Social Media, Permission Boundaries and User Adoption:How to Choose Social Media Features for Your Company or Software(Will people use it or not –Facebook or MySpace)
An evolving framework for making choices on social networking features that people will use
Who Am I ?Product Manager and Lead Spokesperson for Vertabase Project Management Software.Former Wall Street Analyst.Economist by training (London School of Economics and University of Michigan).http://www.vertabase.com/blog/16/
SoFacebook beat MySpace
MySpace beat GeoCities and AOL
Google beat Yahoo
Twitter is in a totally different league and is kicking butt
You Tube is in a totally different league and is kicking butt (though MySpace still has a place)
LinkedIn lives in its own successful little world
Skype is an entire Universe
AIM is trying to survive (while MSN has a much bigger and wealthier parent to take care of it)
FourSquare is the latest flavor of the day
Wikis still abound
Message boards are still very active
And Blogs Abound –and are beating Newspapers. ANDCell phone use has exploded.A gazillion texts are sent everydayYou can vote for an Idol with your phoneAnd the American Red Cross raised over $10 million for Haiti from text messages in a week.
MeanwhileSomeone in your company sees all this happening and says “we need that” and now you’ve got to build it or buy it.
This talk explores what you should actually build or buy
And why.
What will work.
There are many companies that will sell your organization social media in a box. And a lot of organizations are buying. But then it falls flat on its face and nothing happens with it. Never gets touched.Even Giants Can Have Trouble Getting User TransactionGoogle apps, totally free, totally social and totally collaborative is still fighting with Open Office and every other player you could think of for the roughly 2% of the market share in the office productivity space that Microsoft doesn’t own (apart from the approximately 5% Adobe has with Creative Suite).
Don't focus on technology.Focus on people's behavior.Up to know, this has meant studying the type of relationship someone has with someone else.
Don't focus on the advertiser. Almost all of the research and studies have been from the perspective of the advertiser or the ad platform.Is it any wonder it has been framed as “how can we understand the consumer so we can better connect with them.”
I propose a new framework for determining what to build or buy.
SpecificallyThis talk explores the factors that influence user adoption of social media in a system.It talks about the current research on social media and proposes a framework for helping make choices on what social media aspects to include in your system.
Where Current Research Falls ShortDescribing and defining the types of relationships between people is interesting.
BUT
It does not help you select the right tools or features for a piece of software (or really, any system).
This kind of analysis hasn’t been a predictor or indicator of what will or will not work.
Knowing that most people have 150 weak ties doesn’t help you pick features. It doesn’t determine whether you’ll be Facebook or MySpace.What Does Helpis knowing the type of social transaction.If you know what type of social “business” the person wants to do,or the type of social “business” you want them to do,You can build a feature and design a system that is the cheapest, easiest and fastest way for them to do it.In terms of building tools and making decisions, now we’re talking.
As You All Well KnowIn terms of adoption, one good tool that makes an incremental difference (one key feature) is worth more than a whole huge toolbox that never gets touched.
Pick the feature/the tool that works and has the biggest impact.
btw, you can't force people to use a tool just because it makes sense to you or management. People will make their own adoption decisions.Like adoption, in general, it is dependent on the cost / benefit of using the technology.
In the case of social media this translates into “is it easier for the user to conduct the key parts of their relationship with another person or group of people using the tool.”In other words:Is it easier or harder for them to make the social transaction.
If it is easier, cheaper and faster, they will use it.
If not, not.Not even if you try to “make” them.
How Do We Define Cost?Cost, in social networking, is not clearly defined yet.
We are only now learning about the implications of connecting ourselves and information to others and to other information online.
This was one of the first problems formal economics tackled “how do we define or measure cost” so we are starting from the right point.Introducing…Permission BoundariesPermission Boundaries is a bucket I’ve created for capturing these costs.
It’s a general category that encompasses a lot but is still valuable for helping define and select the cost side of the adoption equation.
Note: The social transaction, will identify the “goal” or desired outcome of the transaction i.e. the benefit side of the equation.Permission BoundariesA concept to capture the “cost” to a user of using or not using a social networking system.
