tag:blogger.com,1999:blog-373151142024-02-07T11:30:01.025-08:00The Sociology of Informationthe not quite raw, not quite half-baked, observations of a sociologist of informationDan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.comBlogger125125tag:blogger.com,1999:blog-37315114.post-42883054896103448132017-05-10T14:05:00.003-07:002017-05-10T18:38:18.490-07:00In Comey Firing Trump Gets Notification Wrong AgainAny number of news outlets communicated a sense of outrage over the fact that James Comey apparently learned he'd been fired by looking up at news coverage on TV monitors while speaking before an audience in Los Angeles.<br />
<br />
What these commentators were zeroing in on was the violation by Trump of what I call "<a href="http://djjr-courses.wikidot.com/essays:notification" target="_blank">notification norms</a>." One just doesn't tell someone they are fired by telling someone else who then releases it to journalists so that one literally "hears about it on the news."<br />
<br />
Now, from a strictly utilitarian perspective, it might not matter much; you're out of a job either way. But, we might say, how you find out can add insult to injury. But how, exactly, does that extra sting of shame happen? People felt it vicariously; as when the scalpel comes out on a medical show, one's instinct is to turn away, though here it was not the integrity of skin that is violated, but the integrity of the self. One part of the self's integrity requires that certain kinds of information breaches "just are not done." <br />
<br />
Every relationship comes with a set of informational expectations - things that a member of the relation knows she will be told in a certain way in a certain order. Your mother does not learn of your pregnancy from a casual acquaintance who heard it from a friend in the grocery store. One winces just thinking about such things. In professional settings, you learn where you are in the status order by which meetings you are invited to, which announcements are run by you before they are released, which things you learn about when others are asked to "give us the room."<br />
<br />
In the Comey affair, we experienced a gigantic collective wince as we saw someone of relatively high status - the director of the FBI on a ten year contract - socially demoted by a massive notification violation at the same time as we wince watching another high status actor, the president, wantonly disregard a notification norm. That's the thing with norms - we feel it not just out of sympathy for the proximate victim of the violation; we feel the norm violation because it tells us all that we might not live in the kind of world we thought we lived in.<br />
<br />
But the public discourse, especially in the media, about the inappropriateness of the notification does something to restore our sense of the world. What we saw last night, almost no matter what channel we tuned in to, were fellow citizens, not themselves victims of the breach of etiquette, calling it out. With each comment saying how inappropriate the manner of Trump's notification of Comey was, we got a small step of the way back to being able to take for granted that certain information behaviors just aren't done.<br />
<h2>
See also</h2>
<br />
<ul>
<li><a href="http://soc-of-info.blogspot.com/2008/09/theory-of-notification.html" style="color: #333333;">The Theory of Notification</a></li>
<li><a href="http://soc-of-info.blogspot.com/2011/09/bloomberg-contra-notification-norms.html" style="color: #333333;">Bloomberg Contra Notification Norms</a></li>
<li><a href="http://soc-of-info.blogspot.com/2008/11/textbook-perfect-example-of.html" style="color: #333333;">Notification on your Blackberry</a></li>
<li><a href="http://soc-of-info.blogspot.com/2009/02/notificational-webs-in-cricles-of.html" style="color: #333333;">Notificational Webs in Circles of Friends</a></li>
<li><a href="http://soc-of-info.blogspot.com/2008/09/relational-notification-norms-on-mad.html" style="color: #333333;">Relational Notification Norms on "Mad Men"</a></li>
<li><a href="http://soc-of-info.blogspot.com/2008/12/what-goes-on-page-one.html" style="color: #333333;">What Goes on Page One?</a></li>
<li><a href="http://soc-of-info.blogspot.com/2008/08/democracy-and-information-order.html" style="color: #333333;">Democracy and the Information Order</a></li>
<li><a href="http://soc-of-info.blogspot.com/2008/09/children-as-spies.html" style="color: #333333;">Children as Spies</a></li>
</ul>
Dan Ryanhttp://www.blogger.com/profile/15544690248354631910noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-43570129831667816772016-11-20T13:41:00.001-08:002016-11-20T13:41:19.426-08:00Squirrels and DemocracyEssay in progress (w GKH):<br />
<br />
HRC criticized DJT as unfit to lead because he could fly off the handle over an insulting tweet, get distracted by a minor outrage. Is the opposition, collectively, guilty of the same thing?<br />
<br />
Was the Hamilton tweet affair a case of the left half of the country having a "squirrel!" moment and thus taking its eyes off the nomination of some seriously scary men to cabinet and agency head positions?<br />
<br />
More generally, does our hair trigger ability to pounce on racist, sexist, homophobic, transphobic, culturally appropriative, or personally insulting comments, our readiness to rush to join in on an internet "take down" of someone who says or does something ideologically scandalous, reduce our capacity for thoughtful and effective counterplay?<br />
<br />
Does the other side know this, at least implicitly, and take advantage of it? Are we duped into thinking that accumulating likes from people who already are like us is effecting positive change?Are we sometimes party to a media loop in which we react to something, react to one another reacting, and then satisfiedly watch ourselves on the news (or as something trending online), basking in the solidarity of shared outrage?<br />
<br />
Weber famously described politics as the long, slow boring of hard boards. Has the internet become such a drug of instant ideological gratification, has it so enabled instant, coordinated outrage that the demos, too, is unfit to rule?Dan Ryanhttp://www.blogger.com/profile/15544690248354631910noreply@blogger.com1tag:blogger.com,1999:blog-37315114.post-71209809475603971142014-02-07T15:20:00.001-08:002014-02-07T15:21:13.550-08:00The Socially Competent Node<div class="a">
<div style="text-align: justify;">
Consider the following deviant characters: loose cannons,
blabbermouths, gossipers, and yentas, stool pigeons and canaries, tattlers and
squealers, garblers, the nosy, the deaf to hints, talkers-out-of-school, missers-of-winks,
leakers, spoilers of surprises, whistle blowers, betrayers, moles and
turncoats, unreliable messengers, and friends who “didn’t realize you’d want to
know” or forget to mention. In each case the deviance lies in the social
handling of information. </div>
</div>
<div class="a">
<div style="text-align: justify;">
<br /></div>
</div>
<div class="a">
<div style="text-align: justify;">
Curiously, they can all be distinguished from the most
well know information deviant, the liar, by the fact that they can be deviant while handling "the truth."<span style="mso-spacerun: yes;"> </span>These
characters are "deviant nodes" who fail at their duties in a
social information networks.<span style="mso-spacerun: yes;"> </span>They do so
by passing along what they should not, or by transmitting to the wrong people,
or by notifying in the wrong manner, time, or sequence.<span style="mso-spacerun: yes;"> </span>They fail to discriminate.<span style="mso-spacerun: yes;"> </span>They introduce errors into the message.<span style="mso-spacerun: yes;"> </span>They do not distinguish relevant from
irrelevant.<span style="mso-spacerun: yes;"> </span>They miss the real message,
fail to appreciate urgency or delicateness. They let down those who trusted
them to stay silent or to speak up.<o:p></o:p></div>
</div>
<div class="a">
<div style="text-align: justify;">
<br /></div>
</div>
<div class="a">
<div style="text-align: justify;">
The list above shows that we have lots of nouns to describe those
who talk out of turn, but few for for those who
fail as nodes by saying too little.<span style="mso-spacerun: yes;">
</span>Adjectives abound: "diffident"implies not speaking up when one could or should, and "reticent"
means "to remain silent" and implies a hesitance to pass along information.<span style="mso-spacerun: yes;"> </span>And there are familiar utterances such as
"What? Why didn't you tell me?" or "I didn't think you would
want to know…" that are evocative of the node who falls down on the job, but the social types seem not sufficiently crystalized to have
names the way the overzealous communicators do.<span style="mso-spacerun: yes;"> </span>We do have terms of approbation to describe those who positively exceed
expectations of discretion and reticence: confidantes, bosom buddies, pals, and
cronies are all characters with whom information is safe, but even these are
not as general as the negative types, each being tied to specific others.<o:p></o:p></div>
</div>
<div class="a">
<div style="text-align: justify;">
<br /></div>
</div>
<div class="a">
<div style="text-align: justify;">
While the colorful terms above describe empirically unusual roles, the potential for each of the behaviors is high.<span style="mso-spacerun: yes;"> </span>The
social networks of everyday interaction are full of opportunities for nodes to
get it wrong or go rogue. Each of us walks around "recording" images
and sounds and actions and utterances, we engage in conversations and we have
random thoughts, all material that we could "post" to our ("real world") social
networks, pass along to the next person we run into.<span style="mso-spacerun: yes;"> </span>But mostly we do not.<span style="mso-spacerun: yes;"> </span></div>
</div>
<div class="a">
<div style="text-align: justify;">
<br /></div>
</div>
<div class="a">
<div style="text-align: justify;">
What stops us from describing to colleagues
the sounds a co-worker just made in the bathroom or what one's spouse said last
night? Why do we not worry that our kids will narrate for their friends the
details of her parents' recent fight or that our colleague will reveal the source of that tidbit about the boss we passed along? Even people
who completely take to heart advice to "never put something in an email
that you don't want the world to see," are far less guarded and vigilant in everyday life. </div>
</div>
<div class="a">
<div style="text-align: justify;">
<br /></div>
</div>
<div class="a">
<div style="text-align: justify;">
The relative worry that we put into Facebook
privacy settings compared to the nonchalance with which we participate in
everyday social networks suggests the phenomenally high levels of "privacy
settings" we take for granted in the people around us.<span style="mso-spacerun: yes;"> </span>Most of the nodes in our everyday social
networks, we seem to assume, know how to be socially competent nodes.<span style="mso-spacerun: yes;"> </span><br />
<br />
Before they are very old, before they've been friends for very long,
before they have much experience on the job, they are masters of nuance and
signaling, they understand the security clearance levels in within circles of friends
and family, they understand what is for attribution and what is not, what is on
the record, what is off; without being explicitly told they know what does not
leave a room, what was not said by you, and what was never said at all; <o:p></o:p></div>
</div>
<div class="a">
<div style="text-align: justify;">
<br /></div>
</div>
<div style="text-align: justify;">
But how do they get that
way? How does one learn to be a
(competent) node? That's what this chapter is about.</div>
Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-54211734011539271302014-02-05T12:04:00.001-08:002014-02-05T13:10:17.254-08:00Religion and Learning to be a Node<h4>
<span style="color: #365f91; font-family: Times, Times New Roman, serif;"><b>A short excerpt from zeroth draft of chapter "Learning to be a node"</b></span></h4>
<div class="MsoNoSpacing">
<div style="text-align: justify;">
