Ad hoc text analytics

Twitter 2009

I found an old sentiment analysis application. It has very unglamorous packaging but a  good algorithm under the hood. I ran the Twitter user id’s of the brightest people I know. well, know of, who are active Twitter users. The assessment of “bright” was subjective by me.  All are acknowledged experts or advanced degree holders. Maybe half speak English as a second language, but are sufficiently articulate that their “essence”, well, intelligence shines through.

Guess what: It worked! I don’t know if anyone cares about this sort of thing, that really sharp successful people score well on this sentiment analysis indicator. That doesn’t necessarily mean it would have any predictive value. And no one seems to care much about this anyway. But what I’m saying is that most of these people only have okay-ish Klout scores e.g. 40’s. But they’re not trying to use Twitter for any particular social media purpose. Well, I don’t know that with certainty.

Published in: on February 13, 2012 at 6:00 pm  Comments (6)  
Tags: , ,

Twitter Influence System

Twitter flow chart

Twitter influence is subtle and difficult to capture

Twitter influence ranges beyond measuring followers, @ replies and re-tweets. It isn’t trivial to calculate the true reach of an individual’s Twitter updates. Such are the challenges encountered in quantifying influence (perhaps even value) of Twitter users’ activity.

Percentage of Tweets Read

Actual percentage of Twitter content read

This chart shows the percentage of tweets read in relation to the number of people followed. As could be expected, the more people you follow, the smaller the percentage of tweets you actually read.

Both images, Twitter Influence EcoSystem and Percentage of Tweets Read are original work by John V Lane, via Flickr, and reproduced here under Creative Commons License/by-sa/2.0.

Published in: on July 8, 2011 at 8:05 pm  Comments (4)  
Tags: , ,

CrunchGear and TechCrunch

I found a recent TechCrunch post about FaceBook and “domain squatting” amusing. Initially. Especially charming was this gem of an insert, which was NOT banner advertising, to buy the KillFacebook.com domain.

killbook ad

Facebook Tries To Squash 21 Squatted Domain Names

Facebook is trying to gain ownership over 21 domain names that include the term ‘facebook’, including FacebookSafety.com. The domain names are all currently owned by Domain Asset Holdings… when you visit those URLs, they are all listed for sale – some even feature the reserve prices (FacebookCheats.com is priced at $4,000).

When I scrolled to the end of the article to indicate my approval in the reader feedback section, I was reminded that TechCrunch only accepts comments using the FaceBook social plug-in. They recently switched from Disqus comment service. Then I felt irritated rather than amused.

The gadget-specific associated site CrunchGear has very sensibly returned to Disqus comments. Interesting that they broke ranks. By the way, the link to CrunchGear that I provided does not lead to a canned Wikipedia definition. It goes instead to a lightly amusing story about stress testing iPad glass. For your reading pleasure. I think CrunchGear is quite under-appreciated.

UPDATE: Disqus recently made it even easier to comment and give feedback by offering integration with Google accounts yesterday.

Published in: on March 25, 2011 at 12:18 am  Comments (2)  
Tags: , , ,

Vestiges of Dutch Colonialism in the New World

Saint Eustatius island

Saint Eustatius Harbor circa 1750

Despite my best efforts at over-dramatization, and some inclination toward satire, I could not bring myself to title this post without any regard for accuracy. I did spin some sensationalist gems that I can’t resist sharing. I discarded these candidate titles due to their obvious discrepancy with reality:

  • Kingdom of the Netherlands: Autonomy or subjugation for vassal states Bonaire, Saba and Saint Eustatius?
  • Landscape of imperialism in the twenty-first century: Historically significant changes in sovereignty in the Netherlands Antilles.

Or most misleading and untruthful of all:

  • Turmoil revisits Dutch West Indies half a millennium after rout of Spanish Armada!

Birth of Nations

In fact, the Netherlands Antilles ceased to exist as of October 2010. Curacao and Saint Maarten are now autonomous nations, governing themselves. The three islands Bonaire, Saba, and Saint Eustatius became municipalities in the Kingdom of the Netherlands. Residents now have the same benefits and rights as Dutch citizens.

While browsing the GeoNames site a few days ago, I first learned of the transformation of the Netherlands Antilles.  It motivated today’s post, whose primary topic is privacy considerations for social networking. Location sharing (and associated geodata) is part of the privacy issue.

