Advertisement

Characterising Social Machines

  • Nigel Shadbolt
  • Kieron O’Hara
  • David De Roure
  • Wendy Hall
Chapter
Part of the Lecture Notes in Social Networks book series (LNSN)

Abstract

This opening chapter introduces the idea of social machines. The metaphor of a machine is introduced, and it is explained how it applies to social groups connected through digitally networked technologies, ubiquitous devices and large quantities of data. Social machines enable mechanistic explanations of social phenomena, without the reductionist claim that these social groups are determined by the technology. Building blocks of the social machines concept are enumerated and described, including heterogeneous human-computer networks, social computing, communication, platforms and communities, ecosystems of social machines, dynamics of networks and various ethical concepts. Examples of social machines are introduced, including Wikipedia, citizen science social machines such as Zooniverse and Eyewire, healthcare social machines and Pokémon Go! After considering ways of classifying social machines, and contrasting social machines with similar concepts such as crowdsourcing and social computing, it is argued that producing a definition of social machines would be counterproductive, such is the fluidity of the concept and its social and technical contexts. Instead, the book will consider how technologically enabled social groups can be studied through a social machine lens.

Keywords

Annotation Antisocial machines Antitrust Berners-Lee, Tim Citizen science Collective intelligence Communication Crowdsourcing DARPA challenge Distributed systems Ethics Exploitation Eyewire Facebook Healthcare social machines Human computation Mechanical Turk Multi-agent systems Open innovation Open source Platforms Pokémon Go! reCAPTCHA Social computing Social machine Telos Trust Twitter Wikipedia Wisdom of crowds Zooniverse 

References

  1. Abrams P (1968) The origins of British sociology 1834–1914. University of Chicago Press, ChicagoGoogle Scholar
  2. von Ahn L (2006) Games with a purpose. Computer 39(6):92–94.  https://doi.org/10.1109/MC.2006.196 CrossRefGoogle Scholar
  3. von Ahn L, Maurer B, McMillen C, Abraham D, Blum M (2008) reCAPTCHA: human-based character recognition via Web security measures. Science 321:1465–1468.  https://doi.org/10.1126/science.1160379 MathSciNetCrossRefzbMATHGoogle Scholar
  4. Aly A (2017) Brothers, believers, brave mujahideen: focusing attention on the audience of violent jihadist preachers. Stud Conf Terrorism 40(1):62–76.  https://doi.org/10.1080/1057610X.2016.1157407 CrossRefGoogle Scholar
  5. Appiah KA (2005) Ethics of identity. Princeton University Press, PrincetonGoogle Scholar
  6. Baier AC (1994) Trust and anti-trust. In: Moral prejudices: essays on ethics. Harvard University Press, Cambridge, MA, pp 95–129Google Scholar
  7. Bederson BB, Quinn AJ (2011) Web workers unite! Addressing challenges of online laborers. In: CHI ’11 extended abstracts on human factors in computing systems. ACM, New York, pp 97–106.  https://doi.org/10.1145/1979742.1979606 CrossRefGoogle Scholar
  8. Berners-Lee T, Fischetti T (1999) Weaving the web: the original design and ultimate destiny of the world wide web. HarperCollins, New YorkGoogle Scholar
  9. Berners-Lee T, O’Hara K (2013) The read-write linked data web. Philos Trans A Math Phys Eng Sci 371(1987):20120513.  https://doi.org/10.1098/rsta.2012.0513 MathSciNetCrossRefzbMATHGoogle Scholar
  10. Buneman P, Khanna S, Tan W-C (2002) On propagation of deletions and annotations through views. In: Proceedings of the Twenty-First ACM SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems (PODS ’02). ACM, New York, pp 150–158.  https://doi.org/10.1145/543613.543633 CrossRefGoogle Scholar
