Compromised Data : From Social Media to Big Data
By: Elmer, Greg.
Contributor(s): Langlois, Ganaele | Redden, Joanna.Material type: TextSeries: eBooks on Demand.Publisher: New York : Bloomsbury Publishing, 2015Description: 1 online resource (297 p.).ISBN: 9781501306525.Subject(s): Big data | Data mining -- Social aspects | Online social networks | Social mediaGenre/Form: Electronic books.Additional physical formats: Print version:: Compromised Data : From Social Media to Big DataDDC classification: 006.3 | 006.312 LOC classification: QA76.9 .D343 C4785 2015Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9 .D343 C4785 2015 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=2077089||Available||EBL2077089|
Title Page; Copyright Page; Contents; Notes on Contributors; Chapter 1 Introduction: Compromised Data-From Social Media to Big Data; The mineable social; Big social data and governance; Compromised data; Rebuilding the social; References; Part One: Data, Power, and Politics; Chapter 2 Big Data as System of Knowledge: Investigating Canadian Governance; Introduction; Method; Findings; Conclusion; References; Chapter 3 Data Mining Research and the Disintegration of Society: The "Project X" Haren Riots; Understanding the "Accidental" Haren riots
The mediated suppression of social despair and disintegrationThe rioters as technocratic "war machines"; Fatalities: The ghostly return of the humanist spirit; References; Chapter 4 Look at the Man Behind the Curtain: Computational Management in "Spontaneous" Citizen Political Campaigning; Introduction; Change.org to the rescue: Trayvon Martin and "GOTP" campaign techniques; MoveOn.org effect 2, electric boogaloo; We The People's neutral administrative logic; Comparative affordances; A week in the life of a distributed petition site; Stability; Signature growth; Additional trends
Conclusion: Divergent logics and escaping the warehouse metaphorReferences; Part Two: Data Limit(ed); Chapter 5 Easy Data, Hard Data: The Politics and Pragmatics of Twitter Research After the Computational Turn; The implications of the computational turn; Platform politics and regimes of access; The changing scientific affordances of twitter data; Conclusions; References; Chapter 6 Scraping the First Person; Scraper analytics; Screen and interface scraping; Crawler scraping-index and content; API scraping; Conclusions; References
Chapter 7 Openness Compromised? Questioning the Role of Openness in Digital Methods and Contemporary Critical PraxisIntroduction; Digital methods and the value of opening; Digital methods and the exploit; Opening up the black box of the Web: Web archiving and its praxis; The convenience of open data for the digital enclosure; Platform studies and me-centricity; Is openness still relevant?; References; Chapter 8 Critical Reverse Engineering: The Case of Twitter and TalkOpen; Introduction; Reverse engineering and the humanities; The pragmatic orientation; The genealogical orientation
The legal orientationThe normative orientation; Reverse engineering twitter: The case of TalkOpen; Pragmatic; Genealogical; Legal; Normative; What went wrong with TalkOpen?; Conclusion: Critical reverse engineering as a bridge between engineering and humanities; References; Part Three: Alt-Data; Chapter 9 Mapping Movements-Social Movement Research and Big Data: Critiques and Alternatives; Introduction; Big data and social movements; The ethics of social movement research; New biases in data collection and analysis; Mapping big data methodologies for social movement research?
Concluding thoughts and directions forward
There has been a data rush in the past decade brought about by online communication and, in particular, social media (Facebook, Twitter, Youtube, among others), which promises a new age of digital enlightenment. But social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. Compromised Data: From Social Media to Big Data explores how we perform critical research within a compromised social data framework. The expert, international
Description based upon print version of record.