Trajectories through Social Machines Kevin R. Page and David De Roure Oxford e-Research Centre, University of Oxford, UK.

Abstract A Social Machine is the consideration of a combined socio-

technical entity on the Web. Inherent in observing this composition is the need to apply mixed methods over both the technical infrastructure  as we might see in a more traditional Web Observatory  the social communities that interact with the Web, and their operation and interaction in combination as a Social Machine. To further complicate our observa-

tions, the intent of these constructs may dier both across concurrent social groups with divergent aims, and through evolution of an initial purpose over time. Such parallel and iterative use, re-use, and modication of social and computational elements confounds the application of a boundary dening any single, static, Social Machine. To address the challenge of observing these ckle amorphous composites we introduce the notion of trajectories, as dened by their purpose; trajectories provide a dimension through which we might study the interaction between the socio-technical elements. We identify distinct trajectories for concurrent purposes and for evolving purposes as they morph over time, and propose the comparative evaluation of such trajectories as a mechanism for better understanding the overall Social Machine.

1

Introduction

In observing Social Machines [1] we set out to analyse both computational (Web servers, clients, and other tooling) and human elements, considering them as a socio-technical whole of machines and people, rather than as stratied layers of each. We have previously argued the utility of studying interactions between multiple Social Machines and the means by which they evolve and change over time individually and as a network; where elements may be reused within concurrent Social Machines beyond the intent of their original design and construction [2]. In that work we provided an illustration of The Machines of Spam which we revisit here for similar purpose. The scenario considers the evolving Social Machine(s) around the reCAPTCHA [3] service: 1. the genuine users of social websites who undertake reCAPTCHA mechanisms to prove they are human to those sites; 2. spam originators who procure the services of human mercenaries (via websites set up for this purpose), who in turn complete the reCAPTCHA to gain an account on the social websites, which is then traded with the spammer.

2

What to observe - whither the Social Machine?

In order to study and understand the emergence and behaviour of Social Machines, and indeed to construct the Observatory through which to undertake such study, an obvious rst step might be to dene the limits of a Social Machine so it can be identied and observed. While this is an interesting intellectual question and certainly worthy of further consideration, the complexities and ever-changing nature of Social Machines (discussed in [2]) contrive to make this a diversionary exercise from that of observation.

Social Machine A

"Genuine" Social Website Users reCAPTCHA

Social Website

Social Machine C Social Machine B Mercenary Community Spam Originators

Website to coordinate mercenaries

Figure 1. Notional delimitations of Social Machines in the reCAPTCHA scenario (il-

lustrated as grey ellipses)

Figure 1 illustrates this conundrum for the reCAPTCHA scenario: since the reCAPTCHA service has been used by both genuine users and the the spammers' mercenaries it would seem of interest to dene these Social Machines distinctly (Social Machines

A and B

respectively) and study the design and con-

struction of each as well as the interaction between them; yet at the same time we would like to consider the properties of an evolving emergent system exhibited

C ). There is, perhaps, no clear cut answer:

by the Social Machine as a whole (

1

all these aspects  all these Social Machines

 are worthy of investigation, but

without the clarity of borders the Social Machine(s) resist analysis as surely as they resist denition.

1

In [2] a further Social Machine is identied, comprising the socio-technical elements of despamming scripts and websites listing known spammers. This too can can be represented as a trajectory, passing through the same and additional elements as the example in Section 3, but is omitted here for simplicity.

So while we can see there are many

potential

boundaries to our Social Ma-

chine(s), we should ask whether it is necessary to identify them before we build our Observatory? Are there alternative characterisations that might more clearly aid their study?

3

Trajectories

purpose as a key mechanism in the study trajectory 2 , each of which is dened primarily by such a purpose; that is, an end for which a path

In our previous work[1] we proposed

of Social Machines. We extend that notion here to one of a through elements of the Social Machine is taken.

In Figure 2 we describe the same reCAPTCHA scenario, with the same Social Machine elements, but in terms of trajectories, each dened according to a

i ii ) the subversion of the test by mercenaries on behalf of spammers;

purpose: ( ) the passing of the reCAPTCHA test to validate a user for genuine reasons; (

iii ) the use of human input to the reCAPTCHA tests for statistical training

and (

and solving of (optical) character recognition tasks  a purpose more easily made explicit through this characterisation of trajectories. It is also worth noting that both the genuine and mercenary communities contribute jointly to the third trajectory, a subtlety similarly dicult to describe with an aggregating view of Social Machines.

Purpose: Pass test to join website "Genuine" Social Website Users

Trajectory i

reCAPTCHA

Purpose: Character Recognition

Trajectory iii Purpose: Pass test to vandalise website Mercenary Community Website to coordinate mercenaries

Spam Originators

Trajectory ii

Figure 2. Trajectories through the reCAPTCHA scenario and their distinct purposes

2

The word trajectory intended to impart the importance of the time axis in the study of Social Machines, as discussed in [2]

Having characterised and identied trajectories we can use them as an axis for study and comparison. A single trajectory collapses the dimensions of investigation to a single purpose at a single time; this provides a foundation for a clear and well dened set of elements and assessment criteria along which qualitative and quantitative methods can be applied to inter- and intra-element behaviour. Furthermore, we can make comparison of social and technical elements (or sets of elements) as they transpose multiple trajectories, be that where trajectories comprise dierent elements due to diering purpose; or where the same elements present multiple trajectories over the passage of time (with potentially evolving purpose). For example, a comparative study of the reCAPTCHA service as it interacts in multiple trajectories might prove insightful in understanding the emergent properties of the wider Social Machine.

