Abstract
This opening chapter introduces the idea of social machines. The metaphor of a machine is introduced, and it is explained how it applies to social groups connected through digitally networked technologies, ubiquitous devices and large quantities of data. Social machines enable mechanistic explanations of social phenomena, without the reductionist claim that these social groups are determined by the technology. Building blocks of the social machines concept are enumerated and described, including heterogeneous human-computer networks, social computing, communication, platforms and communities, ecosystems of social machines, dynamics of networks and various ethical concepts. Examples of social machines are introduced, including Wikipedia, citizen science social machines such as Zooniverse and Eyewire, healthcare social machines and Pokémon Go! After considering ways of classifying social machines, and contrasting social machines with similar concepts such as crowdsourcing and social computing, it is argued that producing a definition of social machines would be counterproductive, such is the fluidity of the concept and its social and technical contexts. Instead, the book will consider how technologically enabled social groups can be studied through a social machine lens.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Thanks to Ian Brown for discovering this reference.
- 2.
Thanks to Peter Buneman for this idea; we draw upon his unpublished work in this section, and also in Chapter 2.
- 3.
Thanks to Susan Halford for this quote.
References
Abrams P (1968) The origins of British sociology 1834–1914. University of Chicago Press, Chicago
von Ahn L (2006) Games with a purpose. Computer 39(6):92–94. https://doi.org/10.1109/MC.2006.196
von Ahn L, Maurer B, McMillen C, Abraham D, Blum M (2008) reCAPTCHA: human-based character recognition via Web security measures. Science 321:1465–1468. https://doi.org/10.1126/science.1160379
Aly A (2017) Brothers, believers, brave mujahideen: focusing attention on the audience of violent jihadist preachers. Stud Conf Terrorism 40(1):62–76. https://doi.org/10.1080/1057610X.2016.1157407
Appiah KA (2005) Ethics of identity. Princeton University Press, Princeton
Baier AC (1994) Trust and anti-trust. In: Moral prejudices: essays on ethics. Harvard University Press, Cambridge, MA, pp 95–129
Bederson BB, Quinn AJ (2011) Web workers unite! Addressing challenges of online laborers. In: CHI ’11 extended abstracts on human factors in computing systems. ACM, New York, pp 97–106. https://doi.org/10.1145/1979742.1979606
Berners-Lee T, Fischetti T (1999) Weaving the web: the original design and ultimate destiny of the world wide web. HarperCollins, New York
Berners-Lee T, O’Hara K (2013) The read-write linked data web. Philos Trans A Math Phys Eng Sci 371(1987):20120513. https://doi.org/10.1098/rsta.2012.0513
Buneman P, Khanna S, Tan W-C (2002) On propagation of deletions and annotations through views. In: Proceedings of the Twenty-First ACM SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems (PODS ’02). ACM, New York, pp 150–158. https://doi.org/10.1145/543613.543633
Buneman P, Kostylev EV, Vansummeren S (2013) Annotations are relative. In: Proceedings of the 16th International Conference on Database Theory (ICDT ’13). ACM, New York, pp 177–188. https://doi.org/10.1145/2448496.2448518
Buneman P, Gascón A, Murray-Rust D (2016b) Composition and substitution in provenance and workflows. In: Proceedings of the 8th USENIX workshop on the Theory and Practice of Provenance (TaPP ’16). https://www.usenix.org/conference/tapp16/workshop-program/presentation/buneman