I was evaluating an alternative micro-blogging platform, identi.ca. It is a status.net project. identi.ca is like that mainstay of micro-blogging, Twitter. The two platforms even have a certain measure of cross-compatibility. In terms of branding, good choices were made: identi.ca is a partner, or possibly a subsidiary, of laconi.ca. laconi.ca is the perfect name for a communication medium restricted to 140 characters or less!

identi.ca is conceptually similar to the highly anticipated Facebook alternative, Diaspora. Both Diaspora and identi.ca are open source projects. For the user, the relevant issue is that both assure a higher level of privacy. The design model for Facebook, and many other social networking applications, is that very little information will be retained on the client side. Most everything goes to a server-side repository. It is irrelevant whether user data resides in the cloud, or the Facebook data center. Neither is under the control of the user.

identi.ca and Diaspora are different in that they do not require users to relinquish all personal data. One way to do this is by running one’s social network on one’s own server, thus avoiding the concerns of information misappropriation, be it intentional or accidental. Running one’s own server does not sound very feasible for most people, and in fact, the shift to client side is probably more subtle e.g. greater reliance on the user’s browser.

Google Buzz provides an example of accidental over-sharing.  In the early days of Google Buzz, the full power of Open Social API was unleashed without forewarning users. This was accidental, and Google didn’t profit from the mishap. Google Buzz was irresponsible for not first offering opt-out to segregate some or all account contacts from participation.  The issue was promptly remedied. Unfortunately, despite the rapid redress and that there was no revenue stream associated with the disclosure of information (unlike the copious chronology charts of Facebook’s information peddling showcased in the Wall Street Journal), Google’s temporary disclosure of information about users to each other had a very negative impact on acceptance, usage and success of Google Buzz.

Identi.ca includes a location identification option using GeoNames data.  Tie-in to the Dutch West Indies follows:

New Countries

Flag of Curacao

Three new countries came into being after the dissolution of the Netherlands Antilles in October 2010… ISO assigned the code BQ to the three BES islandsRead More via GeoNames

Published in: on January 14, 2011 at 12:05 pm  Leave a Comment  
Tags: , , , , ,

URL Tall Tales

I really enjoyed Bit.ly versus Goo.gl, by Jonah Keegan. It was written in December 2009, about the impact of the new Google short URL service, goo.gl on link relationships throughout the internet.

Bit.ly and Goo.gl: A URL Shorter Story?

Jonah indicated that bit.ly, owned by BetaWorks, was the most commonly used URL short link service. He described how many users were baffled about how to use Goo.gl, myself included! Also, goo.gl was restricted to Google product pages only, and not for broader consumer use. See image* for details, and please click to view with better resolution.

Google shorter URLs

The demand for shortened URL’s has burgeoned. Bit.ly self-describes as The Bitlyverse! (more…)

Published in: on September 29, 2010 at 6:00 pm  Comments (4)  
Tags: , ,

Update: Type is Art to Take With You

Parts Of A Character product from Zazzle

Parts of A Character U.S. Postal Stamp

The Type Is Art interactive site, which I was introduced to by via ProArt on Twitter, has a store on Zazzle. There are some delightful and truly original products here, and they are actually made by Susanne Cernha of Silo Designs, who is associated with the Type Is Art project.

Unlike most of the promotional product pages that link to many blogs and fan websites, this one is not a tired old recycling of the same t-shirts, porcelain mugs and canvas bags with a logo stamped on the front that I see everywhere. Update 17 Aug 2010: There are plenty of t-shirts, porcelain mugs, canvas bags and baseball caps on Zazzle, I just hadn’t found them when I wrote this post. However, that doesn’t extend to the TypeIsArt site.

Parts of a Character is a bona fide U.S. Post Office stamp. Denominations are U.S. First Class (first and second ounce) and U.S. Priority Mail < 1.0lb.  Update 17 Aug 2010: I was incorrect about quantity purchase requirements. They are not huge, but pricing is in fact based on order quantity. Another plus: there are no huge bulk purchase requirements.

I found another data-related site at Zazzle, the pleasant ethnographers from Floating Sheep. I’ll take the liberty of cross-linking to Ellie Asks Why Annex on Blogger, and my post about geo-tagging and Microsoft’s Tag application. It offers a curious opportunity for creating linkages between the physical world and the interwebs.

