Advertisement

The Future(s) of Social Machines: The Research Agenda

  • Nigel Shadbolt
  • Kieron O’Hara
  • David De Roure
  • Wendy Hall
Chapter
Part of the Lecture Notes in Social Networks book series (LNSN)

Abstract

The final chapter looks to the future of social machines under the conditions of digital modernity, when they will have to coexist and even compete with technologies such as artificial intelligence. They will no doubt require or acquire new forms, new functions, new methods of study and new infrastructure. Examples are given of each of these four. The chapter considers cyber-physical social machines, where social machines exploit the new affordances of the Internet of Things, as a new form of social machine. As a new function of social machines, social knowledge machines are described, in which social groups emerge around technologies to create and curate data and knowledge resources. Topological data analysis is considered as a potential new research method into social machines. Finally, new initiatives to decentralise the Web, such as the Solid project, are reviewed as means for allowing social machine participants to retain a measure of control. Finally, the chapter reviews the requirements to enable participants to develop and maintain social machines of their own design.

Keywords

Actuators Artificial intelligence Cyber-physical social machines (CPSMs) Debugging (social machines) Digital modernity Finance, financial social machines Games, gaming Infrastructure Internet of Things Personal data stores Privacy Security Sensors Shadow institutions Smart cities Social knowledge machines Solid project Topological data analysis Web observatory Webmention 