Buntain C, Golbeck J, Liu B, LaFree G (2016) Evaluating public response to the Boston Marathon bombing and other acts of terrorism through Twitter. In: Tenth international AAAI conference on web and social media. https://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/viewPaper/13038
Callison-Burch C (2014) Crowd-workers: aggregating information across turkers to help them find higher paying work. In: Human computation and crowdsourcing: works in progress and demonstration abstracts: an adjunct to the proceedings of the second AAAI conference on human computation and crowdsourcing. https://www.aaai.org/ocs/index.php/HCOMP/HCOMP14/paper/viewFile/9067/8983
Castronova E (2005) Synthetic worlds: the business and culture of online games. University of Chicago Press, Chicago
Cebrian M, Rahwan I, Pentland A (2016) Beyond viral. Commun ACM 59(4):36–39. https://doi.org/10.1145/2818992
Chesborough H (2003) Open innovation: the new imperative for creating and profiting from technology. Harvard Business School Publishing, Cambridge, MA
Colley A, Thebault-Spieker J, Lin AY, Degraen D, Fischman B, Häkkilä J, Kuehl K, Nisi V, Nunes NJ, Wenig N, Wenig D, Hecht B, Schöning J (2017) The geography of Pokémon Go: beneficial and problematic effects on places and movement. In: Proceedings of the 2017 CHI conference on human factors in computing systems (CHI ’17). ACM, New York, pp 1179–1192. https://doi.org/10.1145/3025453.3025495
Conway M (2017) Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research. Stud Confl Terrorism 40(1):77–98. https://doi.org/10.1080/1057610X.2016.1157408
Corneli J, Martin U, Murray-Rust D, Pease A (2017a) Towards mathematical AI via a model of the content and process of mathematical question and answer dialogues. In: Geuvers H, England M, Hasan O, Rabe F, Teschke O (eds) Proceedings of the 10th international Conference on Intelligent Computer Mathematics: CICM 2017. Springer, Cham, pp 132–146. https://doi.org/10.1007/978-3-319-62075-6_10
Corneli J, Martin U, Murray-Rust D, Pease A, Puzio R, Nesin GR (2017b) Modelling the way mathematics is actually done. In: Proceedings of the 5th ACM SIGPLAN international workshop on Functional Art, Music, Modeling, and Design (FARM 2017). ACM, New York, pp 10–19. https://doi.org/10.1145/3122938.3122942
Coulouris G, Dollimore J, Kindberg T, Blair G (2012) Distributed systems: concepts and design, 5th edn. Addison-Wesley, Boston
Craver CF (2007) Explaining the brain: mechanisms and the mosaic unity of neuroscience. Oxford University Press, Oxford
Dash RK, Jennings NR, Parkes DC (2003) Computational-mechanism design: a call to arms. IEEE Intell Syst 18(6):40–47. https://doi.org/10.1109/MIS.2003.1249168
De Roure D, Hooper C, Meredith-Lobay M, Page K, Tarte S, Cruickshank D, De Roure C (2013) Observing social machines part 1: what to observe? In: Proceedings of the 22nd international conference on World Wide Web (WWW ’13). ACM, New York, pp 901–904. https://doi.org/10.1145/2487788.2488077
De Roure D, Hooper C, Page K, Tarte S, Willcox P (2015) Observing social machines part 2: how to observe? Proceedings of the ACM web science conference, Article No. 13. http://dl.acm.org/citation.cfm?doid=2786451.2786475
De Roure D, Hendler JA, Huynh TD, James D, Moreau L, Nurmikko-Fuller T, Van Kleek M, Willcox P (2018) Pokémon Go! Through the lens of social machines, unpublished paper
Deleuze G, Guattari F (1977) Anti-oedipus: capitalism and schizophrenia. Viking Penguin, New York
Dowell RD, Jokerst RM, Day A, Eddy SR, Stein L (2001) The distributed annotation system. BMC Bioinform 2(1):7. https://doi.org/10.1186/1471-2105-2-7
Ekbia HR, Nardi BA (2017) Heteromation: and other stories of computing and capitalism. MIT Press, Cambridge, MA
Engelmann S, Grossklags J, Papakyriakopolous O (2018) A democracy called Facebook? Participation as a privacy strategy on social media, presented at the Annual Privacy Forum 2018. https://www.cybertrust.in.tum.de/fileadmin/w00bzf/www/papers/2018-APF-Engelmann.pdf