It is the cost/benefit boundary against which the use/don’t use decision is made for a social media component of a system.
It incorporates the type of relationship, specifics about that relationship, privacy, boundaries and the cost of managing those aspects online.Why Online Is Different Than RLWhy its so hard to define online.
Context and Control
There are tons of physical and temporal cues
And physical and temporal separations
That provide context to your behavior
Information is not as fluid in RL.  There is no “hot” information (like hot money)
We are already good at controlling and managing our personas and actions in RL.
This is something we develop over time and can continue to refine (part of human development).What you'd share or ask recommendation on or from on  person or situation vs. another.
All of these aspects are managed in physical world, we know how to so  this. But online just starting and the cost of managing can be high and inconvenient and consequences big.
The environment itself is just being built and so is our understanding of it.(things to keep in mind)Online, the systems themselves are owned privately and are  commercial endeavors with point to make money, to capitalize on the  info in the system ad your use of it. There is always an underlining  transaction, an economic transaction, in the system. Companies are not in it for the love.Email and the web are still the least commercial of VL systems. Also email is  a good parallel to a social system you'd build internally since the email itself is owned by the company or organization. (Just like the social media features would be in your proprietary system.)Also, on email you decide who it goes to. You add the address or reply to the email (which gives it instant context).
These are all encompassed in Permission BoundariesEach person has their own permission boundaries around their social transactions.
We don’t have to worry about these in real world since there is a perception that information is far easier to control, different groups don’t cross as easily, information is less fluid in RL and there are many visual, spatial and temporal cues we have to be able to define and control our permission boundaries.
However, even in RL this can cross –the dis at the end of the movie 8 Mile.Who do you give permission to share what with and who do you want to share with you.
Permission BoundariesYou’ll know it when you see it.As we talk about relationships, we’ll come to a more solid definition.
This is very complicated & very broad. Since there a ton of discrete interactions that take place between people.
There are a ton of different social transactions that happen.
Instead of trying to come up with a single unified theory of all human behavior that translates seamlessly to an evolving online environment.
Let’s focus on the single discrete transactions and build up from there.Permission BoundariesRelationships are a part of this.Type of Transaction.
To start, though, let’s look at the current research on relationships.
Types of RelationshipsThis is where a huge amount of research has been done on social networking and social media.Strong Ties, Weak Ties and Temporary Ties.
Relationship TypesA UX researcher from Google, Paul Adams, recently presented a great summary of the state of research on relationships, in the context of social networks.
He pulled from published information and internally research from Google.
We’ll start by summarizing the findings.
http://www.slideshare.net/padday/the-real-life-social-network-v2Friends Doesn’t Say Much"friends" is an unhelpful word.
They looked at 342 different groups (that people identified when they mapped out their social networks)
only 12% of the contained the word "friend" in it.
only 3% were called simply "friends"
85% of the groups did not contain the word “friends”
61% of the group names were unique.That is:There is no meaningful taxonomy you can build into your software that will encapsulate the relationships and therefore permissions a person has with other people.It can’t be done.Human Relations Are Too Complex and Nuanced.[Single solutions for online identity management will likely not work. Focus on role based interactions where the role is determined by their part in the social transaction]
Let’s Look at the Bonds Connecting People Then
Strong TiesDefined.A study of 3,000 randomly chosen Americans showed that the average American has just four strong ties. Most had between two and six.
Another study of 1,178 adults found that on average, people had about 10 friends they meet or speak with at least weekly.
In another study, researchers analyzed all the photographs posted on Facebook pages in one college. When they looked at how many friends people had (based on who was in their photos), the average was 6.6
The average number of friends on Facebook is 130, and many users have many more. Yet despite having hundreds of friends, most people on Facebook only interact regularly with 4 to 6 people.
As We SeeMany research studies have shown that the vast majority of usage on social networks is with small numbers of strong ties. So What?Doesn’t Help With Tool SelectionDoesn’t have any predictive value.

More Related Content

PPT
Web Politics 2.0
PPTX
Social Media: an Obligation, an Opportunity, or a Threat
PPT
Digital Tattoo Workshop for VPL
PDF
IRJET- Application of Case based Algorithm in Design and Development of a...