References

  1. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376.  https://doi.org/10.1109/COMST.2015.2444095CrossRefGoogle Scholar
  2. Benkler Y, Nissenbaum H (2006) Commons based peer production and virtue. J Polit Philos 14(4):394–419.  https://doi.org/10.1111/j.1467-9760.2006.00235.xCrossRefGoogle Scholar
  3. Berners-Lee T (2018) One small step for the web … https://www.inrupt.com/blog/one-small-step-for-the-web
  4. Berners-Lee T, O’Hara K (2013) The read-write linked data web. Philos Trans A Math Phys Eng Sci 371(1987):20120513.  https://doi.org/10.1098/rsta.2012.0513MathSciNetCrossRefzbMATHGoogle Scholar
  5. Buneman P, Chapman A, Cheney J (2006) Provenance management in curated databases. In: Proceedings of the 2006 ACM SIGMOD international conference on management of data. ACM, New York, pp 539–550.  https://doi.org/10.1145/1142473.1142534CrossRefGoogle Scholar
  6. Buneman P, Cheney J, Tan W-C, Vansummeren S (2008) Curated databases. In: Proceedings of the 27th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS ’08). ACM, New York.  https://doi.org/10.1145/1376916.1376918CrossRefGoogle Scholar
  7. Callon M (2002) From science as an economic activity to socioeconomics of scientific research: the dynamics of emergent and consolidated techno-economic networks. In: Mirowski P, Sent E-M (eds) Science bought and sold: essays in the economics of science. University of Chicago Press, Chicago, pp 277–317Google Scholar
  8. Carlsson G (2009) Topology and data. Bull Am Math Soc 46:255–308.  https://doi.org/10.1090/S0273-0979-09-01249-XMathSciNetCrossRefzbMATHGoogle Scholar
  9. Chazal F, Michel B (2017) An introduction to Topological Data Analysis: fundamental and practical aspects for data scientists. https://arxiv.org/abs/1710.04019.
  10. Clément L, König D, Mehta V, Mueller R, Rangaswamy R, Rowley M, Trickovic I (2010) WS-BPEL extension for people (BPEL4People) specification version 1.1, OASIS. http://docs.oasis-open.org/bpel4people/bpel4people-1.1.html
  11. Corneli J (2016) An institutional approach to computational social creativity. In: Pachet F, Cardoso A, Corruble V, Ghedini F (eds) Proceedings of the seventh international conference on computational creativity. International Association for Computational Creativity, Paris, pp 131–138, http://www.computationalcreativity.net/iccc2016/wp-content/uploads/2016/08/Proceedings_ICCC16.pdf
  12. d’Inverno M, Luck M, Noriega P, Rodriguez-Aguilar JA, Sierra C (2012) Communicating open systems. Artif Intell 186:38–94.  https://doi.org/10.1016/j.artint.2012.03.004CrossRefGoogle Scholar
  13. De Roure D, Hendler JA, Huynh TD, James D, Moreau L, Nurmikko-Fuller T, Van Kleek M, Willcox P (2018) Pokémon Go! Through the lens of social machines, unpublished paperGoogle Scholar
  14. Ekbia HR, Nardi BA (2017) Heteromation: and other stories of computing and capitalism. MIT Press, Cambridge, MACrossRefGoogle Scholar
  15. Engelmann S, Grossklags J, Papakyriakopolous O (2018) A democracy called Facebook? Participation as a privacy strategy on social media, presented at the Annual Privacy Forum 2018. https://www.cybertrust.in.tum.de/fileadmin/w00bzf/www/papers/2018-APF-Engelmann.pdf
  16. Fuller S (2002) Knowledge management foundations. Butterworth-Heinemann, BostonGoogle Scholar
  17. García-Gavilanes R, Mollgaard A, Tsvetkova M, Yasseri T (2017) The memory remains: understanding collective memory in the digital age. Sci Adv 3(4):e1602368.  https://doi.org/10.1126/sciadv.1602368CrossRefGoogle Scholar
  18. George D, Lehrach W, Kansky K, Lázaro-Gredilla M, Laan C, Marthi B, Lou X, Meng Z, Liu Y, Wang H, Lavin A, Phoenix DS (2017) A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs. Science 358(6368):eaag2612.  https://doi.org/10.1126/science.aag2612CrossRefGoogle Scholar
  19. Girres J-F, Touya G (2010) Quality assessment of the French OpenStreetMap dataset. Trans GIS 14(4):435–459.  https://doi.org/10.1111/j.1467-9671.2010.01203.xCrossRefGoogle Scholar
  20. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener Comp Sys 29(7):1645–1660.  https://doi.org/10.1016/j.future.2013.01.010CrossRefGoogle Scholar
  21. Gyrard A, Patel P, Sheth A, Serrano M (2016) Building the Web of knowledge with smart IoT applications. IEEE Intell Syst 31(5):83–88.  https://doi.org/10.1109/MIS.2016.81CrossRefGoogle Scholar