  11. Buneman P, Kostylev EV, Vansummeren S (2013) Annotations are relative. In: Proceedings of the 16th International Conference on Database Theory (ICDT ’13). ACM, New York, pp 177–188.  https://doi.org/10.1145/2448496.2448518 CrossRefGoogle Scholar
  12. Buneman P, Gascón A, Murray-Rust D (2016b) Composition and substitution in provenance and workflows. In: Proceedings of the 8th USENIX workshop on the Theory and Practice of Provenance (TaPP ’16). https://www.usenix.org/conference/tapp16/workshop-program/presentation/buneman
  13. Buntain C, Golbeck J, Liu B, LaFree G (2016) Evaluating public response to the Boston Marathon bombing and other acts of terrorism through Twitter. In: Tenth international AAAI conference on web and social media. https://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/viewPaper/13038
  14. Callison-Burch C (2014) Crowd-workers: aggregating information across turkers to help them find higher paying work. In: Human computation and crowdsourcing: works in progress and demonstration abstracts: an adjunct to the proceedings of the second AAAI conference on human computation and crowdsourcing. https://www.aaai.org/ocs/index.php/HCOMP/HCOMP14/paper/viewFile/9067/8983
  15. Castronova E (2005) Synthetic worlds: the business and culture of online games. University of Chicago Press, ChicagoGoogle Scholar
  16. Cebrian M, Rahwan I, Pentland A (2016) Beyond viral. Commun ACM 59(4):36–39.  https://doi.org/10.1145/2818992 CrossRefGoogle Scholar
  17. Chesborough H (2003) Open innovation: the new imperative for creating and profiting from technology. Harvard Business School Publishing, Cambridge, MAGoogle Scholar
  18. Colley A, Thebault-Spieker J, Lin AY, Degraen D, Fischman B, Häkkilä J, Kuehl K, Nisi V, Nunes NJ, Wenig N, Wenig D, Hecht B, Schöning J (2017) The geography of Pokémon Go: beneficial and problematic effects on places and movement. In: Proceedings of the 2017 CHI conference on human factors in computing systems (CHI ’17). ACM, New York, pp 1179–1192.  https://doi.org/10.1145/3025453.3025495 CrossRefGoogle Scholar
  19. Conway M (2017) Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research. Stud Confl Terrorism 40(1):77–98.  https://doi.org/10.1080/1057610X.2016.1157408 MathSciNetCrossRefGoogle Scholar
  20. Corneli J, Martin U, Murray-Rust D, Pease A (2017a) Towards mathematical AI via a model of the content and process of mathematical question and answer dialogues. In: Geuvers H, England M, Hasan O, Rabe F, Teschke O (eds) Proceedings of the 10th international Conference on Intelligent Computer Mathematics: CICM 2017. Springer, Cham, pp 132–146.  https://doi.org/10.1007/978-3-319-62075-6_10 CrossRefzbMATHGoogle Scholar
  21. Corneli J, Martin U, Murray-Rust D, Pease A, Puzio R, Nesin GR (2017b) Modelling the way mathematics is actually done. In: Proceedings of the 5th ACM SIGPLAN international workshop on Functional Art, Music, Modeling, and Design (FARM 2017). ACM, New York, pp 10–19.  https://doi.org/10.1145/3122938.3122942 CrossRefGoogle Scholar
  22. Coulouris G, Dollimore J, Kindberg T, Blair G (2012) Distributed systems: concepts and design, 5th edn. Addison-Wesley, BostonzbMATHGoogle Scholar
  23. Craver CF (2007) Explaining the brain: mechanisms and the mosaic unity of neuroscience. Oxford University Press, OxfordCrossRefGoogle Scholar
  24. Dash RK, Jennings NR, Parkes DC (2003) Computational-mechanism design: a call to arms. IEEE Intell Syst 18(6):40–47.  https://doi.org/10.1109/MIS.2003.1249168 CrossRefGoogle Scholar
