social computing research sept. 5, 2013 uichin lee kaist kse

37
Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Upload: melissa-tyler

Post on 23-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social Computing Research

Sept. 5, 2013Uichin LeeKAIST KSE

Page 2: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Today’s Papers• The intellectual challenge of CSCW:

The gap between social requirements and technical feasibility. Mark Ackerman, Human-Computer Interaction, 15, 179-203, 2000

• The trouble with social computing systems research, Michael S. Bernstein, Mark S. Ackerman, Ed H. Chi, Robert C. Miller, ACM CHI EA, 2011

• The (Anti)Social Net, Elizabeth Churchill, Interactions, 2010

Page 3: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Social network research in early days (~1930s-1950s)– Primarily concerned with people and social

management of relationships and connections– How methods could be triangulated with other

data sources to foster an understanding of how people interact (social behavior)

The (Anti)Social Net, Elizabeth Churchill, Interactions, 2010

Page 4: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Our hats as designers, developers, and business entrepreneurs of social technologies matter (forcing us to forget what social means)– Primary (sensory) vs. secondary experience (rational)

• Developers: excited with hard technical challenges (and computational power–often leading to overkill)

• Entrepreneurs and media strategists: goggle-eyed for the potential audience reach and the bucks that can be made

• Designers: generally better, but their prevailing logic was often like “let’s go ahead”

Page 5: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net• In recent incidents, social-technical gap was obvious

– Unintended reveal of personal information (e.g., Google Buzz) – Everything is public? (e.g., Facebook’s privacy setting)

• Can we prevent these?– Deeper understanding of what the technology is and how it fits

into people’s everyday lives– Concomitant shift in the way where design decisions are

elaborated and business decisions are made– Evaluation must be well designed; avoid evaluation of simply

doing “eating your own dogfood”-type of biased user studies in the lab setting

Page 6: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net• “Social networking sites have focused on networks and individuals.

When it comes to interacting and having relationships, people don’t think in terms of the sum of total connections, and inter-connections they have,

but they think of the individuals they know and the groups they belong to.

People and groups are different from nodes and networks”

“Groupware and Social Dynamics” by Jonathan Grudin (CACM 1994)

Page 7: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Challenges for social network developers– Understand that your intuitions are likely wrong• As a designer/developer, we are operating in secondary

mode• Most people are operating in primary mode most of

the time• Given that our intuitions are likely wrong we need to

conduct well-grounded evaluation and have an experimental mindset

Page 8: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Challenges for social network developers– Broaden your ideas about evaluation

• This is more than a numbers game• You don’t understand social by only looking at your social

network! (try to understand what else your users are using)• Comparative studies across different sites can give a better

picture of people’s actual social patterns• Grand “implications” about human sociality based on data from

one social site are overblown and should be taken with a pinch of salt

• Start with the assumption that you are being biased and myopic, and from there drill into the data to see what you might be missing

Page 9: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Challenges for social network developers– Understand your constituencies • People operate in groups and communities (of

circumstance, interest, practice, etc)• Different factors that may draw people to one another

and different needs that are being met• Don’t only support features that are most trafficked;

give some thought to seldom used but highly valued

Page 10: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Challenges for social network developers– Manage change; don’t thrust it on people• Changes to social features must be carefully managed

(design + introduction)• Disruption of social processes: social tech sometimes

leads to activities that violate social norms/taboos, threaten existing political structures, or demotivate the users

Page 11: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The (Anti)Social Net

• Challenges for social network developers– Communicate with people who use your site, and

understand what they want to communicate to others and to you

– Develop a clear ethical stance• Thank beyond what is legal to what is ethical• Your design process needs to include evaluations and

assessments that have a focus broader than Wall Street and your technological advantage..

Page 12: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The intellectual challenge of CSCW: The gap between social requirements

and technical feasibility

Mark Ackerman, Human-Computer Interaction, 15, 179-203, 2000

Page 13: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social-Technical Gap

• Social activities are often very flexible, nuanced, contextualized

• We don’t know how to build systems that fully support such social activities– Technical systems are often rigid and brittle

• Social-technical gap: the divide between what we know we must support socially vs. what we can support technically

• Example: computer-mediated communications still lack much computational support for sharing information, roles, and other social policies

The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Mark Ackerman, Human-Computer Interaction, 15, 179-203, 2000

Page 14: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social-Technical Gap

• Exploring, understanding, and hopefully ameliorating this socio-technical gap has been the central challenge in HCI

• Many people worked, yet this gap still exists• We’ll look at Computer Supported Collaborative

