The Future(s) of Social Machines: The Research Agenda

The final chapter looks to the future of social machines under the conditions of digital modernity, when they will have to coexist and even compete with technologies such as artificial intelligence. They will no doubt require or acquire new forms, new functions, new methods of study and new infrastructure. Examples are given of each of these four. The chapter considers cyber-physical social machines, where social machines exploit the new affordances of the Internet of Things, as a new form of social machine. As a new function of social machines, social knowledge machines are described, in which social groups emerge around technologies to create and curate data and knowledge resources. Topological data analysis is considered as a potential new research method into social machines. Finally, new initiatives to decentralise the Web, such as the Solid project, are reviewed as means for allowing social machine participants to retain a measure of control. Finally, the chapter reviews the requirements to enable participants to develop and maintain social machines of their own design.

[1]  Kieron O'Hara Where shall we draw the line?: Conservatism, privacy and digital modernity , 2018 .

[2]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[3]  Laura Trouille,et al.  Using citizen science to bridge taxonomic discovery with education and outreach , 2018, Applications in plant sciences.

[4]  Xin Wang,et al.  Observing data in IoT worlds: What and how to observe? , 2018, IoT 2018.

[5]  David Murray-Rust,et al.  LSCitter: building social machines by augmenting existing social networks with interaction models , 2014, WWW.

[6]  Fausto Giunchiglia,et al.  Programming the social computer , 2013, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[7]  Jesse Schell,et al.  The Art of Game Design: A book of lenses , 2019 .

[8]  Steven Ovadia Automate the Internet With “If This Then That” (IFTTT) , 2014 .

[9]  Sadie Creese,et al.  Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[10]  Pablo Noriega,et al.  Communicating open systems , 2012, Artif. Intell..

[11]  Jens Grossklags,et al.  A Democracy Called Facebook? Participation as a Privacy Strategy on Social Media , 2018, APF.

[12]  Adam C. Winstanley,et al.  Towards quality metrics for OpenStreetMap , 2010, GIS '10.

[13]  Margaret Kosmala,et al.  Assessing data quality in citizen science (preprint) , 2016, bioRxiv.

[14]  Dong Nguyen,et al.  Emo, love and god: making sense of Urban Dictionary, a crowd-sourced online dictionary , 2017, Royal Society Open Science.

[15]  Amit P. Sheth,et al.  Building the Web of Knowledge with Smart IoT Applications , 2016, IEEE Intelligent Systems.

[16]  Alex Pentland,et al.  Honest Signals - How They Shape Our World , 2008 .

[17]  Guillaume Touya,et al.  Quality Assessment of the French OpenStreetMap Dataset , 2010, Trans. GIS.

[18]  David E. Millard,et al.  The digitally extended self: A lexicological analysis of personal data , 2018, J. Inf. Sci..

[19]  Taha Yasseri,et al.  Value Production in a Collaborative Environment , 2012, Journal of Statistical Physics.

[20]  Kieron O’Hara,et al.  The contradictions of digital modernity , 2018, AI & SOCIETY.

[21]  Frédéric Chazal,et al.  An Introduction to Topological Data Analysis: Fundamental and Practical Aspects for Data Scientists , 2017, Frontiers in Artificial Intelligence.

[22]  Nishtha Madaan,et al.  Data integration in IoT ecosystem: Information linkage as a privacy threat , 2018, Comput. Law Secur. Rev..

[23]  Pascal Neis,et al.  Analyzing the Contributor Activity of a Volunteered Geographic Information Project - The Case of OpenStreetMap , 2012, ISPRS Int. J. Geo Inf..

[24]  François Pachet,et al.  Proceedings of the Seventh International Conference on Computational Creativity, UPMC, Paris, France, June 27 - July 1, 2016. , 2016 .

[25]  Sadie Creese,et al.  If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems , 2018, IoT 2018.

[26]  Max Van Kleek,et al.  The Future of Social Is Personal: The Potential of the Personal Data Store , 2014 .

