emotional support to each other.
                              
Like Bodyspace, caloriesperhour is a passion-centric social network site. “Social network sites connect people because of a shared passion, such as religion, pets, or specific hobbies” (Ploderer et al, 2008). I believe that there are common reasons for users joining and participating in these two communities. First, both communities help users to monitor their progress in the pursuit of their passion, Bodyspace users post their body images to get feedback, mostly applause, from the audience, as in a bodybuilding show; while caloriesperhour users post body image to get suggestions for diet plans. Second, I agree with Ploderer’s statement that “passion-centric social network sites connect mostly people with no previous offline connections”. I have observed that most users of caloriesperhour forum don’t meet offline but freely interact with each other online. Although I feel that there are more chances for bodybuilders to meet other forum users offline since they participate in competitions and work out together at the gym. “People form new relationships with others on social network sites. Thus, social network sites provide them with a community of like-minded people that extends their offline connections with peers, friends and coaches” (Ploderer et al.). Unlike Bodyspace users, who want to get information on how to prepare for bodybuilding competitions, users in caloriesperhour focus on searching for individual diet plans. “Comparing oneself with others is essential in any competitive sport including bodybuilding … they compare themselves with others who are in a worse position in order to enhance their self-esteem” (Ploderer et al.). In addition, most users in Bodyspace already have information about the sport—in other words, there are more experts—while caloriesperhour users are mostly amateurs and have more tendencies to struggle and share why they failed to lose weight.

According to Wellman (2003), networked individualism comes from changes in society (social changes, land use changes, and technological changes). The Internet has caused networks in society to expand from face-to-face groups to online groups, where people access the Internet using mobile phones and create online identities to interact with other people in social network sites. Donath emphasizes the importance of trust in users sharing reliable information. In caloriesperhours.com, users sometimes give and get false information. Not every user is trustworthy and sometimes represent themselves with unidentifiable information in their profiles (no avatars, no real name, etc.); nevertheless, strong ties are built because they have the same interest.

References
Wellman, Barry, Anabel Quan-Haase, Jeffrey Boase, Wenhong Chen, Keith Hampton, Isabel Isla de Diaz and Kakuko Miyata (2003).  The Social Affordances of the Internet for Networked Individualism. Journal of Computer-Mediated Communication 8(3). http://jcmc.indiana.edu/vol8/issue3/wellman.html

Donath, Judith. (2007). Signals in Social Supernets. Journal of Computer-Mediated Communication 13(1).  http://jcmc.indiana.edu/vol13/issue1/donath.html

Ploderer, B., S. Howard & P. Thomas (2008). Being Online, Living Offline: The Influence of Social Ties Over the Appropriation of Social Network Sites. Proceedings of CSCW 2008.

Sunday, March 13, 2011

Session 5:Social Q&A sites vs. libraries or schools

With the development of such technology as smart phones and web 2.0, people can access information more easily than ever. Use of the web 2.0 features in library services is not limited to the library system, but provides the service for outreach education, electronic commerce, etc. Web 2.0 has provided an infrastructure within which users can participate, and when given the chance they have done so enthusiastically” (Gazan, 2008). For example, the library webpage links to Google Books and online book stores like Amazon and Library Online Public Access Catalog (OPAC) so that users can search for, buy, and check out books from a nearby library or even from other states using the Interlibrary Loan Service. Also, even outside of the library, people can get information via iPhone at any time or from any place using Social Q&A sites like Yahoo! Answers (Dempsey, 2009). This flexibility, which is a huge strength of Social Q&As, can make up for weaknesses in traditional education, such as limited time and the need to be physically present in libraries or schools to access information. In order to solve the problems of time and physical presence, libraries should adapt the strengths of the virtual world through Social Q&A sites. Dempsey recommends that library staffs solve the problem with increased availability: “As users interact with services on the network, library staff needs to be more visible. This is partly a matter of being accessible in the variety of ways that people communicate (e–mail, texting, etc.).” The first screen shot shows that Memorial Hall Library in Northeast Massachusetts provides 24/7 reference service via email and instant message to local residents. Providing 24/7 virtual reference service allows users access to reliable information from librarians or information experts.
 

Social Q&As are not based on one-to-one communication, but one-to-multiple-user communication; whereas when people go to libraries or schools, they ask questions to one teacher or reference librarian. The strengths of one-to-multiple-user communication lead to an increase in the quantity of the information and to social annotation, which “refers to uncontrolled user comments and interactions around a digital resource, to distinguish it from more formal senses of content annotation” (Gazan, 2008). Libraries should also encourage people’s participation, for example by allowing users to edit and delete contents, as in Yahoo! Answers and to communicate with librarians, web technicians, and other users. The second screen shot shows that Ann Arbor District Library in Michigan allows users to leave reviews; thus, users are not only content consumers but also content creators. In a library setting, users create book reviews, book covers, and videos related to the material. Unlike AADL, to which only residents can contribute, it would be good to have a digital library without regional or language barriers, so that anyone in the world can access reliable information.




In Social Q &A sites, you can ask questions that are difficult to find through a web search or ready references, for example "Why does the stomach make funny noises when we’re hungry?" and "How do stoplights sense a car?" You can ask for advice and local knowledge, like restaurant recommendations (Leibenluft, 2007), which you can’t really ask a librarian or teacher. The strengths of traditional education can also help the weaknesses of Social Q&As. For example, the difficulty of controlling contents in Social Q&As, such as same-question repetition and spam comments, could be solved by allowing users to report to a web moderator and flag inappropriate contents (Gazan, 2008). Also, librarians and teachers are more likely to teach you how to find reliable information than just to give you an answer. Yahoo! Answers is not only a Social Q&A but also social networking site where people have discussions and build online relationship. Social Q&As are less reliable than traditional education because the information is provided anonymously and even by non experts. Duguid explains that Social Q&A sites are based on peer production and the laws of quality: “Peer production projects constantly change. What is flawed today may be flawless tomorrow”. Therefore, in order to improve the quality of Yahoo! Answers, the web moderator creates features that prevent users from submitting an answer without citation of a reliable source. 


References
Duguid, Paul (2006). Limits of Self-Organization: Peer Production and "Laws of QualityÓ. First Monday 11(10).  http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1405/1323
Leibenluft, Jacob (2007).  A Librarian's Worst Nightmare: Yahoo! Answers, where 120 million users can be wrong. Slate, 7 December 2007.  http://www.slate.com/id/2179393/fr/rss/ 
Gazan, Rich (2008).  Social Annotations in Digital Library Collections.  D-Lib 14(11/12). http://www.dlib.org/dlib/november08/gazan/11gazan.html
Dempsey, Lorcan (2009).  Always On: Libraries in a World of Permanent Connectivity.  First Monday 14(1).  http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2291/2070