Works (CSCW) literature to better understand this socio-technical gap

The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Mark Ackerman, Human-Computer Interaction, 15, 179-203, 2000

Page 15: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Well-Known Findings in CSCW

• Social activity is fluid and nuanced– Technically difficult to construct properly and

often awkward to use• Example: access control system– What to release when? – Difficult due to lack of shared histories and

meanings (context)• Exceptions are normal in work processes

CSCW: Computer Supported Collaborative Works

Page 16: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Well-Known Findings in CSCW

• Members in social communities often have differing (and multiple) goals– May be hidden/conflicting goals

• Conflict may be as important as cooperation in obtaining issue resolution

• Finding ways of managing the problems and trade-offs resulting from conflict and coordination

Page 17: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Well-Known Findings in CSCW

• People prefer to know who else is present in a shared space and they use this awareness to guide their work– Control room examples; air traffic controllers

monitor others to anticipate their future workflow– Adding awareness (i.e., knowing who’s present)

and peripheral awareness (i.e., low-level monitoring of others’ activity) to shared communications systems

Page 18: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Well-Known Findings in CSCW

• Visibility of communication exchanges and of information enables learning and greater efficiencies– Situated learning, learning in a community of

practice (e.g., copilots learn from observing pilots work)

– Side effects: criticism, management, formality, lack of sharing, incentives

Page 19: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Well-Known Findings in CSCW

• The norms of using a CSCW system are often actively negotiated among users

• A critical mass problem is important (i.e., # of active users must be maintained; otherwise, “melt-down” will happen)

• People adapt to systems (adaptation); they adapt systems to their needs (coevolution)

• Incentives are critical (e.g., knowledge sharing)

Page 20: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social-technical Gap in P3P (Platform for Privacy Preferences)

• Privacy control dimension: recipient vs. data itself

• Handling an infinite information space? Can we design such an interface?

• What about underlying social requirements?

• Social-technical gap– Not sufficient nuance (vs. fine-grained distinctions)– Not socially flexible (vs. graceful switching social contexts)– Not sufficiently ambiguous (vs. inherently ambiguous)

Page 21: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Technical Research

• Existing studies emphasized a dichotomy:– Designers/programmers vs. social analysts

(nuance/flexibility)• Technical research on bridging the gap– Answer Garden:

• Initial roles: info seeker and provider?• Answer Garden 2: providing ranges of expertise (nuance) + both

seeker/provider (flexibility)

– Concurrency control:• More sophisticated in interactive environments covering s/w, data,

interface • Social context matters with conflicting actions

Page 22: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Technical Research

• Be aware of the following arguments:– It’s not likely this gap can be solved shortly (though

constantly improving; often, AI-complete problems)– Gap is not historical artifacts; we have been co-evolving

with technology (e.g., neo-Taylorism, co-evolutionary version)• Gap is still important; e.g., "round off the edges” of

coevolution

• Socio-technical gap is real important and likely to remain….

Page 23: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

What to Do with Social-Technical Gap?

• Is it a black hole or an important aspect?– CSCW’s vitality comes from its understanding of

the fundamental nature of the gap

• Should we continue to state and restate the gap?– Research communities should strive to ameliorate

the effects of the gap; and to further understand the gap

Page 24: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Moving Forwards

• CSCW (and more broadly social computing):– Should attempt to construct suitable systems for

groups, organizations, and other collectivities– As a social science, should attempt to understand

the basis for that construction in the social world (or everyday experience)

• Yet, consider the gap between what we would prefer to construct and what we can construct – Some level of approximation is required

Page 25: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Moving Forwards

• Lots of work in the past indeed:– Ideological initiatives: e.g., prioritizing the needs

of people using the systems – like participatory design

– Educational perspectives: programmers and users should understand the fundamental nature of the social requirements

Page 26: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Needs Systematic ExplorationProposal: First-order approximation

• Partially address the social requirements – Satisfying specific tasks/settings is OK

• Add functions that help people to make social adjustments – e.g., enabling CMC components like chatting

• Incorporate new computational mechanisms:– to substitute adequately for social mechanisms; or to provide for new

social issues – e.g., distorted video/audio images to give social presence

• Create technical architectures that do not invoke social-technical gap as they provide supportive or augmentative facilities like advice to users – e.g., collaborative filtering, recommender systems, critic systems that

make suggestions to users about design choices

Page 27: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Guiding Questions for Researchers

• When can a computational system successfully ignore the need for nuance and context?