  25. De Roure D, Hooper C, Meredith-Lobay M, Page K, Tarte S, Cruickshank D, De Roure C (2013) Observing social machines part 1: what to observe? In: Proceedings of the 22nd international conference on World Wide Web (WWW ’13). ACM, New York, pp 901–904.  https://doi.org/10.1145/2487788.2488077 CrossRefGoogle Scholar
  26. De Roure D, Hooper C, Page K, Tarte S, Willcox P (2015) Observing social machines part 2: how to observe? Proceedings of the ACM web science conference, Article No. 13. http://dl.acm.org/citation.cfm?doid=2786451.2786475
  27. De Roure D, Hendler JA, Huynh TD, James D, Moreau L, Nurmikko-Fuller T, Van Kleek M, Willcox P (2018) Pokémon Go! Through the lens of social machines, unpublished paperGoogle Scholar
  28. Deleuze G, Guattari F (1977) Anti-oedipus: capitalism and schizophrenia. Viking Penguin, New YorkGoogle Scholar
  29. Dowell RD, Jokerst RM, Day A, Eddy SR, Stein L (2001) The distributed annotation system. BMC Bioinform 2(1):7.  https://doi.org/10.1186/1471-2105-2-7 CrossRefGoogle Scholar
  30. Ekbia HR, Nardi BA (2017) Heteromation: and other stories of computing and capitalism. MIT Press, Cambridge, MACrossRefGoogle Scholar
  31. Engelmann S, Grossklags J, Papakyriakopolous O (2018) A democracy called Facebook? Participation as a privacy strategy on social media, presented at the Annual Privacy Forum 2018. https://www.cybertrust.in.tum.de/fileadmin/w00bzf/www/papers/2018-APF-Engelmann.pdf
  32. Eysenbach G (2009) Infodemiology and infoveillance: framework for an emerging set of public health informatics methods to analyze search, communication and publication behavior on the Internet. J Med Internet Res 11(1):e11.  https://doi.org/10.2196/jmir.1157 CrossRefGoogle Scholar
  33. Feller J, Fitzgerald B, Hissam S, Lakhani KR (eds) (2005) Perspectives on free and open source software. MIT Press, CambridgeGoogle Scholar
  34. Finke R, Stark R (1992) The Churching of America: winners and losers in our religious economy. Rutgers University Press, New BrunswickGoogle Scholar
  35. Gaines BR, Shaw MLG (2012) Computer-aided constructivism. In: Caputi P, Viney LL, Walker BM, Crittenden N (eds) Personal construct methodology. John Wiley & Sons, Chichester, pp 183–22CrossRefGoogle Scholar
  36. Gowers T (2009) Is massively collaborative mathematics possible? Gowers’s Weblog. https://gowers.wordpress.com/2009/01/27/is-massively-collaborative-mathematics-possible/ CrossRefGoogle Scholar
  37. Green TJ, Karvounarakis G, Tannen V (2007) Provenance semirings. In: Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS ’02). ACM, New York, pp 31–40.  https://doi.org/10.1145/1265530.1265535 CrossRefGoogle Scholar
  38. Halfaker A, Geiger RS, Morgan JT, Riedl J (2013) The rise and decline of an open collaboration system: how Wikipedia’s reaction to popularity is causing its decline. Am Behav Sci 57(5):664–688.  https://doi.org/10.1177/0002764212469365 CrossRefGoogle Scholar
  39. Haythornthwaite C (2009) Crowds and communities: light and heavyweight models of peer production. In: Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS ’09).  https://doi.org/10.1109/HICSS.2009.137
  40. Hendler J, Berners-Lee T (2010) From the semantic web to social machines: a research challenge for AI on the World Wide Web. Artif Intell 174(2):156–161.  https://doi.org/10.1016/j.artint.2009.11.010 MathSciNetCrossRefGoogle Scholar
  41. Hendler J, Mulvehill AJ (2016) Social machines: the coming collision of artificial intelligence, social networking, and humanity. Apress, New YorkCrossRefGoogle Scholar
  42. Hofstadter DR (1979) Gödel, Escher, Bach: an Eternal Golden Braid. Basic Books, New York, NYzbMATHGoogle Scholar
  43. Howe J (2006) Crowdsourcing: a definition. http://www.crowdsourcing.com/cs/2006/06/crowdsourcing_a.html