<blockquote class="tr_bq">
<span style="font-family: Times, Times New Roman, serif;"><i>The chapter is about how social networks depend on competent nodes and how competent nodes are made rather than born. I show how primary and secondary socialization help us learn what we can tell to whom when. Other sections in the chapter are about children as spies; discretion as a social achievement; humor, drama and the incompletely socialized node; the social organization of omniscience; and the social control of nodes in corporations and states.</i></span></blockquote>
<span style="font-family: Times, Times New Roman, serif;">For Jews and Christians, the most well known religious exhortation
about information behavior is probably the commandment "thy shall not bear
false witness" (Exodus 20:16, <span style="mso-bidi-font-weight: bold;">Deuteronomy
5:20</span>), but sacred texts are rich in behavioral guidance for nodes in
social networks.<span style="mso-spacerun: yes;"> </span>The admonitions are
general guides for information behavior and suggest misgivings about humans as untutored
nodes in community communication networks.<o:p></o:p></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">The most
basic suggestion is to err on the side of silence.<span style="mso-spacerun: yes;"> </span>Imam Nawawi, the 13<sup>th</sup> century
Islamic commentator,<a href="https://www.blogger.com/blogger.g?blogID=37315114#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference">[1]</span><!--[endif]--></span></span></a>
says </span></div>
</div>
<blockquote class="tr_bq">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">"It is obligatory for every sane adult to guard his tongue against
talking, except when it contains a clear benefit. If talking and remaining
silent are of equal benefit, it is <i style="mso-bidi-font-style: normal;">sunnah</i>
(normative) to abstain, for permissible talking might lead to something
undesirable or forbidden, as in fact is very often the case, and nothing
matches safety."</span></div>
</blockquote>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;"><span style="mso-spacerun: yes;"></span><span style="mso-bidi-font-weight: bold;">The book of Proverbs (21:23</span>) suggests "Whoever
keeps his mouth and his tongue keeps himself out of trouble" and in Ecclesiastes
(3:7) we are reminded that there is "a time to keep silence, and a time to
speak."<span style="mso-spacerun: yes;"> </span>In the Christian New
Testament, Saint Paul exhorts the <span style="mso-bidi-font-weight: bold;">Ephesians
<span style="mso-spacerun: yes;"> </span>to "</span>[l]et no corrupting talk
come out of your mouths, but only such as is good for building up, as fits the
occasion, that it may give grace to those who hear"<span style="mso-bidi-font-weight: bold;"> (4:29). The Koran is on the same page: </span></span><span style="font-family: Times, 'Times New Roman', serif;">"He does not utter a [single] word, except that there is, with him, [an angel] ready and waiting [to record it]" (50:18).</span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">The
baseline recommendation, then, for nodes is mindfulness about what they
transmit; in a word, nodes should not always be "on."<span style="mso-spacerun: yes;"> </span>But all of these traditions go into greater
specificity about what responsible and socially competent nodes should and
should not "put on the network."<o:p></o:p></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">Both
Judeo-Christian and Islamic traditions address gossip and
"tale-telling" as a continuum of network behaviors that require
regulation.<span style="mso-spacerun: yes;"> </span>Three levels are specified
in the Torah: mere idle talk; negative truths about others; and negative
falsehoods about others.<span style="mso-spacerun: yes;"> </span>The first, <i style="mso-bidi-font-style: normal;">Avak lashon harah</i>, follows from the
suggestion to err on the side of silence, prohibiting <i style="mso-bidi-font-style: normal;">rechilut</i> or “peddling,” prattling on, repeating things for the sake
of repeating them<span style="background-color: white; background-position: initial initial; background-repeat: initial initial; color: black;"> </span>(Leviticus 19:16).<span style="mso-spacerun: yes;"> </span>A more serious network sin is for a node to
be a conduit for negative information, even if it is true, unless it is
specifically intended to improve a bad situation. <span style="mso-spacerun: yes;"> </span><i style="mso-bidi-font-style: normal;">Lashon hara</i>
means repeating negative truths.<span style="mso-spacerun: yes;"> </span>The
most serious infraction is <i>Hotzaat shem ra,</i><span style="mso-bidi-font-style: italic;"> slander or defamation through spreading untrue negative things about
others.</span><o:p></o:p></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">This
suggests an awareness that a community depends on actors to socially attenuate
what gets through to the network, to apply generic content rules to what
they do and do not transmit. <span style="mso-spacerun: yes;"> </span>And nodes
are not only prohibited from sending gossip along, they are actually also
enjoined from <i style="mso-bidi-font-style: normal;">Mekabel lashon harah</i>, accepting
and believing gossip or slander (Pesachim 118a).<span style="mso-spacerun: yes;"> </span>This is, perhaps, a recognition that the
temptation to pass gossip along is so strong that the only way to avoid it is
to prevent the information's arrival in the first place.<o:p></o:p></span></div>
</div>
<div class="MsoNormal">
<div style="text-align: justify; text-indent: .25in;">
<span style="font-family: Times, Times New Roman, serif;">In Sharia law, slander,
gossip, and backbiting, or "<i style="mso-bidi-font-style: normal;">ghiba</i>"
is regarded as a major sin, perhaps more serious than adultery <!--[if supportFields]><span
style='font-family:Garamond'><span style='mso-element:field-begin'></span><span
style="mso-spacerun:yes"> </span>ADDIN ZOTERO_ITEM CSL_CITATION
{"citationID":"KXuXAich","properties":{"formattedCitation":"(Al-Ghazali
2008)","plainCitation":"(Al-Ghazali 2008)"},"citationItems":[{"id":2547,"uris":["http://zotero.org/users/310308/items/S8B99UAG"],"uri":["http://zotero.org/users/310308/items/S8B99UAG"],"itemData":{"id":2547,"type":"webpage","title":"The
Rules of Backbiting","container-title":"Qibla - for The
Islamic
Sciences","URL":"http://qa.sunnipath.com/issue_view.asp?ID=212","author":[{"family":"Al-Ghazali","given":"Abu
Hamid Muhammad"}],"issued":{"date-parts":[["2008"]]},"accessed":{"date-parts":[["2014",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"}
<span style='mso-element:field-separator'></span></span><![endif]--><span style="mso-no-proof: yes;">(Al-Ghazali 2008)</span><!--[if supportFields]><span
style='font-family:Garamond'><span style='mso-element:field-end'></span></span><![endif]-->:<o:p></o:p></span></div>
</div>
<div class="MsoQuote">
<blockquote class="tr_bq">
<span style="font-family: Times, Times New Roman, serif;">"O you who believe! Avoid much suspicion, for some
suspicions are a sin. Do not spy on one another, nor backbite one another.
Would one of you love to eat the flesh of his dead brother? Nay, you would
abhor it, [so similarly, avoid backbiting]. And fear Allah. Indeed, Allah is
Most Forgiving, Most Merciful." (Qur'an, [49:12])</span></blockquote>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">The
excessive attention given in these traditions to the regulation of gossip
suggests a keen awareness of the deleterious effects of unregulated
communication networks. In
the book of Proverbs the transmission of gossip is connected to social
conflict: "Without wood a fire goes out; without gossip a quarrel dies
down" (26:20) and the destruction of relationships: "He who covers
over an offense promotes love, but whoever repeats the matter separates close
friends" (Proverbs 17:9).<span style="mso-spacerun: yes;"> </span>These
traditions are also aware of the non-linear effects of deviant information
transmission; in the epistle of James we read "The tongue is a small part
of the body, but it makes great boasts. Consider what a great forest is set on
fire by a small spark. The tongue also is a fire, a world of evil among the
parts of the body. It corrupts the whole person, sets the whole course of his
life on fire, and is itself set on fire by hell" (James 3:5-6).<o:p></o:p></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">Too,
nodes are admonished to eschew second hand information:<span style="mso-spacerun: yes;"> </span><span style="mso-bidi-font-style: italic;">"And
do not follow that of which you do not have knowledge. Indeed, the hearing, the
sight and the heart - [you] will be asked about all of those" (Qur'an,
[17:36]).</span><o:p></o:p></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 6.0pt; text-indent: .25in;">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">In these
sources we even find attention being paid to the micro-sociological aspects of nodal
behavior. <span lang="EN">Rashi</span>, <span lang="EN">the
medieval Torah commentator, notes that winking is a behavior common among those
who would traffic in gossip. "To eat the food of winking" was
understood as a way of sealing the deal – you spread gossip and your
willingness to break break proves your sincerity but the winking part means
that some folks are in on it and know it is gossip while those unsuspecting
hearers take it as reportable truth.<span class="MsoFootnoteReference"> <a href="https://www.blogger.com/blogger.g?blogID=37315114#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN">[2]</span></span><!--[endif]--></span></a></span><i><o:p></o:p></i></span></span></div>
</div>
<div class="MsoNoSpacing">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">The counsel to prefer silence is not an absolute that
would shut networks down.<span style="mso-spacerun: yes;"> </span>Believers are
reminded that even as they are enjoined from spreading malicious gossip, nodes
still have obligations upon receiving certain kinds of information:<o:p></o:p></span></div>
</div>
<div class="MsoQuote">
<div style="text-align: justify;">
<blockquote class="tr_bq">
<span style="font-family: Times, Times New Roman, serif;">If you hear it said about one of the towns the LORD your God
is giving you to live in that wicked men have arisen among you and have led the
people of their town astray, saying, "Let us go and worship other
gods" (gods you have not known), then you must inquire, probe and
investigate it thoroughly. <span style="font-style: normal; mso-bidi-font-style: italic;">Deuteronomy 13:12-15</span></span></blockquote>
</div>
</div>
<div class="MsoNoSpacing">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">Another aspect of being a competent node is to wisely
pick the nodes to which you are connected.<span style="mso-spacerun: yes;">
</span>The Book of Proverbs suggests that gossip reveals meta-information about
the gossiping node: <o:p></o:p></span></div>
</div>
<div class="MsoQuote">
<div style="text-align: justify;">
<blockquote class="tr_bq">
<span style="font-family: Times, Times New Roman, serif;">With his mouth the godless destroys his neighbor, but through
knowledge the righteous escape... A gossip betrays a confidence, but a
trustworthy man keeps a secret (Proverbs 11: 9;13).</span></blockquote>
</div>
</div>
<div class="NoSpacingcontinuedn">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">and <o:p></o:p></span></div>
</div>
<div class="MsoQuote">
<div style="text-align: justify;">
<blockquote class="tr_bq">
<span style="font-family: Times, Times New Roman, serif;">A gossip betrays a confidence; so avoid a man who talks too
much (Proverbs 20:19).</span></blockquote>
</div>
</div>
<div class="NoSpacingcontinuedn">
<div style="text-align: justify;">
<span style="font-family: Times, Times New Roman, serif;">This same observation also shows up in a Spanish
proverb, "Quienquiera chismea a ti chismeará sobre ti"<!--[if supportFields]><span
style='mso-element:field-begin'></span> ADDIN ZOTERO_ITEM CSL_CITATION
{"citationID":"V9z823Zw","properties":{"formattedCitation":"(best-quotes-poems.com.