Published in: on August 2, 2010 at 1:05 am  Comments (2)  
Tags: , ,

Social Collider One Year Later

The Social Collider arrived about a year ago. I haven’t heard any updates, particularly regarding the discovery of the Zeitgeist at work, see below.

Social Collider is a Google Chrome-backed experimental application. It’s functional design objective is to reveal cross-connections between conversations on the Twitter platform. The actual intent of the Social Collider experiment is quite a bit more interesting. As data is collected and accrues, the application’s designers hope to uncover multiple layers of person-place-location-event relationships which can be fully comprehended best only when viewed with the additional perspective of chronology.  

This is an excerpt from the site http://socialcollider.net:

One can search for usernames or topics, which are tracked through time and visualized much like the way a particle collider draws pictures of subatomic matter. Posts that didn’t resonate with anyone just connect to the next item in the stream. The ones that did, however, spin off and horizontally link to users or topics who relate to them, either directly or in terms of their content.

The Social Collider acts as a metaphorical instrument which can be used to make visible how memes get created and how they propagate. Ideally, it might catch the Zeitgeist at work.

Output is on display at a London museum, although primarily as a work of art. I was curious if I could find the Zeitgeist at work, so I tried entering a search query with the promising term “facebook”, selecting the past week for my time interval. Probably unwise for an online application: Windows 7 abended and I was forced to reboot my PC.  

I'm waiting for the results of the collision. And where's the Zeitgeist?

Published in: on May 4, 2010 at 12:30 am  Leave a Comment  
Tags: , , ,

Social Web Pathology Part 1

Share and Share A-like

Note: this is an updated version of my April 28th post on the theme of Social Web Pathology.

I’ve been pondering the theme of “Social Web 2.0 Pathology: Are We Connected Yet?”, and will introduce it with this mild example. Today’s post will then assess recent developments in our vanishing degrees of separation.

The date of this graphic was April 16, 2010 thus it does not contain the very consequence-laden “Like” button. Facebook announced the release of the Like button to the World Wide Web domains-at-large at the F8 conference on April 22.

There is a recent development, and it should encourage advocates of the individual’s right to privacy. U.S. Congressman Charles Schumer has an awareness of the potential for abuse via social networking, due to accelerated data sharing.  He seems to have focused his concerns around the announcement at F8 of Facebook’s Open Graph and Like button data collector. Media coverage by wire services such as Reuters – Schumer vs Facebook was prompt: Congressman Schumer explicitly stated his concern over negative impact on the consumer’s right to privacy. Shortly after, Schumer was joined by other lawmakers, who proposed a sweeping internet privacy bill on May 4, 2010, indicating grave concern over the potential risks due to information disclosure resulting from participation in social networks. Not surprisingly, Facebook was mentioned by name, as it has been on the leading edge of the social media innovation.

What abuses might result from the Like button, and by whom? The abusers could be hackers aka crackers. Their method of infiltration might include harvesting of newly accessible personal data (mostly due to recent trends in over-sharing) using social engineering techniques. Alternatively, the traditional exploits involving unauthorized elevation of privilege would remain viable. Such is now facilitated by easier password breaking due to a larger pool of availale data. This becomes more straightforward as we tie ourselves closer and tighter together, along with our most critical identifying information via Social Networking sites and applications.

The other source of abuse might be from Facebook itself, due to sharing of user’s personal information with third-parties. FB announced policy that users will no longer have an opt-out feature available, regarding disclosure of certain basic identifying data.

Maybe the need to prove to one and all that “I have the most friends”, a sort of Web 2.0 version of Thorstein Veblen’s concept of “status seeking” and “conspicuous consumption”, will be reined in (see Professor Veblen’s Theory of the Leisure Class, 1899). While the impulse is present in most of us, many resist the temptation. FB was well-designed, though, because it seems to have overwhelmed common sense for even the most reticent of us. Similar observations could be applied to the rise of Farmville. With 86 million players, this game that seems primarily motivated by guilt (Professor Howard Linn wrote a paper on the subject shortly before his death earlier this year) has spread like wildfire. We will hope that Congressional scrutiny will slow the onslaught of the Like button, and hold it in check until the consequences are more carefully considered. 