  44. Huey L, Witmer E (2016) #IS_Fangirl: exploring a new role for women in terrorism. J Terror Res 7(1):1–10.  https://doi.org/10.15664/jtr.1211 CrossRefGoogle Scholar
  45. Irani LC, Six Silberman M (2013) Turkopticon: interrupting worker invisibility in Amazon Mechanical Turk. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). ACM, New York, pp 611–620.  https://doi.org/10.1145/2470654.2470742 CrossRefGoogle Scholar
  46. Jullien N, Crowston K, Ortega F (2015) The rise and fall of an online project: is bureaucracy killing efficiency in open knowledge production? In: Proceedings of the 11th International Symposium on Open Collaboration (OpenSym ’15). ACM, New York, p 13.  https://doi.org/10.1145/2788993.2789844 CrossRefGoogle Scholar
  47. Kamps J, Koolen M (2009) Is Wikipedia link structure different? In: Proceedings of the second ACM international conference on Web Search and Data Mining (WSDM ’09). ACM, New York, NY, pp 232–241.  https://doi.org/10.1145/1498759.1498831 CrossRefGoogle Scholar
  48. Kelly GA (1955) A theory of personality: the psychology of personal constructs. W.W. Norton, New YorkGoogle Scholar
  49. Kittur A, Kraut RE (2008) Harnessing the wisdom of crowds in Wikipedia: quality through coordination. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW ’08). ACM, New York, pp 37–46.  https://doi.org/10.1145/1460563.1460572 CrossRefGoogle Scholar
  50. Kittur A, Suh B, Pendleton BA, Chi EH (2007b) He says, she says: conflict and coordination in Wikipedia. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’07). ACM, New York, pp 453–462.  https://doi.org/10.1145/1240624.1240698 CrossRefGoogle Scholar
  51. Klausen J (2015) Tweeting the jihad: social media networks of Western foreign fighters in Syria and Iraq. Stud Conflict Terrorism 38(1):1–22.  https://doi.org/10.1080/1057610X.2014.974948 CrossRefGoogle Scholar
  52. Kleinberg J (2003) Bursty and hierarchical structure in streams. Data Min Knowl Disc 7(4):373–397.  https://doi.org/10.1023/A:1024940629314 MathSciNetCrossRefGoogle Scholar
  53. Kleinberg J, Raghavan P (2005) Query incentive networks. In: Proceedings of the 46th annual IEEE symposium of Foundations of Computer Science (FOCS’05), Pittsburgh, pp. 132–141.  https://doi.org/10.1109/SFCS.2005.63
  54. Kuznetsov S (2006) Motivations of contributors to Wikipedia. ACM SIGCAS Comput Soc 36(2):1.  https://doi.org/10.1145/1215942.1215943 CrossRefGoogle Scholar
  55. Lakhani KR, Wolf R (2005) Why hackers do what they do: understanding motivation and effort in free/open source software projects. In: Feller J, Fitzgerald B, Hissam S, Lakhani KR (eds) Perspectives on free and open source software. MIT Press, Cambridge, MA, pp 3–22Google Scholar
  56. Latour B (2005) Reassembling the social: an introduction to actor-network-theory. Oxford University Press, OxfordGoogle Scholar
  57. Law E, von Ahn L (2011) Human computation. Morgan & Claypool, San Rafael, CACrossRefGoogle Scholar
  58. Lévy P (1997) Collective intelligence: mankind’s emerging world in cyberspace. Perseus Books, Cambridge, MAGoogle Scholar
  59. Liao H-T (2008) Conflictual consensus in the Chinese version of Wikipedia. In: IEEE International Symposium on Technology and Society (ISTAS 2008).  https://doi.org/10.1109/ISTAS.2008.4559775
  60. Lintott CJ, Schawinski K, Slosar A, Land K, Bamford S, Thomas D, Raddick MJ, Nichol RC, Szalay A, Andreescu D, Murray P, Vandenberg J (2008) Galaxy Zoo: morphologies derived from visual inspection of galaxies from the Sloan Digital Sky Survey. Mon Not R Astron Soc 389(3):1179–1189.  https://doi.org/10.1111/j.1365-2966.2008.13689.x CrossRefGoogle Scholar
  61. Luczak-Roesch M, Tinati R (2016) The social in the platform trap: why a microscopic system focus limits the prospect of social machines. Discover Soc 34:1–6Google Scholar