  22. Haklay M (2010) How good is volunteered geographical information? A comparative study of OpenStreetMap and Ordnance Survey datasets. Environ Plann B Urban Analyt City Sci 37(4):682–703.  https://doi.org/10.1068/b35097CrossRefGoogle Scholar
  23. Kim H-W, Kankanhalli A (2009) Investigating user resistance to information systems implementation: a status quo bias perspective. MIS Q 33(3):567–582.  https://doi.org/10.2307/20650309CrossRefGoogle Scholar
  24. Kitcher P (1993) The advancement of science. Oxford University Press, New YorkGoogle Scholar
  25. von Konrat M, Campbell T, Carter B, Greif M, Bryson M, Larraín J, Trouille L, Cohen S, Gaus E, Qazi A, Ribbens E, Livshultz T, Walker TJ, Suwa T, Peterson T, Rodriguez Y, Vaughn C, Yang C, Aburahmeh S, Carstensen B, de Lange P, Delavoi C, Strauss K, Drag J, Aguero B, Snyder C, Martinec J, Smith A (2018) Using citizen science to bridge taxonomic discovery with education and outreach. Appl Plant Sci 6(2):e1023.  https://doi.org/10.1002/aps3.1023CrossRefGoogle Scholar
  26. Kosmala M, Wiggins A, Swanson A, Simmons B (2016) Assessing data quality in citizen science. Front Ecol Environ 14(10):551–560.  https://doi.org/10.1002/fee.1436CrossRefGoogle Scholar
  27. Lapointe L, Rivard S (2005) A multilevel model of resistance to information technology implementation. MIS Q 29(3):461–491.  https://doi.org/10.2307/25148692CrossRefGoogle Scholar
  28. Madaan N, Ahad MA, Sastry SM (2018) Data integration in IoT ecosystem: information linkage as a privacy threat. Comput Law Secur Rev 34(1):125–133.  https://doi.org/10.1016/j.clsr.2017.06.007CrossRefGoogle Scholar
  29. Madaan A, Nurse JRC, De Roure D, O’Hara K, Hall W, Creese S (2018a) A storm in an IoT cup: the emergence of cyber-physical social machines, SSRN. https://ssrn.com/abstract=3250383
  30. Madaan A, Wang X, Hall W, Tiropanis T (2018b) Observing data in IoT worlds: what and how to observe?’ in Living in the Internet of Things: Cybersecurity of the IoT.  https://doi.org/10.1049/cp.2018.0032
  31. Matsa KE, Shearer E (2018) News use across social media platforms 2018, Pew Research Center: Journalism and Media. http://www.journalism.org/2018/09/10/news-use-across-social-media-platforms-2018/
  32. Mi X, Qian F, Zhang Y, Wang XF (2017) An empirical characterization of IFTTT: ecosystem, usage, and performance. In: Proceedings of the 2017 Internet Measurement Conference (IMC ’17). ACM, New York, pp 398–404.  https://doi.org/10.1145/3131365.3131369CrossRefGoogle Scholar
  33. Mooney P, Corcoran P, Winstanley AC (2010). Towards quality metrics for OpenStreetMap. In: Proceedings of the 18th SIGSPATIAL international conference on advances in Geographic Information Systems (GIS ’10). pp. 514–517.  https://doi.org/10.1145/1869790.1869875
  34. Murray-Rust D, Robertson D (2014) LSCitter: building social machines by augmenting existing social networks with interaction models. In: Proceedings of the 23rd International Conference on the World Wide Web (WWW ’14 Companion). ACM, New York, pp 875–880.  https://doi.org/10.1145/2567948.2578832CrossRefGoogle Scholar
  35. Murray-Rust D, Papapanagiotou P, Robertson D (2015b) Softening electronic institutions to support natural interaction. Human Comput 2(2):155–188CrossRefGoogle Scholar
  36. Murray-Rust D, Tarte S, Hartswood M, Green O (2015d) On wayfaring in social machines. In: Proceedings of the 24th international conference on the World Wide Web (WWW ’15). ACM, New York, pp 1143–1148.  https://doi.org/10.1145/2740908.2743971CrossRefGoogle Scholar
  37. Murray-Rust D, Davoust A, Papapanagiotou P, Manataki A, Van Kleek M, Shadbolt N, Robertson D (2018) Towards executable representations of social machines. In: Chapman P, Stapleton G, Moktefi A, Perez-Kriz S, Bellucci F (eds) Diagrammatic representation and inference: 10th international conference, diagrams 2018. Springer, Cham, pp 765–769.  https://doi.org/10.1007/978-3-319-91376-6_77CrossRefGoogle Scholar
  38. Neis P, Zipf A (2012) Analyzing the contributor activity of a volunteered geographic information project—the case of OpenStreetMap. Int J Geo Inform 1(2):146–165.  https://doi.org/10.3390/ijgi1020146CrossRefGoogle Scholar