2007)","plainCitation":"(best-quotes-poems.com.
2007)"},"citationItems":[{"id":2543,"uris":["http://zotero.org/users/310308/items/8CQT389V"],"uri":["http://zotero.org/users/310308/items/8CQT389V"],"itemData":{"id":2543,"type":"webpage","title":"cotizaciones
y refranes del chisme","URL":"http://www.best-quotes-poems.com/espanol/cotizaciones-del-chisme.html","author":[{"family":"best-quotes-poems.com.","given":""}],"issued":{"date-parts":[["2007"]]},"accessed":{"date-parts":[["2014",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"}
<span style='mso-element:field-separator'></span><![endif]--><span style="mso-no-proof: yes;">(best-quotes-poems.com. 2007)</span><!--[if supportFields]><span
style='mso-element:field-end'></span><![endif]-->: Whoever gossips to you will
gossip about you. <!--[if supportFields]><span style='mso-element:field-begin'></span><span
style="mso-spacerun:yes"> </span>ADDIN ZOTERO_ITEM CSL_CITATION
{"citationID":"OUhPymkh","properties":{"formattedCitation":"(worldofquotes.com
2013)","plainCitation":"(worldofquotes.com
2013)"},"citationItems":[{"id":2539,"uris":["http://zotero.org/users/310308/items/QVE5XD3A"],"uri":["http://zotero.org/users/310308/items/QVE5XD3A"],"itemData":{"id":2539,"type":"webpage","title":"gossip
Quotes","container-title":"WorldofQuotes","abstract":"View,
share, rate, and discuss gossip Quotes at WorldofQuotes.com","URL":"http://www.worldofquotes.com/topic/gossip/1/index.html","author":[{"family":"worldofquotes.com","given":""}],"issued":{"date-parts":[["2013"]]},"accessed":{"date-parts":[["2014",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"}
<span style='mso-element:field-separator'></span><![endif]-->(worldofquotes.com
2013)<!--[if supportFields]><span style='mso-element:field-end'></span><![endif]-->.
<span style="mso-bidi-font-weight: bold;">Publilius Syrus, a first century BC wit
also counseled picking friends on the basis of their nodal competence: "Count
not him among your friends who will retail your privacies to the world" </span><!--[if supportFields]><span
style='mso-bidi-font-weight:bold'><span style='mso-element:field-begin'></span><span
style="mso-spacerun:yes"> </span>ADDIN ZOTERO_ITEM CSL_CITATION
{"citationID":"p0iqy0Md","properties":{"formattedCitation":"(worldofquotes.com
2013)","plainCitation":"(worldofquotes.com
2013)"},"citationItems":[{"id":2539,"uris":["http://zotero.org/users/310308/items/QVE5XD3A"],"uri":["http://zotero.org/users/310308/items/QVE5XD3A"],"itemData":{"id":2539,"type":"webpage","title":"gossip
Quotes","container-title":"WorldofQuotes","abstract":"View,
share, rate, and discuss gossip Quotes at
WorldofQuotes.com","URL":"http://www.worldofquotes.com/topic/gossip/1/index.html","author":[{"family":"worldofquotes.com","given":""}],"issued":{"date-parts":[["2013"]]},"accessed":{"date-parts":[["2014",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"}
<span style='mso-element:field-separator'></span></span><![endif]--><span style="mso-bidi-font-weight: bold;">(worldofquotes.com 2013)</span><!--[if supportFields]><span
style='mso-bidi-font-weight:bold'><span style='mso-element:field-end'></span></span><![endif]--><!--[if supportFields]><span
style='mso-bidi-font-weight:bold'><span style='mso-element:field-begin'></span>
ADDIN ZOTERO_ITEM CSL_CITATION
{"citationID":"k9tmXKbX","properties":{"formattedCitation":"(Wikipedia
Editors 2013)","plainCitation":"(Wikipedia Editors
2013)"},"citationItems":[{"id":2544,"uris":["http://zotero.org/users/310308/items/ZP6VWVV7"],"uri":["http://zotero.org/users/310308/items/ZP6VWVV7"],"itemData":{"id":2544,"type":"entry-encyclopedia","title":"Publilius
Syrus","container-title":"Wikipedia, the free
encyclopedia","source":"Wikipedia","abstract":"Publilius
Syrus, a Latin writer of maxims, flourished in the 1st century BC. He was a
Syrian who was brought as a slave to Italy, but by his wit and talent he won
the favour of his master, who freed and educated him. Publilius' name, due to
early medieval palatalization of 'l' between two 'i', is often presented by
manuscripts (and some printed editions) in corrupt form as
'Publius'.","URL":"http://en.wikipedia.org/w/index.php?title=Publilius_Syrus&oldid=590466060","note":"Page
Version ID:
590466060","language":"en","author":[{"family":"Wikipedia
Editors","given":""}],"issued":{"date-parts":[["2013"]]},"accessed":{"date-parts":[["2014",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"}
<span style='mso-element:field-separator'></span></span><![endif]--><span style="mso-bidi-font-weight: bold;">(Wikipedia Editors 2013)</span><!--[if supportFields]><span
style='mso-bidi-font-weight:bold'><span style='mso-element:field-end'></span></span><![endif]--><span style="mso-bidi-font-weight: bold;">. Horace (65BCE-8BCE) gives similar advice: </span>"Percunctatorem
fugito, nam garrulus idem est; / Nec retinent patulæ commissa fideliter aures"
: Avoid an inquisitive person, for he is sure to be a gossip; ears always open
to hear will not keep faithfully what is intrusted to them <!--[if supportFields]><span
style='mso-element:field-begin'></span><span style="mso-spacerun:yes"> </span>ADDIN
ZOTERO_ITEM CSL_CITATION
{"citationID":"Sb43BYGZ","properties":{"formattedCitation":"(Wood
1899)","plainCitation":"(Wood
1899)"},"citationItems":[{"id":2546,"uris":["http://zotero.org/users/310308/items/TSW7VEQN"],"uri":["http://zotero.org/users/310308/items/TSW7VEQN"],"itemData":{"id":2546,"type":"book","title":"Dictionary
of Quotations From Ancient and Modern, English and Foreign
Sources","publisher":"Frederick Warne &
Co","publisher-place":"London, New
York","event-place":"London, New York","abstract":"www.bartleby.com/345/247.html#371","URL":"http://www.bartleby.com/345/","note":"Bartleby.com,
2012","author":[{"family":"Wood","given":"James"}],"issued":{"date-parts":[["1899"]]},"accessed":{"date-parts":[["2014",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"}
<span style='mso-element:field-separator'></span><![endif]--><span style="mso-no-proof: yes;">(Wood 1899)</span><!--[if supportFields]><span
style='mso-element:field-end'></span><![endif]-->.<o:p></o:p></span><br />
<h4>
<span style="font-family: Times, Times New Roman, serif;">References</span></h4>
</div>
</div>
<div class="MsoBibliography">
<br />
<ol>
<li><span style="font-family: Times, 'Times New Roman', serif;">Al-Ghazali, Abu Hamid Muhammad. 2008. “</span><a href="http://qa.sunnipath.com/issue_view.asp?ID=212" rel="nofollow" style="font-family: Times, 'Times New Roman', serif;" target="_blank">TheRules of Backbiting</a><span style="font-family: Times, 'Times New Roman', serif;">.” </span><i style="font-family: Times, 'Times New Roman', serif;">Qibla - for The Islamic Sciences</i><span style="font-family: Times, 'Times New Roman', serif;">.</span></li>
<li><span style="font-family: Times, 'Times New Roman', serif;">Best-quotes-poems.com.
2007. “</span><a href="http://www.best-quotes-poems.com/espanol/cotizaciones-del-chisme.html" rel="nofollow" style="font-family: Times, 'Times New Roman', serif;" target="_blank">Cotizaciones y Refranes Del Chisme</a><span style="font-family: Times, 'Times New Roman', serif;">.”</span></li>
<li><span style="font-family: Times, 'Times New Roman', serif;">Wikipedia
Editors. 2013. “</span><a href="http://en.wikipedia.org/w/index.php?title=Publilius_Syrus&oldid=590466060" rel="nofollow" style="font-family: Times, 'Times New Roman', serif;" target="_blank">Publilius Syrus</a><span style="font-family: Times, 'Times New Roman', serif;">.” </span><i style="font-family: Times, 'Times New Roman', serif;">Wikipedia, the Free Encyclopedia</i><span style="font-family: Times, 'Times New Roman', serif;">.</span></li>
<li><span style="font-family: Times, 'Times New Roman', serif;">Wood,
James. 1899. </span><i style="font-family: Times, 'Times New Roman', serif;"><a href="http://www.bartleby.com/345/" rel="nofollow" target="_blank">Dictionary of Quotations From Ancient and Modern, English andForeign Sources</a></i><span style="font-family: Times, 'Times New Roman', serif;">. London, New York: Frederick Warne & Co. .</span></li>
<li><span style="font-family: Times, 'Times New Roman', serif;">Worldofquotes.com.