PDF
Opportunities and dilemmas of social media - Sunderlandfinalmh
PPT
Digital Tattoo for Student Teachers 2012
PDF
PDFPortfolioAmyHendrickson
PPTX
Social Computing – The Promise And The Perils Final
Web Politics 2.0
Social Media: an Obligation, an Opportunity, or a Threat
Digital Tattoo Workshop for VPL
IRJET- Application of Case based Algorithm in Design and Development of a...
Opportunities and dilemmas of social media - Sunderlandfinalmh
Digital Tattoo for Student Teachers 2012
PDFPortfolioAmyHendrickson
Social Computing – The Promise And The Perils Final

What's hot (20)

PPTX
Digital Tattoo for Teacher Candidates at UBC
PPT
Social Information Architecture Workshop
PDF
Digital Revolution Alert
PPTX
20 Signs You're Probably Not Working For a Social Business
PPTX
Build Your Brand: Make A Name For Yourself Through Effective Communication
PPTX
Designing for Privacy NY Studio—10/04/21
PPT
Social Processes Part 2 - show me the money
PPT
Social Computing: From Social Informatics to Social Intelligence
PDF
Social network websites: best practices from leading services
PPTX
Social media mktg practice v8
PPT
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
PDF
Razorfish Digital Brand Experience
PPT
Study of eZ Publish Community
PPTX
Hyper-Social Organization Canada Book Tour
PDF
Social computing and knowledge creation
PPT
Minnesota Planned Giving Council
PPT
CM258 - Class 4 net neutrality
PPT
CoCollage UW iSchool 20090515
PPT
Situated Community Technology C&T 2009
PDF
KontikiMillennialGuide3
Digital Tattoo for Teacher Candidates at UBC
Social Information Architecture Workshop
Digital Revolution Alert
20 Signs You're Probably Not Working For a Social Business
Build Your Brand: Make A Name For Yourself Through Effective Communication
Designing for Privacy NY Studio—10/04/21
Social Processes Part 2 - show me the money
Social Computing: From Social Informatics to Social Intelligence
Social network websites: best practices from leading services
Social media mktg practice v8
Proactive Displays: Bridging the Gaps between Online Social Networks and Shar...
Razorfish Digital Brand Experience
Study of eZ Publish Community
Hyper-Social Organization Canada Book Tour
Social computing and knowledge creation
Minnesota Planned Giving Council
CM258 - Class 4 net neutrality
CoCollage UW iSchool 20090515
Situated Community Technology C&T 2009
KontikiMillennialGuide3

Similar to Social Networking, Permission Boundaries and User Adoption (20)

PDF
5 Requirementsfor Enterpris Social Software
PPTX
Social media naiop - new version
PDF
5 Requirementsfor Enterpris Social Software
PDF
5 Requirements for Enterpris Social Software
PPTX
11 Social Media Trends
PDF
3 Myths of Social Work
PPT
Change Management - History and Future
PDF
CoopGrocer185_fearing
PDF
Social Media Primer For Large Corporations
PDF
Measuring Enterprise Social & O365 - DSMLF Article
PPTX
Accelerating your corporate reputation with social media: transform your busi...
PPT
Social Media Lure And Limits
PDF
IT Spring - So this application is your friend? - Whitepaper
DOCX
Running head RESPONSE .docx
PPT
Work 2.0 Tech Best Practices Aenc
PPT
Web analytics for Marketing & Communications - Best Practice Methodologies fo...
PPT
Justice institute v1 short 2
PPT
Justice Institute V1 Short 2
PDF
Free Printable Writing Paper With Borders
DOCX
Organizations and individuals must be aware of the vulnerabilities o.docx
5 Requirementsfor Enterpris Social Software
Social media naiop - new version
5 Requirementsfor Enterpris Social Software
5 Requirements for Enterpris Social Software
11 Social Media Trends
3 Myths of Social Work
Change Management - History and Future
CoopGrocer185_fearing
Social Media Primer For Large Corporations
Measuring Enterprise Social & O365 - DSMLF Article
Accelerating your corporate reputation with social media: transform your busi...