[27]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[28]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[29]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[30]  Lujo Bauer,et al.  Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes , 2017, WWW.

[31]  R. Hinde,et al.  The Possibility of Cooperation@@@Cooperation: The Basis of Sociability.@@@Cooperation and Prosocial Behavior.@@@Governing the Commons: The Evolution of Institutions for Collective Action. , 1990 .

[32]  Joanna L. Sharman,et al.  The IUPHAR/BPS Guide to PHARMACOLOGY in 2016: towards curated quantitative interactions between 1300 protein targets and 6000 ligands , 2015, Nucleic Acids Res..

[33]  Nigel Shadbolt,et al.  Social Machines for All , 2018, AAMAS.

[34]  Kieron O'Hara The Fridge's Brain Sure Ain't the Icebox , 2014, IEEE Internet Comput..

[35]  Gunnar E. Carlsson,et al.  Topology and data , 2009 .

[36]  Nigel Shadbolt,et al.  Towards Executable Representations of Social Machines , 2018, Diagrams.

[37]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[38]  Wendy Hall,et al.  A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines , 2018, ArXiv.

[39]  Jiyun Lee,et al.  Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes , 2016, CHI.

[40]  K. O’Hara,et al.  Lifelogging: Privacy and empowerment with memories for life , 2008 .

[41]  Hamid R. Ekbia,et al.  Heteromation, and Other Stories of Computing and Capitalism , 2017 .

[42]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2015, Inf. Syst. Frontiers.

[43]  Bhaskara Marthi,et al.  A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs , 2017, Science.

[44]  Y. Benkler,et al.  Commons‐based Peer Production and Virtue* , 2006 .

[45]  Shoshana Zuboff The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .

[46]  Wendy Hall,et al.  The Role of Crowdsourcing in the Emerging Internet-Of-Things , 2017, WWW.

[47]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[48]  David Murray-Rust,et al.  On Wayfaring in Social Machines , 2015, WWW.

[49]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[50]  Jonathan L. Zittrain,et al.  The Future of the Internet - And How to Stop It , 2008 .

[51]  R. Venkatesha Prasad,et al.  A scalable distributed architecture towards unifying IoT applications , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[52]  S. Fuller Knowledge Management Foundations , 2001 .

[53]  P. Kitcher The Advancement of Science , 1993 .

[54]  Petros Papapanagiotou,et al.  Softening electronic institutions to support natural interaction , 2015, Hum. Comput..

[55]  Tim Berners-Lee,et al.  The read–write Linked Data Web , 2013, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[56]  Suzanne Rivard,et al.  A Multilevel Model of Resistance to Information Technology Implementation , 2005, MIS Q..

[57]  Sadie Creese,et al.  Security Risk Assessment in Internet of Things Systems , 2017, IT Professional.

[58]  Ying Zhang,et al.  An empirical characterization of IFTTT: ecosystem, usage, and performance , 2017, Internet Measurement Conference.

[59]  James Cheney,et al.  Curated databases , 2008, PODS.

[60]  Anders Mollgaard,et al.  The memory remains: Understanding collective memory in the digital age , 2016, Science Advances.

[61]  M. Haklay How Good is Volunteered Geographical Information? A Comparative Study of OpenStreetMap and Ordnance Survey Datasets , 2010 .

[62]  Paul R. Smart,et al.  Where the smart things are: social machines and the Internet of Things , 2018, Phenomenology and the Cognitive Sciences.

[63]  Sadie Creese,et al.  Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).

[64]  Rachel Schutt,et al.  Doing Data Science: Straight Talk from the Frontline , 2013 .

[65]  James A. Hendler,et al.  Web Science: Understanding the Emergence of Macro-Level Features on the World Wide Web , 2013, Found. Trends Web Sci..

[66]  Atreyi Kankanhalli,et al.  Investigating user resistance to information systems implementation: a status quo bias perspective , 2009 .

[67]  Pascal Neis,et al.  The Street Network Evolution of Crowdsourced Maps: OpenStreetMap in Germany 2007-2011 , 2011, Future Internet.