2013. “</span><a href="http://www.worldofquotes.com/topic/gossip/1/index.html" style="font-family: Times, 'Times New Roman', serif;" target="_blank">Gossip Quotes</a><span style="font-family: Times, 'Times New Roman', serif;">.” </span><i style="font-family: Times, 'Times New Roman', serif;">WorldofQuotes</i><span style="font-family: Times, 'Times New Roman', serif;">.</span></li>
</ol>
<!--[if supportFields]><span style='mso-element:field-begin'></span><span
style="mso-spacerun:yes"> </span>ADDIN ZOTERO_BIBL {"custom":[]}
CSL_BIBLIOGRAPHY <span style='mso-element:field-separator'></span><![endif]--></div>
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>JA</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="276">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]-->
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<!--StartFragment-->
<!--[if supportFields]><span style='font-size:11.0pt;font-family:Calibri;
mso-ascii-theme-font:minor-latin;mso-fareast-font-family:Calibri;mso-fareast-theme-font:
minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;mso-ansi-language:EN-US;mso-fareast-language:
EN-US;mso-bidi-language:AR-SA'><span style='mso-element:field-end'></span></span><![endif]-->
<!--EndFragment--><br />
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<br />
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=37315114#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: Calibri; font-size: 10.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
Nawawi (1234–1277 CE) wrote about <i>Fiqh</i>, an expansion of conduct rules
found in the Quran,<o:p></o:p></div>
<div class="MsoFootnoteText">
<span style="mso-spacerun: yes;"> </span>and <i>hadith</i>
which are reports of the sayings of the prophet.<o:p></o:p></div>
<div class="MsoFootnoteText">
<br /></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=37315114#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: Calibri; font-size: 10.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
See <span style="mso-bidi-font-weight: bold;"><a href="http://www.chabad.org/library/bible_cdo/aid/9920#v=16" rel="nofollow" target="_blank">Vayikra - Leviticus - Chapter 19</a></span>.<span style="mso-spacerun: yes;"> </span>Note emphasis there on spying on your
neighbors so you could talk about them.<span style="mso-spacerun: yes;">
</span>This relates directly to the material on children as spies.<o:p></o:p></div>
</div>
</div>
Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-8842402692972153822013-04-14T13:33:00.000-07:002013-04-14T21:29:50.627-07:00Institutional Reports and TagAlongs<br />
While talking with GKH about writing today, I figured out what was wrong with a draft of an institutional report I read yesterday: it was packed with <i>tag-alongs</i>: words and phrases not invited to the sentences and paragraphs I was trying to read. Their presence unnecessary and their company unwelcome, but all such familiar rhetorical faces that authors forget to play the doorman, ticket taker, bouncer, or maître d'hôtel and so all comers were admitted and seated. Too polite to thin their own ranks, some sentences meander from initial cap to final period like an oversubscribed progressive dinner. Some paragraphs careen down the page like overstacked, overstuffed pickup trucks you hate to drive behind for fear they'll tip over and spill their load. And things that need saying and arguments worth making are left to fend for themselves, like a shy guy trying in vain to get a bartender's attention in a crowded, noisy pub.<br />
<br />
This phenomenon is a variation on what Orwell had in mind when he wrote that "modern writing at its worst does not consist in picking out words for the sake of their meaning and inventing images in order to make the meaning clearer. It consists in gumming together long strips of words which have already been set in order by someone else, and making the results presentable by sheer humbug" (<a href="https://www.mtholyoke.edu/acad/intrel/orwell46.htm" target="_blank">1946</a>). He was advocating for elevated political discourse, but his characterization of it as "language as an instrument for expressing and not for concealing or preventing thought" works for institutional uses of language too, which are too often, as Orwell says of political language, as if "designed to make lies sound truthful and murder respectable, and to give an appearance of solidity to pure wind." <br />
<br />
When it comes to reports, perhaps we'd do better to charge by the word instead of paying by the hour.Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com1tag:blogger.com,1999:blog-37315114.post-51876867712654577572012-10-28T11:24:00.001-07:002012-10-28T11:24:33.698-07:00Conference Tools for TwitterRecent experience of following (and contributing to) Twitter stream at the annual meetings of the American Sociological Association inspired a number of ideas (not all original, I'm sure, and some probably already implemented) in connection with Twitter and conferences:<br />
<ol>
<li>Conference organizers should devise and disseminate a simple hashtag schemes for sessions/presentations.</li>
<li>Set up scheduled tweets that announce sessions, say, 15 minutes ahead of time. Tweet can contain a link to web page with detailed information about session.</li>
<li>Presenters can submit brief, say 5 to 10, tweet summary of the points they are making and these can be automatically scheduled to be tweeted during the talk.</li>
<li>If talks are being live streamed, start of each talk can be marked by a tweet with URL to the stream. Major point tweets could be synced to location in recorded video/audio.</li>
<li>Develop an app that aggregates and archives live tweets of presentations for live and followup discussion.</li>
</ol>
<div>
What would you add?</div>
Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-65226554428878493362012-10-28T11:06:00.000-07:002012-10-28T11:06:29.288-07:00Sociology of Information Nuggets<br />
Elections and a three course semester have crowded out blogging over last few months. And so, the blogger's cop out of pointers to some recent interesting reads:<br />
<br />
<a href="http://www.mayaalexandri.com/" target="_blank">Maya Alexandri</a> has a fun post, "<a href="http://www.mayaalexandri.com/mayas_blog/2010/04/what-thomas-cromwell-had-in-common-with-the-dewey-decimal-system.html" target="_blank">What Thomas Cromwell had in common with the Dewey decimal system</a>" calling attention the theme of information revolutions as noted in the Joan Acocella <a href="http://www.newyorker.com/arts/critics/books/2009/10/19/091019crbo_books_acocella?currentPage=all" target="_blank">review of Hilary Mantel's <i>Wolf Hall</i> in The New Yorker</a>. Alexandri and Acocella note interesting similarity of Cromwell's time and our own as eras in which "information is being radically reorganized." It's precisely the desire to clarify such recapitulations that drives my own work on the sociology of information.<br />
<br />
<br />
<a href="http://blog.semilshah.com/" target="_blank">Semil Shah</a> offers a <a href="http://techcrunch.com/2012/10/28/iterations-its-delicate-but-potent/" target="_blank">panegyric post</a> about <a href="http://timehop.com/" target="_blank">Timehop</a>, an app that automatically sends you a photo of what you were doing a year ago today. It purports, among other things, to be a "solution" to the problem of having boxes of memories that you either never find the time to look at or into which you unintentionally dump hour or hour of time you don't have. Shah's optimistic take is<br />
<blockquote class="tr_bq">
The carousel of old slides, the cigar box of warped pictures, and the Instagrams you’ve taken, now in your pocket, delivered to you in just the right way.</blockquote>
There are some great research questions swirling around issues like personal memory, artifacts, the externalization and automation of recall, search as every-ready reconstruction of the past. Stay tuned.<br />
<br />Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-53292852256879624562012-04-20T18:27:00.001-07:002012-04-20T18:27:30.438-07:00Scoops in Journalism and Everyday Life<br />
Jay Rosen has a post today titled "<a href="http://jayrosen.posterous.com/four-types-of-scoops" target="_blank">Four Types of Scoops</a>" that will surely make it into my sociology of information book. The four types are the "enterprise scoop" where the reporter who gets the scoop gets it by doing the "finding out." The information may be deliberately hidden or obscured by routine practice, but it would not have become known to the public without the work of the reporter. Then there is its opposite, the the "ego scoop": the news would have come out anyway, but the scooper gets (or provokes) a tip or equivalent. The third type Rosen calls the "trader's" scoop where early info has instrumental value -- as in a stock tip. Finally there is the "thought scoop." This is when the writer puts two and two together or otherwise "connects the dots" to, as he says, "apprehend--name and frame--something that's happening out there before anyone else recognizes it."<br />
<br />
The information order of everyday life is conditioned by information exchanges that might be similarly categorized. But even before that we'd notice a distinction between exchanges that are NOT experiences as scoops -- I think there are two extremes: information passed on bucket-brigade style with no claim at all to having generated it or deserving any credit for its content or transmission. "Hey, they've run out of eggs, pass it on, eh?" and statements of a truly personal nature: "I'm not feeling well today" that do not reflect one's position or location or worth in the world. <br />
<br />
Between these there are all manner of instances in which people play the scoop game in everyday interaction. The difference between an ordinary person and a reporter in this regard is that the reporter's scoop is vis a vis "the rest of the media" while the scoopness of the person's scoop is centered in the information ecology of the recipient. We have all met the inveterate ego scooper who moves from other to other to other trying to stay one step ahead of the diffusing information so that s/he can deliver the "scoop" over and over. And the enterprising gossip who pries information loose from friends and acquaintances and is always ready with the latest tidbit. In everyday interaction the wielder of the traders' scoop often generates the necessary arbitrage because others are willing to "pay" for information they can use as ego scoops. Alas, as in the media, the thought scoop is probably the rarest form in everyday life too. It's probably less self-conscious in everyday interaction and too more ephemeral which is too bad. Those conversational insights are probably more often lost than their counterparts in "print."Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-46256981340621725482012-04-08T12:36:00.000-07:002012-04-08T12:39:29.317-07:00Tomorrow's Social Science Today? By Techies?<span style="color: #274e13; font-size: x-small;"><i>If you generate the data, the analysts will come. And more and more of the technologies of everyday life <a href="http://soc-of-info.blogspot.com/2011/04/data-exhaust-and-informational.html" target="_blank">generate data, lots of it</a>. "Big data" takes big tools and big tools cost big bucks. The science of big data is mostly social science but, for the most part, it's not being done by social scientists. What's left out when social scientists leave themselves out of the conversation? And what happens to the funding for non-big-data social science when resource-hungry projects like this emerge? And what will be the effect on the epistemological status of non-big-data social science?</i></span><br />
<br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; font-size: xx-small;"><i>from the New York Times...</i></span><br />
<h6 class="kicker" style="font-family: arial, helvetica, sans-serif; font-weight: normal; line-height: 1.4em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left; text-transform: uppercase;">
<span style="font-size: xx-small;">THE BAY CITIZEN</span></h6>
Berkeley Group Digs In to Challenge of Making Sense of All That Data
<span style="font-size: xx-small;"><nyt_byline style="color: #333333; font-family: georgia, 'times new roman', times, serif; line-height: 15px; text-align: left;"><span itemprop="creator" itemscope="" itemtype="http://schema.org/Person"></span></nyt_byline></span><br />
<h6 class="byline" itemprop="name" style="color: grey; font-family: arial, helvetica, sans-serif; font-weight: normal; line-height: 1.2em; margin-bottom: 2px; margin-left: 0px; margin-right: 0px; margin-top: 2px;">
<span style="font-size: xx-small;"><span itemprop="creator" itemscope="" itemtype="http://schema.org/Person">
By JEANNE CARSTENSEN</span></span></h6>
<span style="font-size: xx-small;"><span itemprop="creator" itemscope="" itemtype="http://schema.org/Person">
</span><span style="color: #333333; font-family: georgia, 'times new roman', times, serif; line-height: 15px; text-align: left;"></span></span><br />
<h6 class="dateline" style="color: grey; font-family: arial, helvetica, sans-serif; font-weight: normal; line-height: 1.2em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;">
<span style="font-size: xx-small;">Published: April 7, 2012</span></h6>
<br />
"It comes in “torrents” and “floods” and threatens to “engulf” everything that stands in its path.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://baycitizen.org/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqmpWfmkOPSUEcnlMLRcgvPcmKy6Vj7hM-WK3SjeigqYvbFC30tBjId0eopfCxtSXf5aUrVtZCbBXi74-yAFMbzIxLCRfTmHUx8c9JFHwUktLqTsqvEGt1S8Db1aNNfbZ_JXEqQQ/s1600/baycitizen.gif" /></a></div>
No, it is not a tsunami, it is Big Data, the incomprehensibly large amount of raw, often real-time data that keeps piling up faster and faster from scientific research, social media, smartphones — virtually any activity that leaves a digital trace.<br />
<br />
The sheer size of the pile (measured in petabytes, one million gigabytes, or even exabytes, one billion gigabytes) combined with its complexity has threatened to overwhelm just about everybody, including the scientists who specialize in wrangling it.