  62. Luczak-Roesch M, Tinati R, Shadbolt N (2015b) When resources collide: towards a theory of coincidence in information spaces. In: Proceedings of the 24th international conference on World Wide Web. ACM, New York, pp 1137–1142.  https://doi.org/10.1145/2740908.2743973 CrossRefGoogle Scholar
  63. Luczak-Roesch M, O’Hara K, Dinneen JD, Tinati R (2018) What an entangled Web we weave: an information-centric approach to time-evolving socio-technical systems. Mind Machine.  https://doi.org/10.1007/s11023-018-9478-1 CrossRefGoogle Scholar
  64. Lüge T (2015) GIS Support for the MSF Ebola Response in Liberia, Guinea and Sierra Leone. Médecins Sans Frontières, Geneva. https://reliefweb.int/sites/reliefweb.int/files/resources/GIS%20Support%20Ebola%202015_EN.pdf Google Scholar
  65. Madaan A, Nurse JRC, De Roure D, O’Hara K, Hall W, Creese S (2018a) A storm in an IoT cup: the emergence of cyber-physical social machines, SSRN. https://ssrn.com/abstract=3250383
  66. Mailer N (1968) Armies of the night. Putnam, New YorkGoogle Scholar
  67. Malone TW, Bernstein MS (eds) (2015) Handbook of collective intelligence. MIT Press, Cambridge, MAGoogle Scholar
  68. Malthaner S, Waldmann P (2014) The radical milieu: conceptualizing the supportive social environment of terrorist groups. Stud Conf Terrorism 37(12):979–998.  https://doi.org/10.1080/1057610X.2014.962441 CrossRefGoogle Scholar
  69. Marks AP (1989) The Sinclair C5—an investigation into its development, launch, and subsequent failure. Eur J Mark 23(1):61–71.  https://doi.org/10.1108/EUM0000000000542 CrossRefGoogle Scholar
  70. Martin D, Hanrahan BV, O’Neill J, Gupta N (2014) Being a Turker. In: Proceedings of the 17th ACM conference on Computer Supported Cooperative Work & Social Computing (CSCW ’14). ACM, New York, pp 224–235.  https://doi.org/10.1145/2531602.2531663 CrossRefGoogle Scholar
  71. Martins P, Miranda M, Benevenuto F, Almeida JM (2017) The emergence of crowdsourcing among Pokémon Go Players. http://arxiv.org/abs/1703.08365
  72. Mattheiss E, Hochleitner C, Busch M, Orji R, Tscheligi M (2017) Deconstructing Pokémon Go—an empirical study on player personality characteristics. In: de Vries PW, Oinas-Kukkonen H, Siemons L, Jong N B-d, van Gemert-Pijnen L (eds) Persuasive technology: development and implementation of personalized technologies to change attitudes and behaviors. Springer, Cham, pp 83–94.  https://doi.org/10.1007/978-3-319-55134-0_7 CrossRefGoogle Scholar
  73. Maurer SM (2008) Open source drug discovery: finding a niche (or maybe several). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1114371
  74. Meier P, Brodock K (2008) Crisis mapping Kenya’s election violence: comparing mainstream news, citizen journalism and Ushahidi, Harvard Humanitarian Initiative. https://irevolutions.org/2008/10/23/mapping-kenyas-election-violence/. Accessed Jun 2017
  75. Morrow N, Mock N, Papendieck A, Kocmich N (2011) Independent evaluation of the Ushahidi Haiti project, development information systems international. http://ggs684.pbworks.com/w/file/fetch/60819963/1282.pdf
  76. Murray-Rust D, Scekic O, Truong H-L, Robertson D, Dustdar S (2014a) A collaboration model for community-based software development with social machines. In: International conference on collaborative computing: networking, applications and worksharing (CollaborateCom), pp. 84–93,  https://doi.org/10.4108/icst.collaboratecom.2014.257245
  77. Murray-Rust D, Tarte S, Hartswood M, Green O (2015d) On wayfaring in social machines. In: Proceedings of the 24th international conference on the World Wide Web (WWW ’15). ACM, New York, pp 1143–1148.  https://doi.org/10.1145/2740908.2743971 CrossRefGoogle Scholar