Social Media Lure And Limits
IT Spring - So this application is your friend? - Whitepaper
Running head RESPONSE .docx
Work 2.0 Tech Best Practices Aenc
Web analytics for Marketing & Communications - Best Practice Methodologies fo...
Justice institute v1 short 2
Justice Institute V1 Short 2
Free Printable Writing Paper With Borders
Organizations and individuals must be aware of the vulnerabilities o.docx

Recently uploaded (20)

PPTX
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Decision Optimization - From Theory to Practice
PDF
Identification of potential depression in social media posts
PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PPTX
How to Convert Tickets Into Sales Opportunity in Odoo 18
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PPTX
How to use fields_get method in Odoo 18
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
Connector Corner: Transform Unstructured Documents with Agentic Automation
Examining Bias in AI Generated News Content.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Decision Optimization - From Theory to Practice
Identification of potential depression in social media posts
Streamline Vulnerability Management From Minimal Images to SBOMs
Lung cancer patients survival prediction using outlier detection and optimize...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Rapid Prototyping: A lecture on prototyping techniques for interface design
Report in SIP_Distance_Learning_Technology_Impact.pptx
How to Convert Tickets Into Sales Opportunity in Odoo 18
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Build automations faster and more reliably with UiPath ScreenPlay
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
How to use fields_get method in Odoo 18
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Presentation - Principles of Instructional Design.pptx

Social Networking, Permission Boundaries and User Adoption

  • 1. Social Media, Permission Boundaries and User Adoption:How to Choose Social Media Features for Your Company or Software(Will people use it or not –Facebook or MySpace)
  • 2. An evolving framework for making choices on social networking features that people will use
  • 3. Who Am I ?Product Manager and Lead Spokesperson for Vertabase Project Management Software.Former Wall Street Analyst.Economist by training (London School of Economics and University of Michigan).http://www.vertabase.com/blog/16/
  • 7. Twitter is in a totally different league and is kicking butt
  • 8. You Tube is in a totally different league and is kicking butt (though MySpace still has a place)
  • 9. LinkedIn lives in its own successful little world
  • 10. Skype is an entire Universe
  • 11. AIM is trying to survive (while MSN has a much bigger and wealthier parent to take care of it)
  • 12. FourSquare is the latest flavor of the day
  • 14. Message boards are still very active
  • 15. And Blogs Abound –and are beating Newspapers. ANDCell phone use has exploded.A gazillion texts are sent everydayYou can vote for an Idol with your phoneAnd the American Red Cross raised over $10 million for Haiti from text messages in a week.
  • 16. MeanwhileSomeone in your company sees all this happening and says “we need that” and now you’ve got to build it or buy it.
  • 17. This talk explores what you should actually build or buy
  • 20. There are many companies that will sell your organization social media in a box. And a lot of organizations are buying. But then it falls flat on its face and nothing happens with it. Never gets touched.Even Giants Can Have Trouble Getting User TransactionGoogle apps, totally free, totally social and totally collaborative is still fighting with Open Office and every other player you could think of for the roughly 2% of the market share in the office productivity space that Microsoft doesn’t own (apart from the approximately 5% Adobe has with Creative Suite).
  • 21. Don't focus on technology.Focus on people's behavior.Up to know, this has meant studying the type of relationship someone has with someone else.
  • 22. Don't focus on the advertiser. Almost all of the research and studies have been from the perspective of the advertiser or the ad platform.Is it any wonder it has been framed as “how can we understand the consumer so we can better connect with them.”
  • 23. I propose a new framework for determining what to build or buy.
  • 24. SpecificallyThis talk explores the factors that influence user adoption of social media in a system.It talks about the current research on social media and proposes a framework for helping make choices on what social media aspects to include in your system.
  • 25. Where Current Research Falls ShortDescribing and defining the types of relationships between people is interesting.
  • 26. BUT
  • 27. It does not help you select the right tools or features for a piece of software (or really, any system).
  • 28. This kind of analysis hasn’t been a predictor or indicator of what will or will not work.