“It’s easier to collect data,” said Michael Franklin, a professor of computer science at the University of California, Berkeley, “and harder to make sense of it.”<br />
<br />
<div style="text-align: center;">
<a href="http://www.nytimes.com/2012/04/08/us/berkeley-group-tries-to-make-sense-of-big-data.html" target="_blank"><span style="color: red; font-family: Arial, Helvetica, sans-serif;"><b>Read full article...</b></span></a></div>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-6106862633391320012012-03-02T22:32:00.000-08:002012-03-02T22:32:18.127-08:00Is There a Right to Data Collection?What's more socially harmful: politicians not knowing what sound bite will play well or voters being mislead by scurrilous misinformation?<br />
<br />
New Hampshire is one state where legislators listened when voters complained about "<a href="http://en.wikipedia.org/wiki/Push_poll" target="_blank">push-polling</a>" -- the practice of making campaign calls that masquerade as surveys or polls. Perhaps the most infamous example is George Bush's campaign calling South Carolinians to ask what they think if John McCain were to have fathered an illegitimate black baby.<br />
<br />
The gist of M. D. Shear's article, <span style="color: black;"><a href="http://www.nytimes.com/2012/03/02/us/politics/law-has-polling-firms-leery-of-new-hampshire.html" style="color: black;" target="_blank">Law Has Polling Firms Leery of Work in New Hampshire</a>" (NYT 1 March 2012)</span> is that pollsters and political consultants are whining that "legitimate" operations are getting gun-shy about polling in New Hampshire for fear of being fined. Actual surveys won't get done, they suggest, because poorly worded legislation creates too much illegitimate legal liability.<br />
<br />
They do not take issue with what the law requires and some even call it well-intentioned. Paragraph 16a of section 664 of Title 53 of New Hampshire statutes requires those who administer push-polls to identify themselves as doing so on behalf of a candidate or issue. In other words, if that's what you are up to, you need to say so.<br />
<br />
The problem, they say, is that the law is poorly written -- good intentions gone bad, they suggest. So, what does the statute actually say? Not so ambiguous, really. It says if you call pretending to be taking a survey but really you are spreading information about opposition candidates then you are push-polling:<br />
<br />
<span style="font-family: 'Courier New', Courier, monospace;"><a href="http://law.justia.com/codes/new-hampshire/2010/titlelxiii/chapter664/section664-2/" target="_blank">XVII. "Push-polling" means</a>: </span><br />
<ol style="list-style-type: lower-alpha;"><li><span style="font-family: 'Courier New', Courier, monospace;">Calling voters on behalf of, in support of, or in opposition to, any candidate for public office by telephone; and</span></li>
<li><span style="font-family: 'Courier New', Courier, monospace;">Asking questions related to opposing candidates for public office which state, imply, or convey information about the candidates' character, status, or political stance or record; and</span></li>
<li><span style="font-family: 'Courier New', Courier, monospace;">Conducting such calling in a manner which is likely to be construed by the voter to be a survey or poll to gather statistical data for entities or organizations which are acting independent of any particular political party, candidate, or interest group.</span></li>
</ol>And so, the question arises: why aren't pollsters themselves taking steps to stamp out the practice? One supposes the answer is that they still want to use it, even if the "good guys" would not stoop to the level of sleaziness that Bush and Lee Atwater practiced.<br />
<br />
Interestingly, one of the objections that the pollsters raised was that "complying with the law by announcing the candidate sponsoring the poll would corrupt the data being gathered." It's interesting because they don't think that constantly adjusting question wording and techniques that are technically push-polling even if they could stay inside the New Hampshire law would corrupt the data.<br />
<br />
But this brings me to my real point. As a practicing social scientist I am consistently disheartened and often angered at the abuse of survey research engaged in by political parties and organizations. I receive "surveys" from the DNC, DCCC, Greenpeace, Sierra Club, MoveOn.org, etc. etc. that triply insult me:<br />
<br />
<ul><li>They are, in fact, often push-polls (if gentle ones) whose real purpose is to inform and incite not collect data.</li>
<li>They are couched disingenuously in terms of providing me an opportunity for input, to have my voice heard.</li>
<li>As research instruments they are almost always C- or worse, violating the most basic tenets of survey construction.</li>
</ul><br />
Perhaps I should just humor them and wink since we do both know what's really going on. Sometimes the political actor in me is content to do so. But at other times the information order pollution that they represent really gets to me. These things corrupt the data of other legitimate research efforts. If the results are used, they amplify the error in the information order. These things undermine social information trust. They cheapen the very idea of opinion research. Imagine a certain amount of what passes as clinical trials is really just PR for pharmaceutical companies. Or imagine that the "high stakes testing" used to study the education system was really just a ploy to indoctrinate children. Or that marine biologists were just sending a message to the mollusks they study.<br />
<br />
As a consultant helping organizations do research I used to ask "are you trying to find out something or are you trying to show something?" To this we could add "or are you just putting on a show?"<br />
<br />
There's something disturbing when an industry like political polling can't do better than suggest that the one state that has taken steps to address a real democracy-threatening practice within that industry is somehow "the problem." A republican pollster whined that the law has “a harmful effect on legitimate survey research and message testing that really impairs our ability to do credible polling,” as if we should care. It doesn't take a Ph.D. to see that a little ignorance on the part of politicians about attitudes in New Hampshire as the price for stopping a practice that corrupts public deliberation is a tradeoff well worth making.Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-81466119657500352642012-02-18T07:11:00.000-08:002012-02-18T07:11:08.566-08:00Should Your Company Tell You Your SecretsNice sociology of info two-fer in <a href="http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/">Forbes article about Target </a> being able to detect pregnancy based on purchases (see also "<a href="http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html">How Companies Learn Your Secrets"in NYT</a>). The first connection is obvious: data mining lets company detect information "given off" by ordinary behavior. Second is the notification question. In the article the "story" is that Target outs young woman to her dad by sending targeted circular for maternity supplies. <br />
<br />
So now we are in the situation where data mining companies have to interrogate their notification obligations just like doctors, lawyers, and spouses. I will work up an analysis in subsequent post. I anticipate insights about how corporate-ness of knower figures into the notification norm calculation.Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-44811014337285737992012-02-13T10:48:00.000-08:002012-02-13T20:00:49.843-08:00Is Your Information Your Business?The Business section is fast becoming the sociology of information section.<br />
<br />
In "<a href="http://www.nytimes.com/2012/02/13/business/media/twitter-is-all-in-good-fun-until-it-isnt.html">Twitter Is All in Good Fun, Until It Isn’t</a>," David Carr writes about Roland Martin being sanctioned by CNN because of controversial Twitter posts. On the Bits page, Nick Bolton's article "<a href="http://bits.blogs.nytimes.com/2012/02/12/disruptions-so-many-apologies-so-much-data-mining/?scp=1&sq=so%20many%20apologies&st=Search">So Many Apologies, So Much Data Mining</a>," tells of David Morin, head of the company that produces the social network app, <a href="https://path.com/">Path</a> ("The smart journal that helps you share life with the ones you love."), that got into hot water last week when a programmer in Singapore noticed it hijacked users' address books without asking. On page B3 we find a 14 inch <a href="http://www.nytimes.com/2012/02/13/business/media/pew-study-finds-ads-on-news-web-sites-are-missing-users.html">article by T. Vega about new research from Pew</a> about how news media websites fail to make optimal use of online advertising.<br />
<br />
More on those in future posts. Right next to the Pew article, J. Brustein's "<a href="http://www.nytimes.com/2012/02/13/technology/start-ups-aim-to-help-users-put-a-price-on-their-personal-data.html">Start-Ups Seek to Help Users Put a Price on Their Personal Data</a>" profiles the startup "<a href="http://www.personal.com/">Personal</a>" -- one of several that are trying to figure out how to let internet users capitalize on their personal data by locking it up in a virtual vault and selling access bit by bit.<br />
<br />
This last one is of particular interest to me. Back in the early 90s I floated an idea that alarmed my social science colleagues: why not let study participants own their data? The idea was inspired by complaints that well-meaning researchers at Yale, where I was a graduate student at the time, routinely made their careers on the personal information they, or someone else, had collected from poor people in New Haven. The original source of that complaint was a community activist who had a more colorful way of describing the relationship between researcher and research subject.<br />
<br />
The idea would be to tag data garnered in surveys and other forms of observation with an ID that could be matched with an <a href="http://www.cis.upenn.edu/~spyce/oct03/posters/vitaly-escrowsingle.pdf">escrow database</a> (didn't really exist then, but now a part of "<a href="http://en.wikipedia.org/wiki/Software_as_a_service">Software as a Service</a> (Saas)"). When a researcher wanted to make use of data, she or he would include in the grant proposal some sort of data fee that would be delivered to the intermediary and then distributed as data royalties to the individuals the data concerned. The original researcher would still offer whatever enticements to participation (a bit like an advance for a book). The unique identifier held by the intermediary would allow data linking producing a valuable tool for research and an opportunity for research subjects to continue to collect royalties as their data was "covered" by new research projects just as a song writer does.<br />
<br />
The most immediate objections were technical -- real but solvable, but then came the reasoned objections. This would make research more expensive! Perhaps, but another way to see this is that it would be a matter of more fully accounting for social costs and value, and for recognizing that researchers were taking advantage of latent value in their act of aggregation (similar to issues raised about Facebook recently). Another objection was that the purpose of the research was already to help these people. True enough. But why should they bear all the risk of that maybe working out, maybe not? <br />
<br />
And so the conversation continued. I'm not sure I like the idea of converting personal information into monetary value; I think it sidesteps some important human/social/cultural considerations about privacy, intimacy, and the ways that information behavior is integral to our sense of self and and sense of relationships. But I do think it is critically important that we think carefully about the information order and how the value of information is created by surveillance and aggregation and how we want to think about what happens to the information we give, give up, and give off.<br />
<br />
<b>Related</b><br />
<br />
<ul><li>Business Insider. 2011. "<a href="http://e.businessinsider.com/view/pyl.h8/10d7b4d0">Here's How Much A Unique Visitor Is Worth</a>"</li>
<li>Morey, Tim. 2011. "<a href="http://designmind.frogdesign.com/blog/what039s-your-personal-data-worth.html">What's Your Personal Data Worth?</a>" DesignMind blog. January 18, 2011</li>
<li>Moody, Glyn. 2010. "<a href="http://opendotdotdot.blogspot.com/2010/01/what-nothing-to-hide-is-hiding.html">'What "Nothing to Hide' is Hiding</a>," on Open... blog 11 Jan 2010.</li>
<li>Muffett, Alec. 2010. "<a href="http://dropsafe.crypticide.com/article/3758">Understanding Your Personal Information’s Value = The End of 'Nothing To Hide'</a>" dropsafe blog 13 Jan 2010.</li>
<li><a href="http://blog.personal.com/">Personal.com Blog</a></li>
<li>Reger, Joe. 2005. "<a href="http://www.joereger.com/entry-logid1-eventid4786-The-Time-Value-of-Personal.log">The Time Value of Personal Information</a>," JoeReger.com blog 27 Dec 2005.</li>
</ul>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-46016527203295275382012-01-22T17:34:00.000-08:002012-01-22T17:34:04.409-08:00Prying Information Loose and Dealing with Loose InformationA sociology of information triptych this morning. Disclosure laws that fail to fulfill their manifest/intended function, the secret work of parsing public information, and the pending capacity to record everything all bear on the question of the relationship between states and information.<br />
<br />
In a 21 Jan 2012 NYT article, "<a href="http://www.nytimes.com/2012/01/22/sunday-review/hard-truths-about-disclosure.html">I Disclose ... Nothing</a>," Elisabeth Rosenthal (<a href="https://twitter.com/#!/nytrosenthal">@nytrosenthal</a>) suggests that despite increasing disclosure mandates we may not, in fact, be more informed. Among the obviating forces are <a href="http://soc-of-info.blogspot.com/search?q=information+overload">information overload</a>, dearth of interpretive expertise, tendency of organizations to hide behind "you were told...", formal rules provide organizations with blueprint for how to play around with technicalities (as, she notes, Republican PACs have done, using name changes and re-registration to "reset" their disclosure obligation clocks), routinization (as in the melodic litanies of side-effects in drug adverts), and the simple fact that people are not in a position to act on information even it is abundantly available and unambiguous. On the other side, the article notes that there is a whole "industry" out there -- journalists, regulators, reporters who can data mine the disclosure information even if individuals cannot take advantage.<br />