Eysenbach G (2009) Infodemiology and infoveillance: framework for an emerging set of public health informatics methods to analyze search, communication and publication behavior on the Internet. J Med Internet Res 11(1):e11. https://doi.org/10.2196/jmir.1157
Feller J, Fitzgerald B, Hissam S, Lakhani KR (eds) (2005) Perspectives on free and open source software. MIT Press, Cambridge
Finke R, Stark R (1992) The Churching of America: winners and losers in our religious economy. Rutgers University Press, New Brunswick
Gaines BR, Shaw MLG (2012) Computer-aided constructivism. In: Caputi P, Viney LL, Walker BM, Crittenden N (eds) Personal construct methodology. John Wiley & Sons, Chichester, pp 183–22
Gowers T (2009) Is massively collaborative mathematics possible? Gowers’s Weblog. https://gowers.wordpress.com/2009/01/27/is-massively-collaborative-mathematics-possible/
Green TJ, Karvounarakis G, Tannen V (2007) Provenance semirings. In: Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS ’02). ACM, New York, pp 31–40. https://doi.org/10.1145/1265530.1265535
Halfaker A, Geiger RS, Morgan JT, Riedl J (2013) The rise and decline of an open collaboration system: how Wikipedia’s reaction to popularity is causing its decline. Am Behav Sci 57(5):664–688. https://doi.org/10.1177/0002764212469365
Haythornthwaite C (2009) Crowds and communities: light and heavyweight models of peer production. In: Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS ’09). https://doi.org/10.1109/HICSS.2009.137
Hendler J, Berners-Lee T (2010) From the semantic web to social machines: a research challenge for AI on the World Wide Web. Artif Intell 174(2):156–161. https://doi.org/10.1016/j.artint.2009.11.010
Hendler J, Mulvehill AJ (2016) Social machines: the coming collision of artificial intelligence, social networking, and humanity. Apress, New York
Hofstadter DR (1979) Gödel, Escher, Bach: an Eternal Golden Braid. Basic Books, New York, NY
Howe J (2006) Crowdsourcing: a definition. http://www.crowdsourcing.com/cs/2006/06/crowdsourcing_a.html
Huey L, Witmer E (2016) #IS_Fangirl: exploring a new role for women in terrorism. J Terror Res 7(1):1–10. https://doi.org/10.15664/jtr.1211
Irani LC, Six Silberman M (2013) Turkopticon: interrupting worker invisibility in Amazon Mechanical Turk. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). ACM, New York, pp 611–620. https://doi.org/10.1145/2470654.2470742
Jullien N, Crowston K, Ortega F (2015) The rise and fall of an online project: is bureaucracy killing efficiency in open knowledge production? In: Proceedings of the 11th International Symposium on Open Collaboration (OpenSym ’15). ACM, New York, p 13. https://doi.org/10.1145/2788993.2789844
Kamps J, Koolen M (2009) Is Wikipedia link structure different? In: Proceedings of the second ACM international conference on Web Search and Data Mining (WSDM ’09). ACM, New York, NY, pp 232–241. https://doi.org/10.1145/1498759.1498831
Kelly GA (1955) A theory of personality: the psychology of personal constructs. W.W. Norton, New York
Kittur A, Kraut RE (2008) Harnessing the wisdom of crowds in Wikipedia: quality through coordination. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW ’08). ACM, New York, pp 37–46. https://doi.org/10.1145/1460563.1460572
Kittur A, Suh B, Pendleton BA, Chi EH (2007b) He says, she says: conflict and coordination in Wikipedia. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’07). ACM, New York, pp 453–462. https://doi.org/10.1145/1240624.1240698
Klausen J (2015) Tweeting the jihad: social media networks of Western foreign fighters in Syria and Iraq. Stud Conflict Terrorism 38(1):1–22. https://doi.org/10.1080/1057610X.2014.974948