• When can a computational system augment human activity with computer technologies suitably to make up for the loss in nuance and context, as argued in the approximation section above?

• Can these benefits be systematized so that we know when we are adding benefit rather than creating loss?

• What types of future research will solve some of the gaps between technical capabilities and what people expect in their full range of social and collaborative activities?

Page 28: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Guiding Questions for Researchers

• Cyclic pattern: study design/construction (artifact) theory

Page 29: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

The trouble with social computing systems research

Michael S. Bernstein, Mark S. Ackerman, Ed H. Chi, Robert C. Miller,

ACM CHI EA, 2011

Page 30: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social Computing Systems Research

• Research whose main contribution is the presentation of a new socio-technical artifact, algorithm, design, or platform

• Envisioning new ways of interacting with social systems; spreading ideas to other researchers and the world at large

• Traditional CSCW/CHI research had full of systems papers (e.g., distributed teams and collaborations)

• Due to a massive growth in platforms, APIs, and interest in social computing, we see lots of new interesting research systems

Page 31: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social Computing Systems Research

• Reality: 4-1 ratio (understanding users vs. systems, tools, architectures, infra) in CHI 2011

• Challenges– Social computing systems are caught between social

science and computer science, with each discipline de-valuing work at the intersection

– Social computing systems face a unique set of challenges in evaluation: expectations of exponential growth and criticisms of snowball sampling

– How can academic social computing research compete or cooperate with industry?

Page 32: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social Computing Systems Research

• Caught-in-the-middle in conflicts between builders (computer science) vs. studiers (social science)

• Studiers: strength in numbers– Become a majority in the CHI community– Limited field studies of social computing systems: they worry too much about internal

validity (often requiring large scale studies like A/B tests, long-term evaluation)• Builders: keep it simple, stupid – or not?

– Expecting a contribution with technical novelty: this often translates into elegant complexity (possibly very simple, but interesting ideas); flashy tasks (e.g., end user programming, novel interaction tech)

– But social computing systems contributions are not always in a position to display elegant complexity• Microblogging: very simple, but has social changes• User interfaces (way ahead of adoptions): may not attract much use on social networks• New commenter interfaces: hard to convincing existing users to test them

Page 33: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Social Computing Systems Research

• Caught-in-the-middle:– Making a system technically interesting

• But a crowd will rarely use it because it’s too complex

– Simplifying it to produce socially interesting outcomes: • But builders will dismiss papers as less novel• Also, studiers may balk at an uncontrolled field study

– Cf) Twitter would not have been accepted as a CHI paper – no complex design or technical challenges, a peculiar subpopulation-based user study

Page 34: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Judging Novelty• Social contributions change how people interact (enabling new

social affordances—foreign to Builders)– New forms of social interactions: e.g., shared organizational memory– Designs that impact social interactions: e.g., rapidly increasing online

participation– Socially translucent systems: interactive systems that allow users to rely

on social intuitions• Technical contributions: novel designs, algorithms, and infra

(supporting new social affordances—foreign to Studiers)– Highly original designs, apps, and visualizations designed to collect and

manage social data (or powered by social data)– New algorithms that coordinate crowd work or derive signal from social

data (e.g., collaborative filtering)– Platforms and infrastructures for developing social computing apps

Page 35: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Evaluation

• Living lab studies of social computing systems– ?? Expecting exponential growth

• # participants: median of 16 participants (CHI2006)• Usefulness/usability: how to measure usefulness? (e.g.,

voluntary usage vs. fee-based user studies?)• Spread vs. steady-state phases; not required to address

both; also, be careful about your claims about contributions

– ?? Get out of the snow? No snowball sampling• Sometimes it is inevitable in social systems• Random sampling could be impossible • Snowball sample is another form of convenience sampling

Page 36: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Summary

• Social-technical gap is real important and likely to remain; research communities should strive to ameliorate the effects of the gap; and to further understand the gap

• Take off our hats as designers, developers, and entrepreneurs of social tech; focus what social means as primary experience (sensory) instead of secondary experience (rational)

• Unique position of social computing systems research: caught-in-the-middle (builders and studiers), challenges of evaluation (small biased sampling)– How to judge novelty? How to evaluate systems well?

Page 37: Social Computing Research Sept. 5, 2013 Uichin Lee KAIST KSE

Next Week

• Week 2: Online Community Design

• Reading assignments– Encouraging contributions to online communities,

R. E. Kraut, P. Resnick, 2012 – (optional) Evidence-based social design:

Introduction, Paul Resnick, Robert Kraut, 2012