Unknowable Manipulators: Social Network Curator Algorithms

For a social networking service to acquire and retain users, it must find ways to keep them engaged. By accurately gauging their preferences, it is able to serve them with the subset of available content that maximises revenue for the site. Without the constraints of an appropriate regulatory framework, we argue that a sufficiently sophisticated curator algorithm tasked with performing this process may choose to explore curation strategies that are detrimental to users. In particular, we suggest that such an algorithm is capable of learning to manipulate its users, for several qualitative reasons: 1. Access to vast quantities of user data combined with ongoing breakthroughs in the field of machine learning are leading to powerful but uninterpretable strategies for decision making at scale. 2. The availability of an effective feedback mechanism for assessing the short and long term user responses to curation strategies. 3. Techniques from reinforcement learning have allowed machines to learn automated and highly successful strategies at an abstract level, often resulting in non-intuitive yet nonetheless highly appropriate action selection. In this work, we consider the form that these strategies for user manipulation might take and scrutinise the role that regulation should play in the design of such systems.

[1]  Quoc V. Le,et al.  Measuring Invariances in Deep Networks , 2009, NIPS.

[2]  Sergey Levine,et al.  Learning Neural Network Policies with Guided Policy Search under Unknown Dynamics , 2014, NIPS.

[3]  Eli Pariser,et al.  The Filter Bubble: What the Internet Is Hiding from You , 2011 .

[4]  Francis Heylighen,et al.  Mobilization Systems: technologies for motivating and coordinating human action , 2013 .

[5]  Seth Flaxman,et al.  EU regulations on algorithmic decision-making and a "right to explanation" , 2016, ArXiv.

[6]  Alex Graves,et al.  Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.

[7]  Robert I. Webb,et al.  High-Frequency Trading: Implications for Markets, Regulators, and Efficiency , 2010, The Journal of Trading.

[8]  B. Skinner,et al.  The Behavior of Organisms: An Experimental Analysis , 2016 .

[9]  Zachary Chase Lipton The mythos of model interpretability , 2016, ACM Queue.

[10]  Staffan Björk,et al.  Dark patterns in the design of games , 2013, FDG.

[11]  Thomas Richardson,et al.  Interpretable Boosted Naïve Bayes Classification , 1998, KDD.

[12]  James H. Moor,et al.  The Nature, Importance, and Difficulty of Machine Ethics , 2006, IEEE Intelligent Systems.

[13]  C. Allen,et al.  Moral Machines: Teaching Robots Right from Wrong , 2008 .

[14]  Demis Hassabis,et al.  Mastering the game of Go with deep neural networks and tree search , 2016, Nature.

[15]  Marco Hernandez,et al.  Behavioral Interventions in Tax Compliance: Evidence from Guatemala , 2016 .

[16]  Jeffrey T. Hancock,et al.  Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.

[17]  M. Lenglet,et al.  Conflicting Codes and Codings: How Algorithmic Trading Is Reshaping Financial Regulation , 2010 .

[18]  Daniel Nettle,et al.  Effects of eye images on everyday cooperative behavior: a field experiment , 2011 .

[19]  Julian D. Olden,et al.  Illuminating the “black box”: a randomization approach for understanding variable contributions in artificial neural networks , 2002 .

[20]  Miles Brundage,et al.  Limitations and risks of machine ethics , 2014, J. Exp. Theor. Artif. Intell..

[21]  Michel Ballings,et al.  CRM in social media: Predicting increases in Facebook usage frequency , 2015, Eur. J. Oper. Res..

[22]  Raymond C. Kurzweil,et al.  The Singularity Is Near , 2018, The Infinite Desire for Growth.

[23]  Agustí Verde Parera,et al.  General data protection regulation , 2018 .

[24]  Robert A. Jarrow,et al.  Market Manipulation, Bubbles, Corners, and Short Squeezes , 1992, Journal of Financial and Quantitative Analysis.

[25]  Andrew Zisserman,et al.  Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.

