{"id":354,"date":"2010-04-17T15:15:20","date_gmt":"2010-04-17T19:15:20","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/niftyc\/?p=354"},"modified":"2011-07-29T22:53:26","modified_gmt":"2011-07-30T02:53:26","slug":"future-social-science-on-and-with-digital-media","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/niftyc\/archives\/354","title":{"rendered":"Future Social Science On and With Digital Media"},"content":{"rendered":"<p style=\"text-align: left\">(or: <strong>Now I&#8217;m a video blogger [sort of]<\/strong>)<\/p>\n<p style=\"text-align: left\">Here are my notes from our session at <a href=\"http:\/\/www.ichass.illinois.edu\/hastac2010\/HASTAC_2010\/Welcome.html\">HASTAC 2010<\/a>. \u00a0It was a pleasure to convene a virtual panel &#8220;there&#8221; this weekend with Alison Powell, Richard Rogers, Bod\u00f3 Bal\u00e1zs, and David Phillips. \u00a0The whole thing is online (as a <a href=\"http:\/\/cyber.law.harvard.edu\/events\/2010\/04\/hastac\">set of linked YouTube shorts, organized here<\/a>). \u00a0These notes include notes on what I said and what everyone else said.<\/p>\n<p style=\"text-align: center\">\n<p style=\"text-align: center\"><a href=\"http:\/\/blogs.law.harvard.edu\/niftyc\/files\/2010\/04\/shapeimage_2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-359\" src=\"http:\/\/blogs.law.harvard.edu\/niftyc\/files\/2010\/04\/shapeimage_2-300x122.png\" alt=\"\" width=\"300\" height=\"122\" srcset=\"https:\/\/archive.blogs.harvard.edu\/niftyc\/files\/2010\/04\/shapeimage_2-300x122.png 300w, https:\/\/archive.blogs.harvard.edu\/niftyc\/files\/2010\/04\/shapeimage_2.png 592w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">\n<p><strong>Future Social Science On and With Digital Media<\/strong><\/p>\n<p><strong><span style=\"color: #000000\"><span style=\"font-weight: normal\">Saturday, April 17, 2010 &#8212;\u00a06:15 &#8211; 6:45 p.m. &#8212; location:\u00a0cyberspace? (heh.)<\/span><br \/>\n<\/span><\/strong><strong><span style=\"color: #000000\"><br \/>\n<\/span><\/strong><span style=\"color: #000000\"><strong>ABSTRACT<\/strong><\/span><\/p>\n<p>What it means to study society is profoundly changing as we are increasingly surrounded by and incorporated into a pervasive network of digital media (Lazer et al, 2009).\u00a0 In this panel, five scholars will comment for five minutes each on emerging research problems, opportunities, and methods in social science both with and about digital media.\u00a0 Topics will include computational (or e-) social science, new forms and genres of social media, new methods and tactics, legal obstacles to transformative research, and challenges for future graduate education in the social sciences.<\/p>\n<p>Here are the notes&#8230;<\/p>\n<p><!--more--><\/p>\n<hr \/>\n<h1>Christian Sandvig:<\/h1>\n<p><strong>The Internet is on the verge of blowing up all of our methods courses<\/strong><\/p>\n<p>[Note to blog readers: \u00a0This is a slightly modified version of <a href=\"http:\/\/blogs.law.harvard.edu\/niftyc\/archives\/277\">my earlier blog post with this title<\/a>.]<\/p>\n<p>Our methods courses are basically organized around procedure.  You could say that\u2019s what research methods are &#8212; procedure \u2013 a set of steps that everyone follows. We need to have a more wide ranging discussion about research design \u2013 our methods education at this moment needs to produce students who are <strong>capable of inventing their own procedure<\/strong>.<\/p>\n<p>Favorite books on research methods is by Webb Campbell Schwartz and Sechrest, and it is called Unobtrusive Measures.  It is a social science classic from 1966.<\/p>\n<p>Webb et al make the point that what we call <strong>research is done at the outcroppings where theory matches instrumentation<\/strong>.  You could say the match between theory and instrumentation is the small slice of overlap in a venn diagram.<\/p>\n<p>We have some set of questions interests and problems yet only a little bit of information is susceptible to research at any given time.  Even though instrumentation keeps expanding our reach, still we are looking at the top of an island and guessing at the mountain range that is under the sea.<\/p>\n<p>But now the venn diagram has exploded.  The sea has been drained.  <strong>All of my metaphors have failed<\/strong>.  Thanks to ubiquitous digital media we have stores of data we never dreamed of and entirely new modes of research have opened up for us.<\/p>\n<p>Inspiration for this HASTAC panel  was an editorial in the journal Science titled \u201c<a href=\"http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC2745217\/\">Life in the Network<\/a>&#8221; (Lazer et al, 2009). \u00a0The editorial makes the case for a new kind of social science to emerge as the result of advances in information and communication technology.<\/p>\n<p>One of them is that this future social science is already occurring &#8212;<\/p>\n<p>\u201ccomputational social science is occurring, and on a large scale, <strong>in places like Google, Yahoo, and the National Security Agency<\/strong>&#8230;Computational social science could easily become the almost exclusive domain of private companies and government agencies\u201d<\/p>\n<p>One way to attack this is to start doing new social science ourselves.<\/p>\n<p>BUT fallacies and assumptions fill our methods courses now.<\/p>\n<ul>\n<li><strong>Social science is slow.<\/strong><\/li>\n<li><strong>Samples are small.<\/strong><\/li>\n<li><strong>Data is scarce and expensive.<\/strong><\/li>\n<li><strong>Fieldwork requires travel.<\/strong><\/li>\n<li><strong>The most difficult part of research is gathering the data.<\/strong><\/li>\n<li><strong>Research methods means executing the same procedure as everyone else.<\/strong><\/li>\n<\/ul>\n<p>Not clear what the new social science will look like <strong>or who will be allowed to do it.<\/strong> But a first step would be courses designed with the assumptions that:<\/p>\n<ul>\n<li><strong>Social science is fast and responsive.<\/strong><\/li>\n<li><strong>Data is plentiful.<\/strong><\/li>\n<li><strong>Theory is scarce.<\/strong><\/li>\n<li><strong>Methods means designing a new kind of research<\/strong>.<\/li>\n<\/ul>\n<hr \/>\n<h1>Alison Powell:<\/h1>\n<p><strong>Legal Challenges to Social Science: The Digital Economy Bill<\/strong><\/p>\n<p>Powell is a researcher who works on innovation, digital activism, and new technology.  She&#8217;s based in the UK and she&#8217;s mad because they&#8217;ve passed a new law called The Digital Economy Bill (#debill).<\/p>\n<p>The law is \u201clike <strong>putting a gigantic lock\u201d on internet users<\/strong> and innovation.<\/p>\n<p>As one example, public Wi-Fi could cease to exist in the UK because the law is written so strictly.<\/p>\n<p>There was a controversy about the law, but (mostly) only online.  25000 tweets about a law = no measureable effect on parliament<\/p>\n<p>As a result, the bill that locks up the Internet was debated for less than two hours, and passed.  Mediated politics and parliamentary politics in this case have no intersection.<\/p>\n<p>Problem: Digital activism is perceived as a \u201cniche interest\u201d but these issues touch every aspect of the economy.<\/p>\n<p>Social science needs to engage law and policy to address the conditions for access to the primary media channel of our age \u2013 an open and uncensored Internet.<\/p>\n<p>Twitter users are young people who use the service to talk to others like themselves.  A key challenge for digital media \/ social media and its researchers is that we ensure we are not producing <strong>echo chambers \/ systems of disengagement<\/strong>.<\/p>\n<hr \/>\n<h1>Richard Rogers:<\/h1>\n<p><strong>#iranelection RT (for the ppl of Iran)<\/strong><\/p>\n<p>Most tweets are banal, but some small portion (about 8%) are interesting enough to RT.  The iran election was called the twitter revolution.<\/p>\n<p>Question: Is it possible to <strong>turn twitter into a storytelling machine<\/strong>\u2026 that is, a machine that can tell us what is happening on the ground as well as what is happening in social media?<\/p>\n<p>Let\u2019s capture the top 3 RTs with the hashtag #iranelection and visualize them chronologically, then sort.  It works.<\/p>\n<p>\u201cYou see the heat of the moment.  You see, in some sense, the ground.\u201d<\/p>\n<hr \/>\n<h1>Bod\u00f3 Bal\u00e1zs:<\/h1>\n<p><strong>Toward a social science of piracy<\/strong><\/p>\n<p>Only studies from developing countries see intellectual property piracy as a cultural practice.  What about the rest?  