  78. Nardi BA (2010) My life as a night Elf priest: an anthropological account of world of warcraft. University of Michigan Press, Ann ArborGoogle Scholar
  79. Nhan J, Huey L, Broll R (2017) Digilantism: an analysis of crowdsourcing and the Boston Marathon bombings. Br J Criminol 57(2):341–361.  https://doi.org/10.1093/bjc/azv118 CrossRefGoogle Scholar
  80. Oh Y, Clark GR, Brunett AC (2017) Pokémon go players’ perceptions on twitter. Int J Humanit Soc Sci 9(1). https://ijhss.net/index.php/ijhss/article/view/246
  81. O’Hara K (2013a) Social machine politics are here to stay. IEEE Internet Comput 17(2):87–90.  https://doi.org/10.1109/MIC.2013.36 CrossRefGoogle Scholar
  82. O’Hara K (2018a) The contradictions of digital modernity, AI & Society.  https://doi.org/10.1007/s00146-018-0843-7
  83. O’Hara K, Contractor NS, Hall W, Hendler JA, Shadbolt N (2013) Web Science: understanding the emergence of macro-level features on the World Wide Web. Found Trends Web Sci 4(2–3):103–267CrossRefGoogle Scholar
  84. Okolloh O (2009) Ushahidi, or “testimony”: Web 2.0 tools for crowdsourcing crisis information. PLA 59(1):65–70Google Scholar
  85. Pagliari C, Vijaykumar S (2016) Digital Participatory Surveillance and the Zika crisis: opportunities and caveats. PLoS Negl Trop Dis 10(6).  https://doi.org/10.1371/journal.pntd.0004795 CrossRefGoogle Scholar
  86. Pariser E (2011) The filter bubble: what the internet is hiding from you. Penguin, New YorkGoogle Scholar
  87. Pickard G, Rahwan I, Pan W, Cebrian M, Crane R, Madan A, Pentland A (2011) Time-critical social mobilization. Science 334(6055):509–512.  https://doi.org/10.1126/science.1205869 CrossRefGoogle Scholar
  88. Planqué R, van den Berg JB, Franks NR (2010) Recruitment strategies and colony size in ants. PLoS One 5(8):e11664.  https://doi.org/10.1371/journal.pone.0011664 CrossRefGoogle Scholar
  89. Raddick MJ, Bracey G, Carney K, Gyuk G, Borne K, Wallin J, Jacoby S (2009) Citizen science: status and research directions for the coming decade, Astro2010: the astronomy and astrophysics decadal survey, Position papers, no. 46, http://www.academia.edu/download/30554144/raddick_citizen_science_epo.pdf
  90. Raddick MJ, Bracey G, Gay PL, Lintott CJ, Murray P, Schawinski K (2010) Galaxy Zoo: exploring the motivations of citizen science volunteers. Astron Educ Rev 9:010103.  https://doi.org/10.3847/AER2009036 CrossRefGoogle Scholar
  91. Rainie L, Wellman B (2012) Networked: the new social operating system. M.I.T. Press, Cambridge, MACrossRefGoogle Scholar
  92. Randall P (2018) Purposeful gaming: work as play, Ariadne, 74. http://www.ariadne.ac.uk/issue74/randall
  93. Reeves N, Tinati R, Zerr S, Van Kleek M, Simperl E (2017) From crowd to community: a survey of online community features in citizen science projects. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW ’17), pp. 2137–2152. doi: 10.1145/2998181.2998302Google Scholar
  94. Robertson D, Giunchiglia F (2013) Programming the social computer. Philos Trans R Soc A 371(1987):20120379.  https://doi.org/10.1098/rsta.2012.0379 MathSciNetCrossRefzbMATHGoogle Scholar
  95. Robertson D, Moreau L, Murray-Rust D, O’Hara K (2014) An open system for social computation. In: O’Hara K, Carolyn Nguyen M-H, Haynes PD (eds) Digital enlightenment yearbook 2014: social networks and social machines, surveillance and empowerment. IOS Press, Amsterdam, pp 235–252Google Scholar
  96. Rossow A (2017) Gotta catch ... a lawsuit? A legal insight into the intellectual, civil, and criminal battlefield Pokémon Go has downloaded onto smartphones and properties around the world. J Marshall Rev Intell Prop L 16(3):329–349. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2966799 Google Scholar