4

Summary and future work

In this paper we have proposed

trajectories as a mechanism through which the

key properties of Social Machines can be observed and studied: a dimension that captures the subtlety of interacting sub-Machines; enables distinction and comparison throughout an emergent Social Machine's lifecycle or lifespan; and respects consideration of both design and serendipity by way of purpose. Through trajectories we believe we can reduce the observed complexity of Social Machines, providing a path or sample along which mixed methods can be applied for comparative study, enhancing rather than compromising our ability to study the nature of Social Machines as a whole. We believe the identication of trajectories is critical to building Observatories for Social Machines and prioritising the properties that will provide most insight when measured within the Observatory. Dening measures than span a complete trajectory will clearly prove challenging; as a rst step we suggest comparative analysis of single (or small set of ) element

across trajectories may

help explore these boundaries.

Acknowledgements

We are grateful to all our colleagues for useful discussions and insights. This work is supported by SOCIAM: The Theory and Practice of Social Machines, funded by the UK Engineering and Physical Sciences Research Council (EPSRC) under grant number EP/J017728/1 and comprising the Universities of Southampton, Oxford and Edinburgh.

References 1. Tim Berners-Lee and Mark Fischetti. Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor. Harper, 1999.

2. David De Roure, Clare Hooper, et al. Observing Sociam Machines Part 1: What to Observe? In Proc. 1st International Workshop on The Theory and Practice of Social Machines, 2013. In Press.

3. Luis Von Ahn, Benjamin Maurer, et al.

reCAPTCHA: Human-based character

recognition via web security measures. Science, 321(5895):14651468, 2008.

Trajectories through Social Machines

tion of social and computational elements confounds the application of ... purpose: (i) the passing of the reCAPTCHA test to validate a user for genuine reasons ...

218KB Sizes 2 Downloads 123 Views

Recommend Documents

Trajectories through Social Machines
Trajectories through. Social Machines. Building Web Observatories workshop, Paris, May 2013. Kevin Page, David De Roure. Oxford e-Research Centre, University of Oxford ...

Early Fatherhood Trajectories
Early Fatherhood Trajectories: A Latent Class Growth Analysis. Jacinda K. .... and the Senate include funding ($200 or $300 million per year) for marriage incentive programs and additional funds for ..... Furthermore, software for modeling.

Social Relationships Formed Through Maize ...
Sep 7, 2010 - Social Relationships Formed Through Maize Cultivation in a Mien Hillside Village, Northern Thailand. 190. 4th Asian ..... different ethnic group-and a friend of the master of household N, and came from Chiang. Rai province to visit ....

Social Relationships Formed Through Maize ...
more important, than the types of jobs performed. This labor ..... https://www.nstda.or.th/index.php/royal-project/1277-chickens-and-humans-in-thailand-their-mul.

Atypical trajectories of number development-a neuroconstructivist ...
Atypical trajectories of number development-a neuroconstructivist perspective.pdf. Atypical trajectories of number development-a neuroconstructivist ...

Accelerating Light Beams along Arbitrary Convex Trajectories
May 25, 2011 - invariant (non-diffracting) yields the Airy beam solution, which carries ..... at z ј 0, coincides with the phase of the analytic expansion of the Ai ...

Discovering Popular Routes from Trajectories
be considered, e.g., for a tour planning, it is better to adopt the trajectories of ..... In practice, as GPS data is more or less dirty, we first reduce outlier points that ...

Alternative developmental trajectories in annual killifish.pdf
development, which posits a phylotypic period (a bottleneck of reduced phenoty- pic divergence that occurs mid-embryogenesis) bracketed by periods of increased. divergence earlier and later in development [1,4]. According to Raff [4], early. developm

Computing with Spatial Trajectories - Semantic Scholar
services (LBS), leading to a myriad of spatial trajectories representing the mobil- ... Meanwhile, transaction records of a credit card also indicate the spatial .... that can run in a batch mode after the data is collected or in an online mode as.

Three dimensional arm trajectories
curvature profile, a straight course causes the curva- ture to go to zero, ... are recorded on film and later computer processed by projecting ... Top: Goniometric.

Trajectories Emerging From Discrete Versus Continuous Processing ...
Models in Phonological Competitor Tasks: A Commentary on Spivey,. Grosjean, and Knoblich (2005) .... (2005) necessarily support the model they endorsed?

OPTIMIZATION OF ORBITAL TRAJECTORIES USING ...
a big number of times, reducing the exploration of the search space; at the end of .... (1971) directly calculate the velocity vector in the extreme points of the orbital arc ..... Algorithms in data analysis, Printed by Universiteitsdrukkerij Gronin

Three dimensional arm trajectories
swer suggested by the experimental data is that only the "bending" of the trajectory ... based on the spatial composition of chains of planar strokes, overlapped in ...

Embedding Multiple Trajectories in Simulated ...
Oct 21, 2009 - the number of embedded trajectories increases so does net- ...... Song S, Miller KD, Abbott LF (2000) Competitive Hebbian learning through.

Using developmental trajectories to understand developmental ...
Using developmental trajectories to understand developmental disorders.pdf. Using developmental trajectories to understand developmental disorders.pdf.