Published in: on April 28, 2010 at 8:02 am  Leave a Comment  
Tags: , , ,

We Revoke Our Right to Privacy with Assist From Facebook

At the annual Facebook F8 event yesterday, Facebook announced several powerful applications to expand the reach of the Web 2.0’s social networking model. New product announcements included Open Graph application software and inclusion of location-based services for greater social web inter-connectivity. The debut of the highly anticipated “Like” button on sites external to Facebook was also disclosed. In fact, Facebook stated that it already has established partnerships with approximately 30 highly visible websites including Yelp and Microsoft. Senior Facebook developers successfully demonstrated some of the potential uses to marketing and business users as well as individuals.

In light of this event, I’d like to share some of my concerns regarding the effect of increased information disclosure on us. The legal and contextual basis for my concern is drawn from a prescient feature article via BBC News. The following excerpt regarding erosion of privacy due to online activity is solid background material. It is followed by my own comments, as motivated by yesterday’s F8 activities.

How Online Life Distorts Privacy Rights for All by Zoe Kleinman, BBC News, 8 Jan 2010

People who post intimate details about their lives on the internet undermine everybody else’s right to privacy, claims an academic. Dr Kieron O’Hara [a senior research fellow in Electronics and Computer Science at the University of Southampton] has called for people to be more aware of the impact on society of what they publish online. “If you look at privacy in law, one important concept is a reasonable expectation of privacy,” he said. “As more private lives are exported online, reasonable expectations are diminishing.”

The rise of social networking has blurred the boundaries of what can be considered private, he believes – making it less of a defense by law. We live in an era that he terms “intimacy 2.0″ – where people routinely share extremely personal information online. “When our reasonable expectations diminish, as they have, by necessity our legal protection diminishes.”

This is the article’s most critical point: “People who post intimate details about their lives on the internet undermine everybody else’s right to privacy… When our expectations diminish, by necessity our legal protection diminishes…”

The negative effects associated with such a loss of privacy are significant. Contemplate an analogy, between the social web’s escalating trend toward over-sharing and the risk scenario implicit in the herd immunity effect of inoculation to prevent infectious disease.

Start by considering our rapidly growing social web. Achieving today’s level of coverage and confidence in the security of our private information was not achieved easily nor quickly. Certain rights, such as protected health information laws under HIPAA, were only legislated during the past five or ten years. However, in this sudden outpouring of social web-motivated information disclosure, we might destroy all that our predecessors, and ourselves, have fought to achieve over a span of decades or centuries.

Now consider immunization against contagious disease. Note that metaphorical comparison to disease is not overstatement: In a worst case scenario, the threat to personal privacy or infrastructure security due to unprecedented levels of network connectivity is dire. We’ll use the non-controversial example of polio, for which immunity is achieved at the community level. Decades of time and effort were required to wipe out incidence of this disease. However, by choosing not to protect oneself (or one’s children), the entire community is made more vulnerable, not just those who choose not to immunize. The immuno status of the “herd” can be compromised by a small number of now unprotected individuals.

The phrase “going viral” with the spread of social web information is in fact just as sinister as the original epidemiological context from which it was derived.

That is why nearly everyone who works in information security—be it computers, telephony, healthcare, or in financial or IT audit— seems leery of Facebook services. Every time I scan news feeds from InfoSec Island, Wired.com, or DEFCON, I notice references to the latest Facebook scam, exploit, user vulnerability etc. The data security and information technology community appear to be of one mind about Facebook: no system safeguards, no matter how stringent, can protect users who choosing to divulge information by over sharing.

I conclude with a link to visual editor and journalist Robb Montgomery’s advice about how to guard your privacy and enjoy your time more securely on Facebook.

Published in: on April 23, 2010 at 11:09 pm  Leave a Comment  
Tags: ,

Trial By Fire and Volcano for Social Media LBS

The Eyjafjallajokul Volcano in Iceland erupted on April 17, 2010. Social media gave valuable assistance and emotional support to those effected, described by Identity Specialist’s Social Media and Volcanos. This is probably the best justification for incorporating location-based services (LBS) into social media applications I’ve seen to-date.

Horses Led to Cover after Iceland’s Eyjafjallajokull Volcanic Eruption

Civil defense and emergency response is completely beyond the scope of location-based cell apps FourSquare, NearbyTweet, and GPS-driven Gowalla, yet they are a nice recourse in a situation like this! The civil authorities can do their job, while individuals help each other too.

Ash Cover After Eruption

 

 

I still have major concerns about privacy and personal safety with potential exposure due to LBS usage for social media when there is NOT a crisis or natural disaster in progress….

Published in: on April 23, 2010 at 4:42 am  Leave a Comment  
Tags: ,