  39. Neis P, Zielstra D, Zipf A (2011) The street network evolution of crowdsourced maps: OpenStreetMap in Germany 2007–2011. Future Internet 4(1):1–21.  https://doi.org/10.3390/fi4010001CrossRefGoogle Scholar
  40. Nguyen D, McGillivray B, Yasseri T (2018) Emo, love and God: making sense of Urban Dictionary, a crowd-sourced online dictionary. R Soc Open Sci 5:172320.  https://doi.org/10.1098/rsos.172320CrossRefGoogle Scholar
  41. Nurse JRC, Erola A, Agrafiotis I, Goldsmith M, Creese S (2015) Smart insiders: exploring the threat from insiders using the internet-of-things. In: International Workshop on Secure Internet of Things (SIoT) at European Symposium on Research in Computer Security (ESORICS), IEEE, pp. 5–14.  https://doi.org/10.1109/SIOT.2015.10
  42. Nurse JRC, Creese S, De Roure D (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional 19(5):20–26.  https://doi.org/10.1109/MITP.2017.3680959CrossRefGoogle Scholar
  43. Nurse JRC, Radanliev P, Creese S, De Roure D (2018). If you can’t understand it, you can’t properly assess it! The reality of assessing security risks in Internet of Things systems. Presented at Living in the Internet of Things: Cybersecurity of the IoT—A PETRAS, IoTUK & IET Event.  https://doi.org/10.1049/cp.2018.0001
  44. O’Hara K (2014b) The fridge’s brain sure ain’t the icebox. IEEE Internet Comput 18(6):81–84.  https://doi.org/10.1109/MIC.2014.122CrossRefGoogle Scholar
  45. O’Hara K (2018a) The contradictions of digital modernity, AI & Society.  https://doi.org/10.1007/s00146-018-0843-7
  46. O’Hara K (2018b) Where shall we draw the line? Conservatism, privacy and digital modernity. Presented at the 2018 Amsterdam Privacy Conference. https://eprints.soton.ac.uk/425032/
  47. O’Hara K, Tuffield M, Shadbolt N (2008) Lifelogging: privacy and empowerment with memories for life. Ident Informat Soc 1(1):155–172.  https://doi.org/10.1007/s12394-009-0008-4CrossRefGoogle Scholar
  48. O’Hara K, Contractor NS, Hall W, Hendler JA, Shadbolt N (2013) Web Science: understanding the emergence of macro-level features on the World Wide Web. Found Trends Web Sci 4(2–3):103–267CrossRefGoogle Scholar
  49. O’Neil C, Schutt R (2014) Doing data science: straight talk from the frontline. O’Reilly Media, Sebastopol, CAGoogle Scholar
  50. Ostrom E (1990) Governing the commons: the evolution of institutions for collective action. Cambridge University Press, New YorkCrossRefGoogle Scholar
  51. Ovadia S (2014) Automate the Internet with “If This Then That” (IFTTT). Behav Soc Sci Libr 33(4):208–211.  https://doi.org/10.1080/01639269.2014.964593CrossRefGoogle Scholar
  52. Papapanagiotou P, Davoust A, Murray-Rust D, Manataki A, Van Kleek M, Shadbolt N, David Robertson (2018) Social machines for all, AAMAS 2018Google Scholar
  53. Parecki A (2017) Webmention, W3C recommendation. https://www.w3.org/TR/webmention/
  54. Parkinson B, Millard DE, O’Hara K, Giordano R (2017) The digitally extended self: a lexicological analysis of personal data. J Inf Sci 44(4).  https://doi.org/10.1177/0165551517706233CrossRefGoogle Scholar
  55. Pentland A (2008) Honest signals: how they shape our world. MIT Press, Cambridge, MACrossRefGoogle Scholar
  56. Polanyi M (1969) The republic of science: its political and economic theory. In: Knowing and being. University of Chicago Press, Chicago, pp 49–72Google Scholar
  57. Robertson D, Giunchiglia F (2013) Programming the social computer. Philos Trans R Soc A 371(1987):20120379.  https://doi.org/10.1098/rsta.2012.0379MathSciNetCrossRefzbMATHGoogle Scholar
  58. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266–2279.  https://doi.org/10.1016/j.comnet.2012.12.018CrossRefGoogle Scholar
  59. Sarkar C, Akshay Uttama Nambi SN, Venkatesha Prasad R, Rahim A (2014) A scalable distributed architecture towards unifying IoT applications. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp 508–513.  https://doi.org/10.1109/WF-IoT.2014.6803220CrossRefGoogle Scholar
  60. Schell J (2014) The art of game design: a book of lenses, 2nd edn. CRC Press, Boca RatonCrossRefGoogle Scholar
  61. Shadbolt N, Hampson R (2018) The digital ape: how to live (at peace) with smart machines. Scribe, LondonGoogle Scholar
  62. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146–164.  https://doi.org/10.1016/j.comnet.2014.11.008CrossRefGoogle Scholar
