3,966 research outputs found

    Quantifying Biases in Online Information Exposure

    Full text link
    Our consumption of online information is mediated by filtering, ranking, and recommendation algorithms that introduce unintentional biases as they attempt to deliver relevant and engaging content. It has been suggested that our reliance on online technologies such as search engines and social media may limit exposure to diverse points of view and make us vulnerable to manipulation by disinformation. In this paper, we mine a massive dataset of Web traffic to quantify two kinds of bias: (i) homogeneity bias, which is the tendency to consume content from a narrow set of information sources, and (ii) popularity bias, which is the selective exposure to content from top sites. Our analysis reveals different bias levels across several widely used Web platforms. Search exposes users to a diverse set of sources, while social media traffic tends to exhibit high popularity and homogeneity bias. When we focus our analysis on traffic to news sites, we find higher levels of popularity bias, with smaller differences across applications. Overall, our results quantify the extent to which our choices of online systems confine us inside "social bubbles."Comment: 25 pages, 10 figures, to appear in the Journal of the Association for Information Science and Technology (JASIST

    The Role of Diverse Strategies in Sustainable Knowledge Production

    Get PDF
    Online communities are becoming increasingly important as platforms for large-scale human cooperation. These communities allow users seeking and sharing professional skills to solve problems collaboratively. To investigate how users cooperate to complete a large number of knowledge-producing tasks, we analyze StackExchange, one of the largest question and answer systems in the world. We construct attention networks to model the growth of 110 communities in the StackExchange system and quantify individual answering strategies using the linking dynamics of attention networks. We identify two types of users taking different strategies. One strategy (type A) aims at performing maintenance by doing simple tasks, while the other strategy (type B) aims investing time in doing challenging tasks. We find that the number of type A needs to be twice as big as type B users for a sustainable growth of communities.Comment: 10 pages, 3 figure

    A Novel Application: Using Mobile Technology to Connect Physical and Virtual Reference Collections

    Get PDF
    This chapter describes an innovative implementation of the use of iPad kiosks to blur the lines between physical and virtual library collections. Providence College’s Phillips Memorial Library + Commons began lending iPads to students, faculty, and staff in 2012. In addition to lending the devices, library staff dedicated time to learning about both task-based and subject-based mobile applications that would be of use to our community. A small group of library staff tested, discussed, and vetted a variety of apps that would be deployed on the iPads to be lent out. Efforts were made to promote the use and discovery of various apps on the devices through thoughtful organization of the apps on the devices themselves, programming around applications, and the creation of an online research guide designed to teach more about the apps. Despite these initiatives, assessment data from the iPad lending program collected over the course of five semesters suggests that patrons borrowing the iPads are using them primarily for accessing the Internet (Safari, Chrome, etc.), social media (Facebook, Twitter, etc.), and consuming media (YouTube, Netflix, Pandora, Spotify, etc.). With this data in mind, library staff began to think of alternative ways to connect our patrons with useful, content-based, mobile applications. Drawing on research around the Internet of Things and the integration of digital technologies with our physical lives, the Digital Publishing Services Coordinator suggested positioning iPad kiosks strategically within the library’s physical book collection as a means to connect patrons browsing a given area of the stacks with the library’s online resources related to that subject area. The library’s Commons Technology Specialist had experience with iPad kiosks and programming the iPads as he had managed the logistics of the iPad lending program since its inception. Working collaboratively, these colleagues devised a way to image the iPads for public use and load them with subject-specific apps as well as links to library databases and open web resources. The team chose to use Scalar as the primary content management tool for kiosk content. This chapter provides details about the selection and deployment of content for the Theology Kiosk, signage and communications created to attract patrons to the kiosk, and initial data about kiosk use. The piece concludes with a review of the kiosk project and an outline of future planning related to the project (staff time, hardware and software requirements, usability testing, scaling the project, etc.)

    Analysis of dependence among size, rate and duration in internet flows

    Get PDF
    In this paper we examine rigorously the evidence for dependence among data size, transfer rate and duration in Internet flows. We emphasize two statistical approaches for studying dependence, including Pearson's correlation coefficient and the extremal dependence analysis method. We apply these methods to large data sets of packet traces from three networks. Our major results show that Pearson's correlation coefficients between size and duration are much smaller than one might expect. We also find that correlation coefficients between size and rate are generally small and can be strongly affected by applying thresholds to size or duration. Based on Transmission Control Protocol connection startup mechanisms, we argue that thresholds on size should be more useful than thresholds on duration in the analysis of correlations. Using extremal dependence analysis, we draw a similar conclusion, finding remarkable independence for extremal values of size and rate.Comment: Published in at http://dx.doi.org/10.1214/09-AOAS268 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org

    The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace

    Get PDF
    IT devices connected to Internet, such as computers, tablets and smartphones, are commonly used in organizations. At the same time, organizational employees increasingly perform non-work related activities at work by using the IT resources, which is defined as personal Internet use (PIU) in workplace. Multiple models have been developed by previous studies to investigate why employees perform PIU. These studies consider all PIU activities as a uniform behavior. However, literature suggests that there are different types of PIU activities. Therefore, it is with limitations to consider PIU behavior and its antecedents uniformly for all activities, given that PIU behavior may differ significantly when bounded with the different activities. As a first step to close the gap, we examine separately the antecedents of three types of PIU activities: non-work related emailing activities, browsing activities, and online financial activities, to validate our hypothesis that the same antecedent does not explain all PIU activities. Our study contributes to research by demonstrating the necessity to separately examine different types of PIU activities when investigating why employees perform PIU
    corecore