<br />
Rachel Martin's (<a href="https://twitter.com/#!/rachelnpr">@rachelnpr</a>) piece on NPR's Weekend Edition Sunday, <a href="http://www.npr.org/2012/01/22/145587161/cia-tracks-public-information-for-the-private-eye">CIA Tracks Public Information For The Private Eye</a> describes almost the mirror image of this: how intelligence agencies are building their infrastructure for trying to find patterns in and making sense of the gadzillions of bits of public information that just sits their for all to see. It's another case that hints at an impossibility theorem about "<a href="http://soc-of-info.blogspot.com/2010/01/those-damn-unconnected-dots-again-rough.html">connecting the dots</a>" <i>a priori</i>.<br />
<br />
And finally, in another NPR story, "<a href="http://www.npr.org/2012/01/22/145599139/technological-innovations-help-dictators-see-all">Technological Innovations Help Dictators See All</a>" Rachel Martin interviews <a href="http://www.brookings.edu/experts/villasenorj.aspx">John Villasenor</a> about his paper, "<a href="http://www.brookings.edu/papers/2011/1214_digital_storage_villasenor.aspx">Recording Everything: Digital Storage as an Enabler of Authoritarian Governments</a>" on the idea that data storage has become so inexpensive that there is no reason for governments (they focus on authoritarian ones, but no reason to limit it) not to collect everything (even if, as the first two stories remind us, they may currently lack the capacity to do anything with it). I if surveillance uptake and <a href="http://soc-of-info.blogspot.com/2010/02/technologically-induced-social.html">data rot</a> will prove to be competing tendencies.<br />
<br />
<br />
The first piece suggests research questions: what are the variables that determine whether disclosure is "useful"? what features of disclosure rules generate cynical work-arounds? if "<a href="http://soc-of-info.blogspot.com/2009/09/is-more-information-always-better-file.html">more is not always better</a>," what is? can we better theorize the relationship between "knowing," open-ness, transparency, disclosure and democracy than we have so far?<br />
<br />
The second piece really cries out for an essay capturing the irony of how the information pajamas get turned inside out with the spy agency trying to see what's in front of everyone (we are reminded in a perverse sort of way of Poe's "<a href="http://www.gutenberg.org/dirs/2/5/5/2/25525/25525-h/files/2148/2148-h/2148-h.htm#purloin">The Purloined Letter</a>"). Perhaps we'll no longer associate going "under cover" with the CIA.<br />
<br />
And the alarm suggested in the third piece is yet another entry under what I (and maybe others) have called the informational inversion -- when the generation, acquisition, and storage of information dominates by orders of magnitude our capacity to do anything with it.Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com2tag:blogger.com,1999:blog-37315114.post-72488553955053688152012-01-08T13:14:00.000-08:002012-01-08T13:14:08.396-08:00Journalism and Research AgainLots of Twitter and blog activity in response to <a href="http://www.nytimes.com/2012/01/06/education/big-study-links-good-teachers-to-lasting-gain.html">NYT article</a> about Chetty, Friedman, and Rockoff research paper on effects of teachers on students' lives. <br />
<br />
No small amount of the commentary is about how when journalists pick "interesting" bits out of research reports to construct a "story" they often create big distortions in the social knowledge-base. <br />
<br />
So what can reporters do when trying to explain the significance of new research, without getting trapped by a poorly-supported sound bite?<br />
<br />
Sherman Dorn has an excellent post on the case, "<a href="http://shermandorn.com/wordpress/?p=4393">When reporters use (s)extrapolation as sound bites</a>," that ends with some advice:<br />
<blockquote><br />
<ol><li><i>"If a claim could be removed from the paper without affecting the other parts, it is more likely to be a poorly-justified (s)implification/(s)extrapolation than something that connects tightly with the rest of the paper."</i></li>
<li><i>"If a claim is several orders of magnitude larger than the data used for the paper (e.g., taking data on a few schools or a district to make claims about state policy or lifetime income), don’t just reprint it. Give readers a way to understand the likelihood of that claim being unjustified (s)extrapolation."</i></li>
<li><i>"More generally, if a claim sounds like something from Freakonomics, hunt for a researcher who has a critical view before putting it in a story."</i></li>
</ol></blockquote><br />
See also <a href="http://shankerblog.org/?p=4708">Matthew Di Carlo on ShankerBlog</a>, <a href="http://schoolfinance101.wordpress.com/">Bruce Baker on SchoolFinance 101</a>, and <a href="http://cedarsdigest.wordpress.com/2012/01/07/economists-to-teachers-weve-dropped-the-deselection-and-moved-straight-to-fire-em/">Cedar Reiner on Cedar's Digest</a>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-8015444168172453192011-12-30T18:16:00.000-08:002011-12-30T18:16:18.534-08:00New Book on Data JournalismSimon Rogers has a new book called <i><a href="http://www.guardian.co.uk/news/datablog/2011/dec/27/facts-sacred-guardian-shorts-ebook">Facts are Sacred: The power of data</a></i> coming out as a part of the <a href="http://www.guardian.co.uk/info/series/guardian-shorts">Guardian Shorts</a> series with a Kindle Edition available now from <a href="http://www.amazon.co.uk/Facts-are-Sacred-Guardian-ebook/dp/B006PI9PQG">Amazon.UK</a> and in January from <a href="http://www.amazon.com/Facts-are-Sacred-Guardian-ebook/dp/B006PI9PQG">Amazon</a> in the US.<br />
<br />
<div style="text-align: left;">I was turned on to this project when I stumbled across <a href="http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riots">this excellent collaborative project visualizing the spread of rumor via Twitter</a> during last summer's London riots.</div><div style="text-align: center;"><br />
</div><div style="text-align: center;"><object data="http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/jingh264player.swf" height="204" id="scPlayer" type="application/x-shockwave-flash" width="284"><param name="movie" value="http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/jingh264player.swf" /><param name="quality" value="high" /><param name="play" value="true" /><param name="bgcolor" value="#eeeecc" /><param name="flashVars" value="thumb=http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/FirstFrame.jpg&containerwidth=284&containerheight=204&content=http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/2011-12-30_1802.mp4&blurover=false" /><param name="allowFullScreen" value="true" /><param name="loop" value="true" /><param name="scale" value="showall" /><param name="allowScriptAccess" value="always" /><param name="base" value="http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/" /><iframe type="text/html" frameborder="0" scrolling="no" style="overflow:hidden;" src="http://www.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/embed" height="204" width="284" ></iframe></object></div><div style="text-align: center;"><br />
</div><div style="text-align: left;">For the last hour or so I've been having that "I should have written this book" feeling -- not a pleasant feeling, but a recommendation to be sure. A nice feature of the book is that it blends boosterism and manifesto with how to and reportage on best practices. That brings it in as a book that won't be perfect for anyone, but has something for each of it's several potential audiences. </div>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-9157074757401165182011-12-13T22:24:00.000-08:002011-12-13T22:24:00.201-08:00Google Knol into the Dustbin of E-historyAfter 15 weeks of non-stop work, a moment for thinking about something other than classes and budgets came available today. Recently, while googling about, I became re-acquainted with the idea of a "knol" -- a unit of knowledge -- and the associated <a href="http://knol.google.com/">web service that Google</a> has run these last number of years. <b>And</b> the fact that it is going away. Or rather it is evolving: into something called <a href="http://annotum.org/">Annotum</a> which describes itself this way:<br />
<blockquote class="tr_bq">Develop a simple, robust, easy-to-use authoring system to create and edit scholarly articles<br />
Deliver an editorial review and publishing system that can be used to submit, review, and publish scholarly articles</blockquote>The google knol thing has been around since 2007. The <a href="http://googleblog.blogspot.com/2008/07/knol-is-open-to-everyone.html">initial beta announcement</a> described the thithis way<br />
<blockquote class="tr_bq">Knols are authoritative articles about specific topics, written by people who know about those subjects.</blockquote>I remember, now, encountering it back in the day -- I may even have written some knols -- but it didn't stay on the radar screen for long. It was portrayed at the time as an alternative to Wikipedia -- with it's distinguishing characteristic being "authorship" :<br />
<blockquote>The key principle behind Knol is authorship. Every knol will have an author (or group of authors) who put their name behind their content. It's their knol, their voice, their opinion. We expect that there will be multiple knols on the same subject, and we think that is good (<a href="http://googleblog.blogspot.com/2008/07/knol-is-open-to-everyone.html">googleblog</a>, 2008).</blockquote>The divergence between Wikipedia's modus operandi and that of Knol (now Annotum) provides a nice case study jumping off point for thinking aboutf how we are figuring out the relationship between crowd sourcing and authorship, peer production, open source, intellectual authority, and how platform as institution feeds into how we think about content legitimacy.<br />
<br />
Wikipedia harvests (harnesses, makes possible the emergence or realization) of a potentiality that, in a sense, has always been there, but represents a completely new mode of knowledge aggregation and access. A project like Knol or Annotatum, on the other hand, is about removing the friction from existing processes in a way that makes more of what's already done happen more easily.<br />
<br />
Both approaches thumb their nose at property-based organizational middle-men as the arbiter of intellectual legitimacy, but exploring the contrast between them is instructive.<br />
<br />
I am, of course, not the first to think about this. One <a href="http://knol.google.com/k/reginald-patterson/knol-versus-wikipedia/t7omkuodtii0/3#">knol author</a> suggested that the real point of contrast is "Wikipedia does not allow the visionary or individualistic type of knowledge to be developed, because Wikipedia does not allow original content." And if you google "knol vs. wikipedia" you'll find lots of others -- my initial, quick and dirty assessment is that most are boosters for one or the other approach but I'm guessing there will be some grist for the mill for the chapter in The Sociology of Information where I'll talk about the social organization of information aggregation. <br />
<br />
Bottom line: I'm back on the job.Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com1tag:blogger.com,1999:blog-37315114.post-82818312472356150482011-09-20T10:57:00.000-07:002011-09-20T10:57:29.886-07:00Gossip, CMC, and Tight Knit Communities<span class="Apple-style-span" style="background-color: white; font-family: Georgia, serif; font-size: 14px;"></span><br />
<div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; padding-bottom: 2px; text-transform: uppercase;">U.S.</div><div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; padding-bottom: 3px;"><a href="http://www.nytimes.com/2011/09/20/us/small-town-gossip-moves-to-the-web-anonymous-and-vicious.html">In Small Towns, Gossip Moves to the Web, and Turns Vicious</a></div><div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">By <a class="meta-per" href="http://topics.nytimes.com/top/reference/timestopics/people/s/a_g_sulzberger/index.html?inline=nyt-per" rel="author" style="color: #004276; text-decoration: none;" title="More Articles by A. G. Sulzberger">A. G. SULZBERGER</a></div><div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">Published: September 19, 2011</div><div class="story" id="summary" style="clear: left; color: #333333; font-size: 12px; line-height: 15px; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;">As more people share gossip over the Internet rather than over coffee and eggs, anonymous, and startlingly negative, posts have provoked fights, divorce and worse.</div>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-53594519239543656402011-09-11T13:06:00.000-07:002011-09-11T13:06:28.651-07:00Good eye/mind catches logical fallacy in WSJ Analysis<div>
Jean Whit notes that the authors of this piece about Wall Street Journal number crunching about sovereign debt default and bond ratings, <a href="http://www.programbusiness.com/News/WSJ-Analysis-Rating-Firms-Not-Effective-at-Predicting-Government-Defaults">WSJ Analysis: Rating Firms Not Effective at Predicting Government Defaults</a>, got their analysis backwards. A classic case of sampling on the dependent variable or percentaging in the wrong direction: how many of the defaults had a given rating rather than how many with a given rating end up defaulting. See Jean's comment at bottom of post.</div>
Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-53065134736027522852011-09-11T12:55:00.000-07:002011-09-11T12:55:39.547-07:00GPS, Orwell, and the 4th AmendmentThe 9/11 anniversary reminds us, among all the other things, of the questions of government surveillance that have arisen in the last decade, some related to terrorism, some reflecting challenges raised by new technologies, and many at the intersection of these.<br />
<br />
This fall, the US Supreme Court will consider whether law enforcement should be able to attach a GPS tracking device on a vehicle without a warrant. Adam Liptak reports on the issue in "<a href="http://www.nytimes.com/2011/09/11/us/11gps.html">Court Case Asks if ‘Big Brother’ Is Spelled GPS</a>" in today's New York Times. Lower courts have ruled in different directions on the question.<br />
<br />
One way to think about it is in terms of aggregating information and whether there's an emergent property that changes how we would classify obtaining, possessing, or using information.