Kleinberg J (2003) Bursty and hierarchical structure in streams. Data Min Knowl Disc 7(4):373–397. https://doi.org/10.1023/A:1024940629314
Kleinberg J, Raghavan P (2005) Query incentive networks. In: Proceedings of the 46th annual IEEE symposium of Foundations of Computer Science (FOCS’05), Pittsburgh, pp. 132–141. https://doi.org/10.1109/SFCS.2005.63
Kuznetsov S (2006) Motivations of contributors to Wikipedia. ACM SIGCAS Comput Soc 36(2):1. https://doi.org/10.1145/1215942.1215943
Lakhani KR, Wolf R (2005) Why hackers do what they do: understanding motivation and effort in free/open source software projects. In: Feller J, Fitzgerald B, Hissam S, Lakhani KR (eds) Perspectives on free and open source software. MIT Press, Cambridge, MA, pp 3–22
Latour B (2005) Reassembling the social: an introduction to actor-network-theory. Oxford University Press, Oxford
Law E, von Ahn L (2011) Human computation. Morgan & Claypool, San Rafael, CA
Lévy P (1997) Collective intelligence: mankind’s emerging world in cyberspace. Perseus Books, Cambridge, MA
Liao H-T (2008) Conflictual consensus in the Chinese version of Wikipedia. In: IEEE International Symposium on Technology and Society (ISTAS 2008). https://doi.org/10.1109/ISTAS.2008.4559775
Lintott CJ, Schawinski K, Slosar A, Land K, Bamford S, Thomas D, Raddick MJ, Nichol RC, Szalay A, Andreescu D, Murray P, Vandenberg J (2008) Galaxy Zoo: morphologies derived from visual inspection of galaxies from the Sloan Digital Sky Survey. Mon Not R Astron Soc 389(3):1179–1189. https://doi.org/10.1111/j.1365-2966.2008.13689.x
Luczak-Roesch M, Tinati R (2016) The social in the platform trap: why a microscopic system focus limits the prospect of social machines. Discover Soc 34:1–6
Luczak-Roesch M, Tinati R, Shadbolt N (2015b) When resources collide: towards a theory of coincidence in information spaces. In: Proceedings of the 24th international conference on World Wide Web. ACM, New York, pp 1137–1142. https://doi.org/10.1145/2740908.2743973
Luczak-Roesch M, O’Hara K, Dinneen JD, Tinati R (2018) What an entangled Web we weave: an information-centric approach to time-evolving socio-technical systems. Mind Machine. https://doi.org/10.1007/s11023-018-9478-1
Lüge T (2015) GIS Support for the MSF Ebola Response in Liberia, Guinea and Sierra Leone. Médecins Sans Frontières, Geneva. https://reliefweb.int/sites/reliefweb.int/files/resources/GIS%20Support%20Ebola%202015_EN.pdf
Madaan A, Nurse JRC, De Roure D, O’Hara K, Hall W, Creese S (2018a) A storm in an IoT cup: the emergence of cyber-physical social machines, SSRN. https://ssrn.com/abstract=3250383
Mailer N (1968) Armies of the night. Putnam, New York
Malone TW, Bernstein MS (eds) (2015) Handbook of collective intelligence. MIT Press, Cambridge, MA
Malthaner S, Waldmann P (2014) The radical milieu: conceptualizing the supportive social environment of terrorist groups. Stud Conf Terrorism 37(12):979–998. https://doi.org/10.1080/1057610X.2014.962441
Marks AP (1989) The Sinclair C5—an investigation into its development, launch, and subsequent failure. Eur J Mark 23(1):61–71. https://doi.org/10.1108/EUM0000000000542
Martin D, Hanrahan BV, O’Neill J, Gupta N (2014) Being a Turker. In: Proceedings of the 17th ACM conference on Computer Supported Cooperative Work & Social Computing (CSCW ’14). ACM, New York, pp 224–235. https://doi.org/10.1145/2531602.2531663
Martins P, Miranda M, Benevenuto F, Almeida JM (2017) The emergence of crowdsourcing among Pokémon Go Players. http://arxiv.org/abs/1703.08365
Mattheiss E, Hochleitner C, Busch M, Orji R, Tscheligi M (2017) Deconstructing Pokémon Go—an empirical study on player personality characteristics. In: de Vries PW, Oinas-Kukkonen H, Siemons L, Jong N B-d, van Gemert-Pijnen L (eds) Persuasive technology: development and implementation of personalized technologies to change attitudes and behaviors. Springer, Cham, pp 83–94. https://doi.org/10.1007/978-3-319-55134-0_7