  • 29. Knowing that most people have 150 weak ties doesn’t help you pick features. It doesn’t determine whether you’ll be Facebook or MySpace.What Does Helpis knowing the type of social transaction.If you know what type of social “business” the person wants to do,or the type of social “business” you want them to do,You can build a feature and design a system that is the cheapest, easiest and fastest way for them to do it.In terms of building tools and making decisions, now we’re talking.
  • 30. As You All Well KnowIn terms of adoption, one good tool that makes an incremental difference (one key feature) is worth more than a whole huge toolbox that never gets touched.
  • 31. Pick the feature/the tool that works and has the biggest impact.
  • 32. btw, you can't force people to use a tool just because it makes sense to you or management. People will make their own adoption decisions.Like adoption, in general, it is dependent on the cost / benefit of using the technology.
  • 33. In the case of social media this translates into “is it easier for the user to conduct the key parts of their relationship with another person or group of people using the tool.”In other words:Is it easier or harder for them to make the social transaction.
  • 34. If it is easier, cheaper and faster, they will use it.
  • 35. If not, not.Not even if you try to “make” them.
  • 36. How Do We Define Cost?Cost, in social networking, is not clearly defined yet.
  • 37. We are only now learning about the implications of connecting ourselves and information to others and to other information online.
  • 38. This was one of the first problems formal economics tackled “how do we define or measure cost” so we are starting from the right point.Introducing…Permission BoundariesPermission Boundaries is a bucket I’ve created for capturing these costs.
  • 39. It’s a general category that encompasses a lot but is still valuable for helping define and select the cost side of the adoption equation.
  • 40. Note: The social transaction, will identify the “goal” or desired outcome of the transaction i.e. the benefit side of the equation.Permission BoundariesA concept to capture the “cost” to a user of using or not using a social networking system.
  • 41. It is the cost/benefit boundary against which the use/don’t use decision is made for a social media component of a system.
  • 42. It incorporates the type of relationship, specifics about that relationship, privacy, boundaries and the cost of managing those aspects online.Why Online Is Different Than RLWhy its so hard to define online.
  • 44. There are tons of physical and temporal cues
  • 45. And physical and temporal separations
  • 46. That provide context to your behavior
  • 47. Information is not as fluid in RL. There is no “hot” information (like hot money)
  • 48. We are already good at controlling and managing our personas and actions in RL.
  • 49. This is something we develop over time and can continue to refine (part of human development).What you'd share or ask recommendation on or from on  person or situation vs. another.
  • 50. All of these aspects are managed in physical world, we know how to so  this. But online just starting and the cost of managing can be high and inconvenient and consequences big.
  • 51. The environment itself is just being built and so is our understanding of it.(things to keep in mind)Online, the systems themselves are owned privately and are  commercial endeavors with point to make money, to capitalize on the  info in the system ad your use of it. There is always an underlining  transaction, an economic transaction, in the system. Companies are not in it for the love.Email and the web are still the least commercial of VL systems. Also email is  a good parallel to a social system you'd build internally since the email itself is owned by the company or organization. (Just like the social media features would be in your proprietary system.)Also, on email you decide who it goes to. You add the address or reply to the email (which gives it instant context).
  • 52. These are all encompassed in Permission BoundariesEach person has their own permission boundaries around their social transactions.
  • 53. We don’t have to worry about these in real world since there is a perception that information is far easier to control, different groups don’t cross as easily, information is less fluid in RL and there are many visual, spatial and temporal cues we have to be able to define and control our permission boundaries.
  • 54. However, even in RL this can cross –the dis at the end of the movie 8 Mile.Who do you give permission to share what with and who do you want to share with you.
  • 55. Permission BoundariesYou’ll know it when you see it.As we talk about relationships, we’ll come to a more solid definition.
  • 56. This is very complicated & very broad. Since there a ton of discrete interactions that take place between people.
  • 57. There are a ton of different social transactions that happen.
  • 58. Instead of trying to come up with a single unified theory of all human behavior that translates seamlessly to an evolving online environment.
  • 59. Let’s focus on the single discrete transactions and build up from there.Permission BoundariesRelationships are a part of this.Type of Transaction.