Consider, for example, one's daily round. Leave the house at 7:30, stop for coffee, pick up the dry-cleaning, get stuck in traffic, arrive at work, park in the lot over behind the pine trees, etc. All of these are done in public with no expectation of privacy. And then it all happens again tomorrow, and tomorrow and tomorrow. Except the dry cleaning stop is only made on Mondays and every other Friday there's a stop at a bar on the edge of downtown. If there is a GPS attached to your car, the separate public facts of any given daily round -- the sequence and full set of which perhaps only you know -- are assembled as a unit of information. And, if the GPS is there for a month, both the overall, boring, day-in-day-out pattern and the regular exceptions and the truly unique exceptions are all a part of the information bundle available "out there."<br />
<br />
Even if all of the component information is about mundane, innocent, non-embarrassing activities, indeed has all the properties that would exclude it from your understanding of "private" information, does your willingness to do these things in public view aggregate to willingness for information about them to be aggregated into a tracking record?<br />
<br />
<b>See also</b><br />
<a href="http://caselaw.findlaw.com/us-7th-circuit/1046181.html">UNITED STATES v. GARCIA No. 06-2741</a>.<br />
New York Times. Articles on <a href="http://topics.nytimes.com/topics/reference/timestopics/subjects/s/surveillance_of_citizens_by_government/index.html">Surveillance of Citizens by Government</a><br />
New York Times. Articles on <a href="http://topics.nytimes.com/top/reference/timestopics/subjects/g/global_positioning_system/index.html">Global Positioning System</a>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-11574844018401649172011-09-10T11:27:00.000-07:002011-09-10T11:27:08.526-07:00From Musical Consonance to Styles of ThoughtAn article published in <i><a href="http://prl.aps.org/abstract/PRL/v107/i10/e108103">Physical Review Letters</a></i>, reported on in <i><a href="http://news.sciencemag.org/sciencenow/2011/09/how-the-ear-distinguishes-sweet-.html?ref=em&elq=41996ae9844041d79845fa5d75788668">Science News</a></i>, describes a mathematical model of how neurons can distinguish <a href="http://en.wikipedia.org/wiki/Consonance_and_dissonance">consonant</a> sounds (say, a C-major chord) from dissonant ones (say, D-E-F). A simple <a href="http://en.wikipedia.org/wiki/Neural_network">network </a>of <a href="http://en.wikipedia.org/wiki/Neuron">neurons</a>, behaving like neurons behave, produces qualitatively different outputs depending on the quantitative differences in the sound frequencies it receives as inputs.<br />
<br />
Very interesting as an example of an information processing system with emergent information processing capacities.<br />
<br />
I suspect something, at least metaphorically, similar might go on in the processing/experience of consonant ideas. At first I'm tempted to say "least that part of consonant or resonant ideas that we want to ascribe to consonance in the external world" but I think you could take it further and imagine the development of structures along similar lines for the detection of "constructed" consonance. Eventually, one could arrive at mechanisms for implementing "styles of thought" that would not be limited to algorithmic systems that "crank through a set of data" in the same way every time. Rather, we could talk about styles of thought in terms of the kinds of thoughts, tropes, logics, metaphors that would appeal as consonant with "everything else I believe." Or, the flip side of this would be to move toward mechanisms for <a href="http://en.wikipedia.org/wiki/Cognitive_dissonance">cognitive dissonance</a>.<br />
<br />
Just a highly speculative bit of musing, but clearly news of this research did strike a chord with some stuff I've been thinking about for a long time.Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-12768757563076966322011-09-04T14:44:00.000-07:002011-09-04T14:49:11.062-07:00Sociology of Information in the New York Times<span class="Apple-style-span" style="background-color: white; font-family: Georgia, serif; font-size: 14px;"></span><br />
<div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; padding-bottom: 2px; text-transform: uppercase;">
BUSINESS DAY</div>
<div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; padding-bottom: 3px;">
<a href="http://www.nytimes.com/2011/09/04/business/economy/on-wall-st-a-keynesian-beauty-contest.html">The Beauty Contest That’s Shaking Wall St.</a></div>
<div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">
By ROBERT J. SHILLER</div>
<div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">
Published: September 3, 2011</div>
<div class="story" id="summary" style="clear: left; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;">
<div style="color: #333333; line-height: 15px;">
Why all the sharp swings in the stock market? To Robert J. Shiller, it’s a case of investors trying to guess what other investors are thinking....</div>
<blockquote style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;">Seeking not what is the case, but what others probably think is, or even what others think that others think is...</span></blockquote>
<div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; padding-bottom: 2px; text-transform: uppercase;">
U.S.</div>
<div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; line-height: 15px; padding-bottom: 3px;">
<a href="http://www.nytimes.com/2011/09/03/us/politics/03perry.html">Perry’s Blunt Views in Books Get New Scrutiny as He Joins Race</a></div>
<div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;">
By <a class="meta-per" href="http://topics.nytimes.com/top/reference/timestopics/people/s/michael_d_shear/index.html?inline=nyt-per" rel="author" style="color: #004276; text-decoration: none;" title="More Articles by Michael D. Shear">MICHAEL D. SHEAR</a></div>
<div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;">
Published: September 2, 2011</div>
<div class="story" id="summary" style="clear: left; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;">
<div style="color: #333333; line-height: 15px;">
When Rick Perry, the governor of Texas and a presidential hopeful, debates his rivals, his assertions on climate change, Social Security and health care could put him to the test....</div>
<blockquote style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;">Once it's out there, it's out there...</span></blockquote>
<div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; padding-bottom: 2px; text-transform: uppercase;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">U.S.</span></div>
<div style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">
</span></div>
<div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; line-height: 15px; padding-bottom: 3px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"><a href="http://www.nytimes.com/2011/08/30/us/30wikileaks.html">WikiLeaks Leaves Names of Diplomatic Sources in Cables</a></span></div>
<div style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">
</span></div>
<div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">By <a class="meta-per" href="http://topics.nytimes.com/top/reference/timestopics/people/s/scott_shane/index.html?inline=nyt-per" rel="author" style="color: #004276; text-decoration: none;" title="More Articles by Scott Shane">SCOTT SHANE</a></span></div>
<div style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">
</span></div>
<div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">Published: August 29, 2011</span></div>
<div style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">
</span></div>
<div class="story" id="summary" style="clear: left; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;">
<div style="color: #333333; line-height: 15px;">
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">The antisecrecy organization WikiLeaks published nearly 134,000 diplomatic cables, including many that name confidential sources....</span></div>
<blockquote>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;">Developing story -- a leak, a revelation, or just a mistake? (See also <a href="http://soc-of-info.blogspot.com/search?q=wikileaks">previous posts on Wikileaks</a>.)</span></blockquote>
</div>
<span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">
</span><br />
<div style="color: #333333; line-height: 15px;">
</div>
</div>
</div>
Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-59927243763723716112011-09-04T12:25:00.000-07:002011-09-04T12:25:52.651-07:00Bloomberg Contra Notification NormsConsider a recent NYT <a href="http://www.nytimes.com/2011/09/05/nyregion/bloomberg-wont-apologize-for-concealing-arrest-of-deputy-mayor.html">article by Mosi Secret and Michael Barbaro</a> about the controversy over New York mayor Michael Bloomberg's failure to inform the public about the actual reason -- an arrest in Washington, D.C. for domestic violence* -- deputy mayor Stephen Goldsmith resigned this summer.<br />
<br />
According to the article, Bloomberg "rejected the notion that he had an obligation to tell the public of the arrest." He is quote saying, “I always assumed it would come out, but it’s not my responsibility.”<br />
<br />
It's a first rate example of <a href="http://djjr-courses.wikidot.com/local--files/djjr-cv:research/ryan-notification-norms.pdf">notification</a> in the public sphere and of how overlapping relational circles can suggest contradictory notification rules.<br />
<br />
It turns out that it's not just a notification issue, though. Initially the mayor said the resignation was to pursue other opportunities -- in other words, he was pretty explicitly misleading not just failing to reveal.<br />
<br />
But back to notification.