Maurer SM (2008) Open source drug discovery: finding a niche (or maybe several). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1114371
Meier P, Brodock K (2008) Crisis mapping Kenya’s election violence: comparing mainstream news, citizen journalism and Ushahidi, Harvard Humanitarian Initiative. https://irevolutions.org/2008/10/23/mapping-kenyas-election-violence/. Accessed Jun 2017
Morrow N, Mock N, Papendieck A, Kocmich N (2011) Independent evaluation of the Ushahidi Haiti project, development information systems international. http://ggs684.pbworks.com/w/file/fetch/60819963/1282.pdf
Murray-Rust D, Scekic O, Truong H-L, Robertson D, Dustdar S (2014a) A collaboration model for community-based software development with social machines. In: International conference on collaborative computing: networking, applications and worksharing (CollaborateCom), pp. 84–93, https://doi.org/10.4108/icst.collaboratecom.2014.257245
Murray-Rust D, Tarte S, Hartswood M, Green O (2015d) On wayfaring in social machines. In: Proceedings of the 24th international conference on the World Wide Web (WWW ’15). ACM, New York, pp 1143–1148. https://doi.org/10.1145/2740908.2743971
Nardi BA (2010) My life as a night Elf priest: an anthropological account of world of warcraft. University of Michigan Press, Ann Arbor
Nhan J, Huey L, Broll R (2017) Digilantism: an analysis of crowdsourcing and the Boston Marathon bombings. Br J Criminol 57(2):341–361. https://doi.org/10.1093/bjc/azv118
Oh Y, Clark GR, Brunett AC (2017) Pokémon go players’ perceptions on twitter. Int J Humanit Soc Sci 9(1). https://ijhss.net/index.php/ijhss/article/view/246
O’Hara K (2013a) Social machine politics are here to stay. IEEE Internet Comput 17(2):87–90. https://doi.org/10.1109/MIC.2013.36
O’Hara K (2018a) The contradictions of digital modernity, AI & Society. https://doi.org/10.1007/s00146-018-0843-7
O’Hara K, Contractor NS, Hall W, Hendler JA, Shadbolt N (2013) Web Science: understanding the emergence of macro-level features on the World Wide Web. Found Trends Web Sci 4(2–3):103–267
Okolloh O (2009) Ushahidi, or “testimony”: Web 2.0 tools for crowdsourcing crisis information. PLA 59(1):65–70
Pagliari C, Vijaykumar S (2016) Digital Participatory Surveillance and the Zika crisis: opportunities and caveats. PLoS Negl Trop Dis 10(6). https://doi.org/10.1371/journal.pntd.0004795
Pariser E (2011) The filter bubble: what the internet is hiding from you. Penguin, New York
Pickard G, Rahwan I, Pan W, Cebrian M, Crane R, Madan A, Pentland A (2011) Time-critical social mobilization. Science 334(6055):509–512. https://doi.org/10.1126/science.1205869
Planqué R, van den Berg JB, Franks NR (2010) Recruitment strategies and colony size in ants. PLoS One 5(8):e11664. https://doi.org/10.1371/journal.pone.0011664
Raddick MJ, Bracey G, Carney K, Gyuk G, Borne K, Wallin J, Jacoby S (2009) Citizen science: status and research directions for the coming decade, Astro2010: the astronomy and astrophysics decadal survey, Position papers, no. 46, http://www.academia.edu/download/30554144/raddick_citizen_science_epo.pdf
Raddick MJ, Bracey G, Gay PL, Lintott CJ, Murray P, Schawinski K (2010) Galaxy Zoo: exploring the motivations of citizen science volunteers. Astron Educ Rev 9:010103. https://doi.org/10.3847/AER2009036
Rainie L, Wellman B (2012) Networked: the new social operating system. M.I.T. Press, Cambridge, MA
Randall P (2018) Purposeful gaming: work as play, Ariadne, 74. http://www.ariadne.ac.uk/issue74/randall
