Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries

被引:347
作者
Olteanu, Alexandra [1 ,2 ]
Castillo, Carlos [3 ]
Diaz, Fernando [2 ]
Kiciman, Emre [4 ]
机构
[1] Microsoft Res, New York, NY 10012 USA
[2] Microsoft Res, Montreal, PQ, Canada
[3] Univ Pompeu Fabra, Dept Informat & Commun Technol, Barcelona, Spain
[4] Microsoft Res, Redmond, WA USA
来源
FRONTIERS IN BIG DATA | 2019年 / 2卷
关键词
social media; user data; biases; evaluation; ethics; BIG DATA; RESPONSE BIAS; TWITTER; NETWORK; ONLINE; PRIVACY; MEDIA; CONTAGION; SITES; DISCIPLINES;
D O I
10.3389/fdata.2019.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social data in digital form-including user-generated content, expressed or implicit relations between people, and behavioral traces-are at the core of popular applications and platforms, driving the research agenda of many researchers. The promises of social data are many, including understanding "what the world thinks" about a social issue, brand, celebrity, or other entity, as well as enabling better decision-making in a variety of fields including public policy, healthcare, and economics. Many academics and practitioners have warned against the naive usage of social data. There are biases and inaccuracies occurring at the source of the data, but also introduced during processing. There are methodological limitations and pitfalls, as well as ethical boundaries and unexpected consequences that are often overlooked. This paper recognizes the rigor with which these issues are addressed by different researchers varies across a wide range. We identify a variety of menaces in the practices around social data use, and organize them in a framework that helps to identify them.
引用
收藏
页数:33
相关论文
共 350 条
[1]   You Tweet What You Eat: Studying Food Consumption Through Twitter [J].
Abbar, Sofiane ;
Mejova, Yelena ;
Weber, Ingmar .
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, :3197-3206
[2]   Dissecting a Social Botnet: Growth, Content and Influence in Twitter [J].
Abokhodair, Norah ;
Yoo, Daisy ;
McDonald, David W. .
PROCEEDINGS OF THE 2015 ACM INTERNATIONAL CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'15), 2015, :839-851
[3]   Privacy and rationality - A survey [J].
Acquisti, A ;
Grossklags, J .
PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, :15-29
[4]  
Almuhimedi H., 2013, CSCW 13, P897, DOI [10/gfzgsd, DOI 10.1145/2441776.2441878]
[5]  
American Anthropological Association, 2004, STAT ENTHN I REV BOA
[6]  
Amodei Dario, 2016, arXiv
[7]  
Anderson C., 2008, WIRED, DOI DOI 10.1180/MINMAG.2008.072.1.7
[8]  
Anderson Monica., 2015, MEN CATCH WOMEN OVER
[9]  
[Anonymous], 2014, NETWORKED EMPLOYMENT
[10]  
[Anonymous], 2010, Proceedings of the 2Nd International Workshop on Search and Mining User-generated Contents, SMUC'10