Studies of the non-legal, non-economic aspects of participating in illegal file-sharing networks simply aren\u2019t done.<\/p>\n<p>The piracy of intellectual property merits attention not only because of its illegality or ubiquity\u2026 it deserves attention because <strong>it shapes the ideas and attitudes of millions of people and teaches them what sharing and cooperation means.<\/strong><\/p>\n<p>Illegal file sharing networks are about how to form and negotiate online identity or anonymity &#8212; although they aren\u2019t normally thought of in that way. (paraphrase)<\/p>\n<p><strong>Piracy is a powerful productive force<\/strong> whose legacy in social relations will stay with us long after the economic conditions that called it into being (and the power vacuum that enabled it) have passed<\/p>\n<p>Far from anarchy, piratical activity is well-organized by (for instance) norms and server enforced share ratios. In short: <strong>honor among thieves<\/strong>. (paraphrase)<\/p>\n<p>Even as intellectual property protections are strengthened, the ability to enforce these protections has declined.<\/p>\n<p>Among pirates, we find <strong>a resilient common pool resource that defends<\/strong> itself against attacks from the outside and from tragedies of the commons that might arise from within.<\/p>\n<p>Subtle differences between pirates \u2013 or not so subtle differences \u2013 are commonly ignored, despite the fact that there each might have a totally different motivation and process for piracy, with different consequences.<\/p>\n<hr \/>\n<h1>David Phillips:<\/h1>\n<p><strong>Public Space, Surveillance Practice, and Identity Play<\/strong><\/p>\n<p>\u201cHow do we understand our street and our place there when we are simultaneously walkind<\/p>\n<p>down it and reading about it on Google Earth?\u201d<\/p>\n<p>We are now producing a new kind of space.  There are three points of entry into this mess &#8212; or &#8220;tactics&#8221; for understanding &#8212; the new space that might lead to a cohesive understanding.<\/p>\n<h3>#1 Unexpected border crossings<\/h3>\n<ul>\n<li>\u201cYour boss read facebook!\u201d (cf. Erving Goffman)<\/li>\n<li>&#8220;That video of yourself performing those grotesqueries on chat roulette &#8212; it&#8217;s on chat maps now with a pinpoint to your street.&#8221;<\/li>\n<li>&#8220;You are honor bound to ignore anything behind me that might be inappropriate to display<\/li>\n<\/ul>\n<p>in this now public setting.&#8221;<\/p>\n<h3>#2 Simultaneous but Differential Occupation of the Same Space<\/h3>\n<ul>\n<li>The \u201cuser\u201d or \u201cplayer\u201d on Webkinz vs. the \u201coperator\u201d<\/li>\n<\/ul>\n<p>The same performances are subject to wildly different interpretations<\/p>\n<h3>#3 The Co-Structuring of Physical and Data Spaces<\/h3>\n<ul>\n<li>Physical spaces built to optimize surveillance camera angles<\/li>\n<\/ul>\n<p>We are building a new kind of space.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(or: Now I&#8217;m a video blogger [sort of]) Here are my notes from our session at HASTAC 2010. \u00a0It was a pleasure to convene a virtual panel &#8220;there&#8221; this weekend with Alison Powell, Richard Rogers, Bod\u00f3 Bal\u00e1zs, and David Phillips. \u00a0The whole thing is online (as a set of linked YouTube shorts, organized here). \u00a0These [&hellip;]<\/p>\n","protected":false},"author":2132,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[1321],"tags":[],"class_list":["post-354","post","type-post","status-publish","format-standard","hentry","category-research"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4M7Bm-5I","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/posts\/354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/users\/2132"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":14,"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/posts\/354\/revisions"}],"predecessor-version":[{"id":603,"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/posts\/354\/revisions\/603"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/media?parent=354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/categories?post=354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/niftyc\/wp-json\/wp\/v2\/tags?post=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}