Bloomberg, apparently, takes the line is that his first obligation was instrumental, making sure "he no longer works for the city." And then his next obligation is to treat Goldsmith and his family with respect. His critics suggest that his first obligation is to the public, although the one quoted in the article, Scott M. Stringer, the Manhattan borough president, sticks with the instrumental saying Bloomberg has responsibility to "protect the public, not to protect a staff member” according to the article.
But nobody really seems to be saying that there was any instrumental damage done by the non-notification and it's a bit disingenuous to say that getting Goldsmith off the city payroll was facilitated by non-notification.<br />
<br />
The issue, then, is how the various relational imperatives governing who ought to tell whom what when and how interact. New York City law, as it happens, has something to say: "the city’s Department of Investigation must be notified" if an official is arrested in the city (not clear by whom), but this did not come into play here since arrest was in DC. The article reports a debate within the mayor's team about the matter with the mayor saying that Goldsmith should get to decide how much to reveal. And after the fact Goldsmith, who took some heat for not indicating in his resignation announcement what the reason was, has "admitted" that HE had a responsibility to be more forthcoming at the time, though he added that he thought that immediacy of his resignation "mooted the need for further explanation."<br />
<br />
So, does the mayor's official role and its informational obligations trump the social obligation to allow another "ownership" of his own announcement? Does the consequential outcome -- resignation -- obviate the obligation to notify (for the record, Goldsmith says he was wrong on that count). If there is public outrage based only/mainly on the relational expectation of "we should have been told," does it support sanctions? Does Bloomberg's citation of a norm that certain personal situations are one's own to disclose get him off the hook? Does affirmatively suggesting other reasons rather than simply failing to disclose the actual ones cross another line entirely?<br />
<br />
Bottom line: in many locations within the social, institutional, moral orders, the import of information behaviors goes far beyond the instrumental, consequential, substantive realm.<br />
<br />
* The case is not being pursued as Mr. Goldsmith's wife dropped the complaint.
Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-86465985744023947762011-08-13T12:47:00.000-07:002011-08-13T12:47:18.418-07:00Information Control and Politics: Not Just "Over There"<span class="Apple-style-span" style="color: #333333; font-family: arial, sans-serif; font-size: 16px;"></span><br />
<div class="storytitle" style="margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><h1 style="font-family: georgia, sans-serif; font-size: 1.4em; line-height: 1.2em; margin-bottom: 0.1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><a href="http://www.npr.org/2011/08/13/139594509/cell-reception-cut-in-san-francisco-to-hinder-protest">Cell Reception Cut In San Francisco To Hinder Protest</a></h1></div><span class="Apple-style-span" style="color: #333333; font-family: arial, sans-serif; font-size: 16px;"><div class="storytitle" style="margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div class="storylocation" id="storybyline"><div class="bucketwrap byline" id="res19761027"><div class="byline" style="color: black; font-size: 0.7em; line-height: 1.45em; margin-bottom: 0.6em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">by <span style="text-transform: uppercase;">THE ASSOCIATED PRESS</span></div></div></div></div><div class="storylocation" id="storytext" style="clear: both; height: 584px; margin-bottom: 18px; overflow-x: hidden; overflow-y: hidden;"><div class="dateblock" style="margin-bottom: 10px; overflow-x: hidden; overflow-y: hidden;"><span class="date" style="color: #999999; font-size: 0.85em; font-style: italic;">August 13, 2011</span></div><div style="font-size: 0.85em; line-height: 1.45em; margin-bottom: 1.25em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Transit officials blocked cellphone reception in San Francisco train stations for three hours to disrupt planned demonstrations over a police shooting.</div><div style="font-size: 0.85em; line-height: 1.45em; margin-bottom: 1.25em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Officials with the Bay Area Rapid Transit system, better known as BART, said Friday that they turned off electricity to cellular towers in four stations from 4 p.m. to 7 p.m. Thursday. The move was made after BART learned that protesters planned to use mobile devices to coordinate a demonstration on train platforms. ... <<a href="http://www.npr.org/2011/08/13/139594509/cell-reception-cut-in-san-francisco-to-hinder-protest">MORE</a>></div></div></span>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-55468421511159604832011-07-21T15:38:00.000-07:002011-07-21T15:38:39.815-07:00This is your Background Check on SteroidsAn article, "<a href="http://www.nytimes.com/2011/07/21/technology/social-media-history-becomes-a-new-job-hurdle.html">Social Media History Becomes a New Job Hurdle</a>," by <a href="http://topics.nytimes.com/top/reference/timestopics/people/p/jennifer_preston/index.html?inline=nyt-per">Jennifer Preston</a> in yesterday's NYT is obvious fodder for the sociology of information. It's primarily about <a href="http://www.socialintelligencehr.com/home" title="The company Web site. ">Social Intelligence</a>, a web start up that puts together dossiers about potential employees for its clients by "<a href="http://en.wikipedia.org/wiki/Web_scraping">scraping</a>" the internet.<br />
<br />
Issues that show up here:<br />
<ul><li>the federal government (<a href="http://www.ftc.gov/">FTC</a>) was looking into whether the company's practices might violate the <a href="http://en.wikipedia.org/wiki/Fair_Credit_Reporting_Act">fair credit reporting act</a> (<a href="http://www.ftc.gov/os/statutes/031224fcra.pdf">FCRA</a>), but <a href="http://www.ftc.gov/os/closings/110509socialintelligenceletter.pdf">determined it was in compliance</a></li>
<li>"privacy advocates" said to be concerned that it might encourage employers to consider information not relevant to job performance (why not fair employment advocates? -- later in the article we do find mention of <a href="http://www.eeoc.gov/">Equal Employment Opportunity Commission</a>)</li>
<li>what do we make of the statement: "Things that you can’t ask in an interview are the same things you can’t research"?</li>
<li>since this is really just an extension of the idea of the "background check" -- can we think a little more systematically about that as a general idea prior to getting mired in details of internet presence searches? </li>
</ul>Perhaps more alarming than the mere question of information surfacing was the suggestion by the company's founder, Max Drucker, about how a given bit of scraped information might be interpreted. To wit, he mentioned fact that a person had joined a particular <a href="https://www.facebook.com/pages/This-is-America-I-shouldnt-have-to-press-1-for-English/329270141732">Facebook group</a> might "mean you don’t like people who don’t speak English." According the reporter he posed this question rhetorically: "Does that mean...?" This little bit of indirect marketing via fear mongering adds another layer to what we need to look at: what sort of information processing (including interpretation and assessment) are necessary in a world where larger and larger amounts of information are available (cf. CIA problem of turning acquired information into intelligence via analysis).<br />
<br />
Drucker characterized the company's goal as "to conduct pre-employment screenings that would help companies meet their obligation to conduct fair and consistent hiring practices while protecting the privacy of job candidates." This raises another interesting question: if an agent has a mandated responsibility for some level of due diligence and information is, technically, available, will a company necessarily sprout up to collect and provide this information? Where would feasibility, cost, and the uncertainty of interpretation enter the equation? Can the employer, for example, err on the side of caution and exclude the individual who joined the Facebook group because that fact MIGHT mean something that the employer could be liable for not having discovered? Will another company emerge that helps to assess the likelihood of false positives or false negatives? What about if it is only a matter of what the company wants in terms of its corporate culture? Can we calculate the cost (perhaps in terms of loss of human capital, recruitment costs, etc.) of such technically assisted vigilance?Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0tag:blogger.com,1999:blog-37315114.post-81891674189957851822011-06-21T11:37:00.000-07:002011-06-21T11:37:16.738-07:00Anonymity and the Demise of the EphemeralThe New York Times email update had the right headline "<a href="http://www.nytimes.com/2011/06/21/us/21anonymity.html">Upending Anonymity, These Days the Web Unmasks Everyone</a>" but made a common mistake in the blurb: "Pervasive social media services, cheap cellphone cameras, free photo and video Web hosts have made privacy all but a thing of the past."<br />
<br />
It's going to be important in our policy conversations in coming months and years to get a handle on the difference between privacy and anonymity (and others such as confidentiality) and how we think about rights to, and expectations of, each. <br />
<br />
There's a long continuum of social information generation/acquisition/transmission along which these various phenomena can be located:<br />
<ul><li>artifactual "evidence" can suggest that someone did something (an outburst on a bus, a car broken into, a work of art created)</li>
<li>meta-evidence provides identity trace information about the person who did something (a fingerprint, a CCTV picture, DNA, an IP address, brush strokes)</li>
<li>trace evidence can be tied to an identity (fingerprints on file, for example)</li>
<li>data links can suggest other information about a person so identified</li>
</ul>Technology is making each of these easier, faster, cheaper and more plentiful. From the point of view of the question, whodunnit?, we seem to be getting collectively more intelligent: we can zero in on the authorship of action more than ever before. But that really hasn't much to do with "privacy," per se.<br />
<br />
As <a href="http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=152118">Dave Morgan</a> suggests <a href="http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=152118">in OnlineSpin</a> (his hook was <a href="http://www.google.com/search?q=facebook+facial+recognition">Facebook's facial recognition technology</a> that allows faces in new photos to be automatically tagged based on previously tagged photos a user has posted) the capacity to connect the dots is a bit like recognizing a famous person on the street, and this, he notes, has nothing to do with privacy.<br />
<br />
What it does point to is that an informational characteristic of public space is shifting. One piece of this is the loss of ephemerality, a sharp increase in the half-life of tangible traces. Another is, for want of a better term on this very hot morning in Palo Alto, "linkability"; once one piece of information is linked to another, it can easily be linked again. And this compounds the loss of ephemerality that arises from physical recording alone.<br />
<br />
From the point of view of the question asked above, the change can mean "no place to hide," but from the point of view of the answer, it might mean that the path to publicity is well-paved and short.<br />
<br />
Some celebrate on both counts as a sort of modernist "the truth will out" or post-modernist Warholesque triumph. But as pleased as we might be at the capacity of the net to ferret out the real story (the recent unmasking of "<a href="http://www.google.com/search?q=Gay+Girl+in+Damascus">Gay Girl in Damascus</a>" yet another example), the same structure can have the opposite effect. The web also has immense capacity for the proliferation and petrification of falsehood (see, for example, <a href="http://www.oup.com/us/catalog/general/subject/Sociology/PopularCulture/?view=usa&ci=9780199736317">Fine and Ellis 2010</a> or <a href="http://www.newyorker.com/arts/critics/books/2009/11/02/091102crbo_books_kolbert">Sunstein 2009</a>).<br />
<br />
Thus, it may well be that the jury is still out on the net effect on the information order.<br />
<br />
See also :<a href="http://soc-of-info.blogspot.com/2011/04/no-such-thing-as-evanescent-data.html">"No Such Thing as Evanescent Data"</a>Dan Ryanhttp://www.blogger.com/profile/12380226325325300201noreply@blogger.com0