  97. Roy O (2017) Jihad and death: the global appeal of Islamic State. Hurst, LondonGoogle Scholar
  98. Salmon WC (1998) Causality and explanation. Oxford University Press, New YorkCrossRefGoogle Scholar
  99. Schell J (2014) The art of game design: a book of lenses, 2nd edn. CRC Press, Boca RatonCrossRefGoogle Scholar
  100. Seaborn K, Fels DI (2015) Gamification in theory and action: a survey. Int J Hum Comput Stud 74:14–31.  https://doi.org/10.1016/j.ijhcs.2014.09.006 CrossRefGoogle Scholar
  101. Shadbolt N, Smith DA, Simperl E, Van Kleek M, Yang Y, Hall W (2013) Towards a classification framework for social machines. In: Proceedings of the 22nd international conference on World Wide Web (WWW ’13). ACM, New York, pp 905–912.  https://doi.org/10.1145/2487788.2488078 CrossRefGoogle Scholar
  102. Shadbolt N, Van Kleek M, Binns R (2016) The rise of social machines: the development of a human/digital ecosystem. IEEE Consum Electr 5(2):106–111.  https://doi.org/10.1109/MCE.2016.2516179 CrossRefGoogle Scholar
  103. Simpson R, Page KR, De Roure D (2014) Zooniverse: observing the world’s largest citizen science platform. In: Proceedings of the 23rd International Conference on the World Wide Web. ACM, New York, pp 1049–1054.  https://doi.org/10.1145/2567948.2579215 CrossRefGoogle Scholar
  104. Smart P (2017) Mandevillian intelligence, Synthese.  https://doi.org/10.1007/s11229-017-1414-z CrossRefGoogle Scholar
  105. Smart P (2018) Knowledge machines. Knowl Eng Rev 33:e11.  https://doi.org/10.1017/S0269888918000139 CrossRefGoogle Scholar
  106. Smart P, Simperl E, Shadbolt N (2014) A taxonomic framework for social machines. In: Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (eds) Social collective intelligence: combining the powers of humans and machines to build a smarter society. Springer, Cham, pp 51–85.  https://doi.org/10.1007/978-3-319-08681-1_3 CrossRefGoogle Scholar
  107. Smith GJD, O’Malley P (2017) Driving politics: data-driven governance and resistance. Br J Criminol 57:275–298.  https://doi.org/10.1093/bjc/azw075 CrossRefGoogle Scholar
  108. Song X, Zhao S, Jiang X, Sun Y, Lyu C (2017) Pokémon Go and socialization: an analysis of Twitter network. Int J Innov Compr Scie Eng 4(4):1–5. http://dids.info/didslink/07.2017-53976726/ CrossRefGoogle Scholar
  109. Southan C, Sharman JL, Benson HE, Faccenda E, Pawson AJ, Alexander SPH, Buneman P, Davenport AP, McGrath JC, Peters JA, Spedding M, Catterall WA, Fabbro D, Davies JA (2016) The IUPHAR/BPS Guide to PHARMACOLOGY in 2016: towards curated quantitative interactions between 1300 protein targets and 6000 ligands. Nucleic Acids Res 44(D1):D1054–D1068.  https://doi.org/10.1093/nar/gkv1037 CrossRefGoogle Scholar
  110. Sprinks J, Wardlaw J, Houghton R, Bamford S, Morley J (2017) Task workflow design and its impact on performance and volunteers’ subjective preference in virtual citizen science. Int J Hum Comput Stud 104:50–63.  https://doi.org/10.1016/j.ijhcs.2017.03.003 CrossRefGoogle Scholar
  111. Steele RD (2012) The open-source everything manifesto: transparency, truth and trust. Evolver Editions, BerkeleyGoogle Scholar
  112. Stevens D, O’Hara K (2015) The devil’s long tail: religious and other radicals in the internet marketplace. Hurst, LondonGoogle Scholar
  113. Suh B, Convertino G, Ed HC, Pirolli P (2009) The singularity is not near: slowing growth of Wikipedia. In: Proceedings of the 5th International Symposium on Wikis and Open Collaboration (WikiSym’09). ACM, New York, p 8.  https://doi.org/10.1145/1641309.1641322 CrossRefGoogle Scholar
  114. Surowiecki J (2004) The wisdom of crowds: why the many are smarter than the few. Little, Brown, LondonGoogle Scholar