Reeves N, Tinati R, Zerr S, Van Kleek M, Simperl E (2017) From crowd to community: a survey of online community features in citizen science projects. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW ’17), pp. 2137–2152. doi: 10.1145/2998181.2998302
Robertson D, Giunchiglia F (2013) Programming the social computer. Philos Trans R Soc A 371(1987):20120379. https://doi.org/10.1098/rsta.2012.0379
Robertson D, Moreau L, Murray-Rust D, O’Hara K (2014) An open system for social computation. In: O’Hara K, Carolyn Nguyen M-H, Haynes PD (eds) Digital enlightenment yearbook 2014: social networks and social machines, surveillance and empowerment. IOS Press, Amsterdam, pp 235–252
Rossow A (2017) Gotta catch ... a lawsuit? A legal insight into the intellectual, civil, and criminal battlefield Pokémon Go has downloaded onto smartphones and properties around the world. J Marshall Rev Intell Prop L 16(3):329–349. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2966799
Roy O (2017) Jihad and death: the global appeal of Islamic State. Hurst, London
Salmon WC (1998) Causality and explanation. Oxford University Press, New York
Schell J (2014) The art of game design: a book of lenses, 2nd edn. CRC Press, Boca Raton
Seaborn K, Fels DI (2015) Gamification in theory and action: a survey. Int J Hum Comput Stud 74:14–31. https://doi.org/10.1016/j.ijhcs.2014.09.006
Shadbolt N, Smith DA, Simperl E, Van Kleek M, Yang Y, Hall W (2013) Towards a classification framework for social machines. In: Proceedings of the 22nd international conference on World Wide Web (WWW ’13). ACM, New York, pp 905–912. https://doi.org/10.1145/2487788.2488078
Shadbolt N, Van Kleek M, Binns R (2016) The rise of social machines: the development of a human/digital ecosystem. IEEE Consum Electr 5(2):106–111. https://doi.org/10.1109/MCE.2016.2516179
Simpson R, Page KR, De Roure D (2014) Zooniverse: observing the world’s largest citizen science platform. In: Proceedings of the 23rd International Conference on the World Wide Web. ACM, New York, pp 1049–1054. https://doi.org/10.1145/2567948.2579215
Smart P (2017) Mandevillian intelligence, Synthese. https://doi.org/10.1007/s11229-017-1414-z
Smart P (2018) Knowledge machines. Knowl Eng Rev 33:e11. https://doi.org/10.1017/S0269888918000139
Smart P, Simperl E, Shadbolt N (2014) A taxonomic framework for social machines. In: Miorandi D, Maltese V, Rovatsos M, Nijholt A, Stewart J (eds) Social collective intelligence: combining the powers of humans and machines to build a smarter society. Springer, Cham, pp 51–85. https://doi.org/10.1007/978-3-319-08681-1_3
Smith GJD, O’Malley P (2017) Driving politics: data-driven governance and resistance. Br J Criminol 57:275–298. https://doi.org/10.1093/bjc/azw075
Song X, Zhao S, Jiang X, Sun Y, Lyu C (2017) Pokémon Go and socialization: an analysis of Twitter network. Int J Innov Compr Scie Eng 4(4):1–5. http://dids.info/didslink/07.2017-53976726/
Southan C, Sharman JL, Benson HE, Faccenda E, Pawson AJ, Alexander SPH, Buneman P, Davenport AP, McGrath JC, Peters JA, Spedding M, Catterall WA, Fabbro D, Davies JA (2016) The IUPHAR/BPS Guide to PHARMACOLOGY in 2016: towards curated quantitative interactions between 1300 protein targets and 6000 ligands. Nucleic Acids Res 44(D1):D1054–D1068. https://doi.org/10.1093/nar/gkv1037
Sprinks J, Wardlaw J, Houghton R, Bamford S, Morley J (2017) Task workflow design and its impact on performance and volunteers’ subjective preference in virtual citizen science. Int J Hum Comput Stud 104:50–63. https://doi.org/10.1016/j.ijhcs.2017.03.003
Steele RD (2012) The open-source everything manifesto: transparency, truth and trust. Evolver Editions, Berkeley
Stevens D, O’Hara K (2015) The devil’s long tail: religious and other radicals in the internet marketplace. Hurst, London