[26]  R. Kurzweil,et al.  The Singularity Is Near: When Humans Transcend Biology , 2006 .

[27]  Lin Chun The Rise of the Social , 2013 .

[28]  Wei Chu,et al.  A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.

[29]  Francis Heylighen,et al.  Return to Eden ? Promises and Perils on the Road to a Global Superintelligence , 2014 .

[30]  Alexandre Padilla Review of Richard H. Thaler and Cass R. Sunstein, Nudge: Improving decisions about health, wealth, and happiness , 2009 .

[31]  Andrea Vedaldi,et al.  Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[32]  N. Coombs,et al.  What is an algorithm? Financial regulation in the era of high-frequency trading , 2016 .

[33]  Matt Prewitt High-Frequency Trading: Should Regulators Do More , 2012 .

[34]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[35]  Michael A. Peters,et al.  The new development paradigm : education, knowledge economy and digital futures , 2014 .

[36]  Lada A. Adamic,et al.  Exposure to ideologically diverse news and opinion on Facebook , 2015, Science.

[37]  Jure Leskovec,et al.  Steering user behavior with badges , 2013, WWW.

[38]  Zoubin Ghahramani,et al.  Dropout as a Bayesian Approximation: Representing Model Uncertainty in Deep Learning , 2015, ICML.

[39]  Sergio Ronaldo Barros dos Santos,et al.  Longitudinal autopilot controllers test platform hardware in the loop , 2011, 2011 IEEE International Systems Conference.

[40]  Andrea Vedaldi,et al.  Understanding Image Representations by Measuring Their Equivariance and Equivalence , 2014, International Journal of Computer Vision.

[41]  T. Leonard,et al.  Richard H. Thaler, Cass R. Sunstein, Nudge: Improving decisions about health, wealth, and happiness , 2008 .

[42]  Paulo J. G. Lisboa,et al.  Making machine learning models interpretable , 2012, ESANN.

[43]  Markus Bick,et al.  Big Data, Big Opportunities: Revenue Sources of Social Media Services Besides Advertising , 2015, I3E.

[44]  Raymond J. Dolan,et al.  Game Theory of Mind , 2008, PLoS Comput. Biol..

[45]  William R. Swartout,et al.  XPLAIN: A System for Creating and Explaining Expert Consulting Programs , 1983, Artif. Intell..

[46]  Nahum Shimkin,et al.  Nonlinear Control Systems , 2008 .

[47]  Karrie Karahalios,et al.  FeedVis: A Path for Exploring News Feed Curation Algorithms , 2015, CSCW Companion.

[48]  Vernor Vinge,et al.  ==================================================================== the Coming Technological Singularity: How to Survive in the Post-human Era , 2022 .

[49]  J. Palomäki,et al.  Emotional and Social Factors influence Poker Decision Making Accuracy , 2015, Journal of Gambling Studies.

[50]  Nick Bostrom,et al.  Superintelligence: Paths, Dangers, Strategies , 2014 .

[51]  Johannes Gehrke,et al.  Intelligible models for classification and regression , 2012, KDD.

[52]  I. J. Good,et al.  Speculations Concerning the First Ultraintelligent Machine , 1965, Adv. Comput..

[53]  Patricia Boshe,et al.  Data privacy law: an international perspective , 2015 .

[54]  Markus Gsell,et al.  Catching up with Technology — The Impact of Regulatory Changes on ECNs/MTFs and the Trading Venue Landscape in Europe , 2006 .

[55]  Stéphane Mallat,et al.  Invariant Scattering Convolution Networks , 2012, IEEE transactions on pattern analysis and machine intelligence.

[56]  Monika Zalnieriute,et al.  Transborder Data Flows and Data Privacy Law , 2014, Comput. Law Secur. Rev..

[57]  Bert-Jaap Koops,et al.  The trouble with European data protection law , 2014 .

[58]  David Lazer,et al.  The rise of the social algorithm , 2015, Science.