  • 60. To start, though, let’s look at the current research on relationships.
  • 61. Types of RelationshipsThis is where a huge amount of research has been done on social networking and social media.Strong Ties, Weak Ties and Temporary Ties.
  • 62. Relationship TypesA UX researcher from Google, Paul Adams, recently presented a great summary of the state of research on relationships, in the context of social networks.
  • 63. He pulled from published information and internally research from Google.
  • 64. We’ll start by summarizing the findings.
  • 66. They looked at 342 different groups (that people identified when they mapped out their social networks)
  • 67. only 12% of the contained the word "friend" in it.
  • 68. only 3% were called simply "friends"
  • 69. 85% of the groups did not contain the word “friends”
  • 70. 61% of the group names were unique.That is:There is no meaningful taxonomy you can build into your software that will encapsulate the relationships and therefore permissions a person has with other people.It can’t be done.Human Relations Are Too Complex and Nuanced.[Single solutions for online identity management will likely not work. Focus on role based interactions where the role is determined by their part in the social transaction]
  • 71. Let’s Look at the Bonds Connecting People Then
  • 72. Strong TiesDefined.A study of 3,000 randomly chosen Americans showed that the average American has just four strong ties. Most had between two and six.
  • 73. Another study of 1,178 adults found that on average, people had about 10 friends they meet or speak with at least weekly.
  • 74. In another study, researchers analyzed all the photographs posted on Facebook pages in one college. When they looked at how many friends people had (based on who was in their photos), the average was 6.6
  • 75. The average number of friends on Facebook is 130, and many users have many more. Yet despite having hundreds of friends, most people on Facebook only interact regularly with 4 to 6 people.
  • 76. As We SeeMany research studies have shown that the vast majority of usage on social networks is with small numbers of strong ties. So What?Doesn’t Help With Tool SelectionDoesn’t have any predictive value.
  • 77. Nonetheless, Some Interesting FactsStrong ties dominate phone usage.
  • 78. 80% of phone calls are made to the same 4 people.
  • 79. The phone was a facilitator –cheaper and easier to conduct the social transaction.
  • 80. A study in the 1970s showed that the majority of phone calls were to people who live within five miles of the caller's home. Social tools help use strengthen the ties we already have.And in the Social Media World?80% of Skype calls are made to the same 2 people.That’s cool to realize.
  • 81. Technology Enables But Doesn’t Build TiesStudies in online gaming show that gamers are most often playing with strong ties who they already know.
  • 82. Maybe Strong Ties, Does Tell Us SomethingStrong ties often wield the most influence over people's decisions. For example, they are often the biggest factor in purchase decisions.
  • 83. Or NotBut not all strong ties have same effect.I wouldn’t ask my mother for a clothing recommendation but she is a very strong tie (and she buys me clothes in December anyway : )
  • 84. So we are back in the world of the nuance of social interactions. Not all strong ties are equal in all social transactions.But at least we learned that technology enables us to transact socially with people we already know, if its cheaper and easier.If it makes sense against our permission boundary
  • 85. Permission Boundary Break (with a transaction snuck in)That’s a detail of permission boundary. What kind of products or advice you would take from which people. And what would you expect to give/be asked for, from whom.That transaction alone, getting product advice, could be a huge matrix and Ph.D. study.
  • 86. One Path For Empirical ResearchIs to create a pick a particular social transaction and map the permission boundary for it.
  • 87. Key ConceptWhen we talk about cheapest and easiest, we’re talking about COST in terms of permission boundaries.The cost includes managing one’s profile / identity as overhead. Privacy impactsRL impacts like finding a job or a spouse.
  • 88. Weak TiesLet's look at weak ties. Weak ties are people you know, but don't care much about. Your friends' friends.
  • 89. Some people you met recently.
  • 90. Typically, we communicate with weak ties infrequently.
  • 91. Btw, information shared with weak ties is often the source of much trouble and increased social cost.150 Most of us can only stay up-to-date with up to 150 weak ties. This is a limitation of our brain.
  • 92. This number has been consistent throughout history.