  63. Smart P, Madaan A, Hall W (2018) Where the smart things are: social machines and the Internet of Things. Phenom Cogn Sci.  https://doi.org/10.1007/s11097-018-9583-x
  64. Southan C, Sharman JL, Benson HE, Faccenda E, Pawson AJ, Alexander SPH, Buneman P, Davenport AP, McGrath JC, Peters JA, Spedding M, Catterall WA, Fabbro D, Davies JA (2016) The IUPHAR/BPS Guide to PHARMACOLOGY in 2016: towards curated quantitative interactions between 1300 protein targets and 6000 ligands. Nucleic Acids Res 44(D1):D1054–D1068.  https://doi.org/10.1093/nar/gkv1037CrossRefGoogle Scholar
  65. Speicher S, Arwe J, Malhotra A (2015) Linked data platform 1.0, W3C. https://www.w3.org/TR/ldp/
  66. Story H (2018) Epistemology in the cloud: fake news and digital sovereignty, In: Verborgh R, Kuhn T, Berners-Lee T (eds.), Proceedings of the 2nd workshop on decentralizing the semantic web, CEUR workshop proceedings. http://ceur-ws.org/Vol-2165/paper7.pdf
  67. Surbatovich M, Aljuraidan J, Bauer L, Das A, Jia L (2017) Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT recipes. In: Proceedings of the 26th International Conference on World Wide Web (WWW ’17). International World Wide Web Conferences Steering Committee, Geneva, pp 1501–1510.  https://doi.org/10.1145/3038912.3052709CrossRefGoogle Scholar
  68. Tinati R, Madaan A, Hall W (2017b) The role of crowdsourcing in the emerging Internet-Of-Things. In: Proceedings of the 26th International Conference on World Wide Web (WWW ’17). International World Wide Web Conferences Steering Committee, Geneva, pp 1669–1672.  https://doi.org/10.1145/3041021.3051693CrossRefGoogle Scholar
  69. Turner S (2002) Scientists as agents. In: Mirowski P, Sent E-M (eds) Science bought and sold: essays in the economics of science. University of Chicago Press, Chicago, pp 362–384Google Scholar
  70. Ur B, Ho MPY, Brawner S, Lee J, Mennicken S, Picard N, Schulze D, Littman ML (2016) Trigger-action programming in the wild: an analysis of 200,000 IFTTT recipes. In: Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, New York, pp 3227–3231.  https://doi.org/10.1145/2858036.2858556CrossRefGoogle Scholar
  71. Van Kleek M, O’Hara K (2014) The future of social is personal: the potential of the Personal Data Store. In: Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (eds) Social collective intelligence: combining the powers of humans and machines to build a smarter society. Springer, Cham, pp 125–158.  https://doi.org/10.1007/978-3-319-08681-1_7CrossRefGoogle Scholar
  72. Whitmore A, Agarwal A, Da Xu L (2015) The Internet of Things: a survey of topics and trends. Inf Syst Front 17(2):261–274.  https://doi.org/10.1007/s10796-014-9489-2CrossRefGoogle Scholar
  73. Williams M, Nurse JRC, Creese S (2018) Privacy is the boring bit: user perceptions and behaviour in the Internet-of-Things. https://arxiv.org/abs/1807.05761v1
  74. Woolley SC, Howard PN (2017) Computational propaganda worldwide. Oxford Internet Institute, Oxford, p 11. http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Casestudies-ExecutiveSummary.pdfGoogle Scholar
  75. Yasseri T, Kertész J (2013) Value production in a collaborative environment: sociophysical studies of Wikipedia. J Stat Phys 151(3-4):414–439.  https://doi.org/10.1007/s10955-013-0728-6MathSciNetCrossRefGoogle Scholar
  76. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of Things for smart cities. IEEE Internet Things 1(1):22–32.  https://doi.org/10.1109/JIOT.2014.2306328CrossRefGoogle Scholar
  77. Ziegeldorf JH, Morchon OG, Wehrle K (2014) Privacy in the Internet of Things: threats and challenges. Secur Commun Netw 7(12):2728–2742.  https://doi.org/10.1002/sec.795CrossRefGoogle Scholar
  78. Zittrain J (2008) The future of the internet: and how to stop it. Yale University Press, New HavenGoogle Scholar
  79. Zuboff S (2018) The age of surveillance capitalism: the fight for the future at the new frontier of power. Campus Verlag, BerlinGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Nigel Shadbolt
    • 1
  • Kieron O’Hara
    • 2
  • David De Roure
    • 3
  • Wendy Hall
    • 2
  1. 1.Department of Computer ScienceUniversity of OxfordOxfordUK
  2. 2.Electronics and Computer ScienceUniversity of SouthamptonSouthamptonUK
  3. 3.Oxford eResearch CentreUniversity of OxfordOxfordUK

Personalised recommendations