Suh B, Convertino G, Ed HC, Pirolli P (2009) The singularity is not near: slowing growth of Wikipedia. In: Proceedings of the 5th International Symposium on Wikis and Open Collaboration (WikiSym’09). ACM, New York, p 8. https://doi.org/10.1145/1641309.1641322
Surowiecki J (2004) The wisdom of crowds: why the many are smarter than the few. Little, Brown, London
Tarte S, De Roure D, Willcox P (2014) Working out the plot: the role of stories in social machines. In: Proceedings of the 23rd International Conference on the World Wide Web. ACM, New York, pp 909–914. https://doi.org/10.1145/2567948.2578839
Taylor L (2016) From zero to hero: how zero-rating became a debate about human rights. IEEE Internet Comput 20(4):79–83. https://doi.org/10.1109/MIC.2016.88
Thaler RH, Sunstein CR (2009) Nudge:improving decisions about health, wealth and happiness, revised and expanded edition. Penguin, New York
Tinati R, Luczak-Roesch M (2017) Wikipedia: a complex social machine, ACM Sigweb Newsletter, Winter 2017, article 6. https://doi.org/10.1145/3027141.3027147
Tinati R, Carr L, Hall W, Bentwood J (2012) Identifying communicator roles in Twitter. In: Proceedings of the 21st International Conference on World Wide Web (WWW ’12). ACM, New York, pp 1161–1168. https://doi.org/10.1145/2187980.2188256
Tinati R, Carr L, Halford S, Pope C (2013) The HTP model: understanding the development of social machines. In: SOCM Workshop, WWW2013: 22nd International World Wide Web Conference. https://doi.org/10.1145/2487788.2488081
Tinati R, Luczak-Roesch M, Simperl E, Hall W (2016c) “Because science is awesome”: studying participation in a citizen science game. In: Proceedings of the 8th ACM Conference on Web Science (WebSci ’16). ACM, New York, pp 45–54. https://doi.org/10.1145/2908131.2908151
Torres-Soriano MR (2016) The Caliphate is not a tweet away: the social media experience of Al Qaeda in the Islamic Maghreb. Studies Conflict Terror 39(11):968–981. https://doi.org/10.1080/1057610X.2016.1159430
Van Kleek M, Smith DA, Hall W, Shadbolt N (2013) “The crowd keeps me in shape”: social psychology and the present and future of health social machines. In: Proceedings of the 22nd International Conference on World Wide Web (WWW ’13). ACM, New York, pp 927–932. https://doi.org/10.1145/2487788.2488082
Walker P (2013) Boston bombing identification attempts on social media end in farce. The Guardian. http://www.guardian.co.uk/world/2013/apr/19/boston-bombing-suspects-reddit-social-media. Accessed Apr 19 2013
Weimann G (2006) Terror on the internet: the new arena, the new challenges. The United States Institute of Peace, Washington
Weimann G (2015) Terrorism in cyberspace: the next generation. Columbia University Press, New York
Winchester S (2003) The meaning of everything: the story of the Oxford english dictionary. Oxford University Press, Oxford
Wooldridge M (2009) An introduction to multiagent systems, 2nd edn. John Wiley, Chichester
Zollers A (2007) Emerging motivations for tagging: expression, performance, and activism. In: World Wide Web Conference (WWW ’07). https://www2007.org/workshops/paper_55.pdf
Zsila Á, Orosz G, Bőthe B, Tóth-Király I, Király O, Griffiths M, Demetrovics Z (2018) An empirical study on the motivations underlying augmented reality games: The case of Pokémon Go during and after Pokémon fever. Personal Individ Differ 133:56–66. https://doi.org/10.1016/j.paid.2017.06.024
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shadbolt, N., O’Hara, K., De Roure, D., Hall, W. (2019). Characterising Social Machines. In: The Theory and Practice of Social Machines. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-10889-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-10889-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10888-5
Online ISBN: 978-3-030-10889-2
eBook Packages: Computer ScienceComputer Science (R0)