  • 93. Neolithic farming villages tended to separate into two once they reached 150 inhabitants.
  • 94. The Roman army was split into groups of 150 so that everyone in the group knew each other. (That’s why the movie 300 was twice the fun of other sandal and sword movies.)Source: Paul Adams Preso
  • 95. It is still true today, online as well as offline.
  • 96. There is evidence that when online games involving social interaction reach about 150 active users, group cohesion collapses, resulting in dissatisfaction and defection.
  • 97. Similarly, Wikipedia involvement tends to plateau at about 150 active administrators.Source: Paul Adams Preso
  • 98. Paul Adams Says:Online social networks make it easier to reconnect and catch up with weak tiesWe can now look at what they've been up to via their online social network profile. This lets us easily communicate with them - it gives us a lightweight route to get back in touch. This is a powerful route when we're sourcing new information.
  • 99. My POV:This is a great data point supporting the idea that the social network is so low cost, relative to the permission boundary with those weak ties, FOR THE TYPE OF SOCIAL TRANSACTION they are conducting, that they use it.It is super easy
  • 100. It is ready made to customize and requires almost no effort.
  • 101. But since it is so easy (and not something we think about carefully it is the source of potential trouble –as well as growth).Permission Boundary BreakThat’s why Facebook beat MySpace
  • 102. It allowed people to do this.
  • 104. Much less worries and hassles about privacy (a factor in permission boundaries) than MySpace
  • 105. But now that’s changed and the personalized/controlled experience is becoming diluted.
  • 106. And people are dissatisfied.But in fact, MySpace wasn’t meant to be a place to share with select others. It was meant to be a better way to blog, as it were. An easier, multimedia blog (before there was Wordpress or Drupal or Joomla).
  • 107. But –it added to the terabytes of data out there and while it made it easier to add to them. It made it harder for individuals to filter those terabytes and see only what they wanted.Permission Boundary -PersonalizationGoogle was about personalization of “info in” (search)
  • 108. Twitter is pure personalization of “info in” (search)
  • 109. Facebook is personalization of “info in” (search) and “info out” (customized, targeted micro publishing)
  • 110. MySpace is about personalized publishing (“info out”) like blogs. And like the web itself.Its not Definitive, ThoughBecause There is Still a Ton of Social Transaction going on “off network”
  • 111. Paul Adams SaysMany people use email for very private exchanges. For example, sharing photos or sensitive articles that they would prefer not to post on a social network.
  • 112. Some young adults use email to communicate with their strongest ties because their social network is overloaded with information from lots of different people, and their message might not be noticed.
  • 113. My Analysis: As we mentioned above, email gives context and control –much closer to RL.If there is information overload, what is all that noise?Paul Adams Says:
  • 114. Status updates are often perceived as a narcissistic activity. But research has indicated that they support important social functions. People have four primary reasons for updating their status:
  • 115. - People update their status to shape how others perceive them.
  • 116. - People update their status to maintain and grow relationships.
  • 117. - People update their status to share content that others might find valuable.
  • 118. - People update their status to source information.How Other’s Perceive ThemThat is the key to identity or profile management.This is a huge factor in a permission boundary.And it changes depending upon the person you are trying to appear in front of.But you don’t need it in RL with your friend who really knows who you are.RL is different.
  • 119. Temporary TiesThere is a third category of ties that some have identified: temporary ties.
  • 120. These are ties that are explicitly connected to one time or very infrequent social transactions.
  • 121. To me, its like trying to lump all the unknown “friend” categories into one bucket.
  • 122. To me, its far more valuable, in terms of tool and feature selection, to drop that category.
  • 123. Start with the transaction then build for adoption of the tool for that transaction.Cost of Managing IdentityA factor balanced against a permission boundaryManaging identity has high Overhead
  • 124. That’s why the less you need to manage of it, the better.
  • 125. This is a key to how “elastic” a permission boundary is in social network system. The lower the overhead is to manage identity and privacy (i.e. the user assumes the system is doing it for them) the more elastic the permission boundary i.e. the more free the information will flow in and out. The boundary will bend to allow more to pass in and out.