  115. Tarte S, De Roure D, Willcox P (2014) Working out the plot: the role of stories in social machines. In: Proceedings of the 23rd International Conference on the World Wide Web. ACM, New York, pp 909–914.  https://doi.org/10.1145/2567948.2578839 CrossRefGoogle Scholar
  116. Taylor L (2016) From zero to hero: how zero-rating became a debate about human rights. IEEE Internet Comput 20(4):79–83.  https://doi.org/10.1109/MIC.2016.88 CrossRefGoogle Scholar
  117. Thaler RH, Sunstein CR (2009) Nudge:improving decisions about health, wealth and happiness, revised and expanded edition. Penguin, New YorkGoogle Scholar
  118. Tinati R, Luczak-Roesch M (2017) Wikipedia: a complex social machine, ACM Sigweb Newsletter, Winter 2017, article 6.  https://doi.org/10.1145/3027141.3027147
  119. Tinati R, Carr L, Hall W, Bentwood J (2012) Identifying communicator roles in Twitter. In: Proceedings of the 21st International Conference on World Wide Web (WWW ’12). ACM, New York, pp 1161–1168.  https://doi.org/10.1145/2187980.2188256 CrossRefGoogle Scholar
  120. Tinati R, Carr L, Halford S, Pope C (2013) The HTP model: understanding the development of social machines. In: SOCM Workshop, WWW2013: 22nd International World Wide Web Conference.  https://doi.org/10.1145/2487788.2488081
  121. Tinati R, Luczak-Roesch M, Simperl E, Hall W (2016c) “Because science is awesome”: studying participation in a citizen science game. In: Proceedings of the 8th ACM Conference on Web Science (WebSci ’16). ACM, New York, pp 45–54.  https://doi.org/10.1145/2908131.2908151 CrossRefGoogle Scholar
  122. Torres-Soriano MR (2016) The Caliphate is not a tweet away: the social media experience of Al Qaeda in the Islamic Maghreb. Studies Conflict Terror 39(11):968–981.  https://doi.org/10.1080/1057610X.2016.1159430 CrossRefGoogle Scholar
  123. Van Kleek M, Smith DA, Hall W, Shadbolt N (2013) “The crowd keeps me in shape”: social psychology and the present and future of health social machines. In: Proceedings of the 22nd International Conference on World Wide Web (WWW ’13). ACM, New York, pp 927–932.  https://doi.org/10.1145/2487788.2488082 CrossRefGoogle Scholar
  124. Walker P (2013) Boston bombing identification attempts on social media end in farce. The Guardian. http://www.guardian.co.uk/world/2013/apr/19/boston-bombing-suspects-reddit-social-media. Accessed Apr 19 2013
  125. Weimann G (2006) Terror on the internet: the new arena, the new challenges. The United States Institute of Peace, WashingtonGoogle Scholar
  126. Weimann G (2015) Terrorism in cyberspace: the next generation. Columbia University Press, New YorkGoogle Scholar
  127. Winchester S (2003) The meaning of everything: the story of the Oxford english dictionary. Oxford University Press, OxfordGoogle Scholar
  128. Wooldridge M (2009) An introduction to multiagent systems, 2nd edn. John Wiley, ChichesterGoogle Scholar
  129. Zollers A (2007) Emerging motivations for tagging: expression, performance, and activism. In: World Wide Web Conference (WWW ’07). https://www2007.org/workshops/paper_55.pdf
  130. Zsila Á, Orosz G, Bőthe B, Tóth-Király I, Király O, Griffiths M, Demetrovics Z (2018) An empirical study on the motivations underlying augmented reality games: The case of Pokémon Go during and after Pokémon fever. Personal Individ Differ 133:56–66.  https://doi.org/10.1016/j.paid.2017.06.024 CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Nigel Shadbolt
    • 1
  • Kieron O’Hara
    • 2
  • David De Roure
    • 3
  • Wendy Hall
    • 2
  1. 1.Department of Computer ScienceUniversity of OxfordOxfordUK
  2. 2.Electronics and Computer ScienceUniversity of SouthamptonSouthamptonUK
  3. 3.Oxford eResearch CentreUniversity of OxfordOxfordUK

Personalised recommendations