  • 126. Until something goes wrong –then there’s a whiplash out of there.Interesting FactHalf of the top 1000 reviewers on Amazon don't use their real name.Its just a review. It adds credibility to use a real name. Yet people don’t. Permission boundaries are that weird.As Paul Adams says “sometimes people need to be anonymous”
  • 127. What Does That Tell Us?That doesn’t mean you need to rush and build in the capability for people to be anonymous in your social networking tool.
  • 128. Or that it should be a requirement on your RFP for a solution you are purchasing.
  • 129. It means that you need to understand the full import of the transaction you are asking or allowing users to conduct on your network.
  • 130. And sometimes, anonymous is just a way for a user to tell you that managing the online profile is too darn “costly” on your system.Privacy, Another “Cost” Factor in Permission BoundaryResearch on Facebook usage showed that only 8% of users had left their profile open to anyone searching on the Facebook network, and that 64% of users had adjusted their profile to “only friends.”
  • 131. The “kids” know itYoung adults (ages 18–29) are more likely than older adults to say that they actively control their privacy online.
  • 132. 44% take steps to limit the amount of personal information available about them online
  • 133. 71% change their privacy settings
  • 134. 47% delete unwanted comments on their profiles
  • 135. 41% remove their name from photos
  • 136. Source: Paul Adams PresoCost of Managing a Profile (and what happens if you don’t)One research study found that only 18% of users updated their profile after 24 hours of creating it, and only 12% updated after one week. Without live content that updates regularly, profiles quickly become outdated representations.
  • 137. People Don’t Understand the Consequences of PrivacyPeople often don't understand the consequences of what they are posting e.g. can it be searched by Google, searched by others.
  • 138. Because they don't have the visual or environmental cues that being in a physical environment have.
  • 139. Because its totally new. And changing every day.
  • 140. No experience on the dangers and risks.Persistence of Online InformationYour Interactions Online Are Persistent
  • 141. Let's imagine these girls were gossiping about this guy. When he comes over, they stop. Their conversation isn't persistent.
  • 142. But if this gossip happens on their Facebook walls, and it does, then it remains there for the guy to find at any point in time. Not only that, but it could be weeks old, or months, or even years.Source: Paul Adams Preso
  • 143. The Impact of Persistence GrowsIn 2009, 45% of HR departments said they use social networks to learn about applicants.
  • 144. In 2010, this grew to over 70%
  • 145. Not to mention cyber-bullying.
  • 146. It stinks in the virtual playground, but what about in the corporate social sandboxSample Transactions, Tools to Do it, The Type of Relationship Its done with and what kind of Bond it BuildsMutual interests, a community of common interest (message boards –low pressure, time convenient)
  • 147. Planning a party or club event or FNM or WoW
  • 149. Sharing project information (a tricky one wrt context)
  • 150. Just chatting (texting, IM or chat)
  • 151. Keeping up with others (posts)
  • 152. Projecting a persona, pretending (posts or 2nd Life)
  • 153. Finding a relationship with someone
  • 154. Keeping track of company acronyms (wiki)
  • 155. Alerts and quick notes, no conversation (email, text, post)Key ConceptsSocial Networking Features are just like any other technology
  • 156. Users will adopt or not adopt based on cost/benefit
  • 157. The cost is weighed against their permission boundaries (which tries to capture the nuanced and complex nature of people’s relationships with each other)
  • 158. Isolating which transaction your are trying to encourage will help you build/select the right feature since it is a starting point for understanding the permission boundaries involved.VL is Not RLVL is still coming into being
  • 159. We are learning about it and adapting as it evolves.
  • 160. Keep in mind though: VL is mostly driven by commercial interests and will only exist as long it is economically sensible for it to exist.
  • 161. Commercial players, government and others can change the playing field in a minute.
  • 162. There is no true “nature” in VL. Nothing bigger or stronger than us (despite movies about robot take-overs). We run the show.Thank youwww.vertabase.com/blog@mpmobile [email protected] Recent Article: “Context Trumps Content”In ComputerWorld & Bloomberg BusinessWeekSearch “Context Trumps Content”