background preloader

US Military Scientists Solve the Fundamental Problem of Viral Marketing

US Military Scientists Solve the Fundamental Problem of Viral Marketing
Viral messages begin life by infecting a few individuals and then start to spread across a network. The most infectious end up contaminating more or less everybody. Just how and why this happens is the subject of much study and debate. Network scientists know that key factors are the rate at which people become infected, the “connectedness” of the network and how the seed group of individuals, who first become infected, are linked to the rest. It is this seed group that fascinates everybody from marketers wanting to sell Viagra to epidemiologists wanting to study the spread of HIV. So a way of finding seed groups in a given social network would surely be a useful trick, not to mention a valuable one. These guys have found a way to identify a seed group that, when infected, can spread a message across an entire network. Their method is relatively straightforward. This process finishes when there is nobody left in the network who has more friends than the threshold. Expect to hear more! Related:  Network ScienceSocial Networks: Generic Reading Material

New research to uncover nuances of networks Feb. 20, 2013 9:01 a.m. When a species disappears from a region, the rest of the ecosystem may flourish or collapse, depending on the role that species played. When a storm rolls across the coast, the power grid might reconfigure itself quickly or leave cities dark for days. A snowstorm might mean business as usual in a hardy city and a severe food shortage in another, depending on the distribution strategies of residents. Each of these systems is a kind of network, with thousands of members and relationships linking them. With current network theory, scientists can predict a few simple trends, such as which web pages are likely to get more hits over time. A new four-year, $2.9 million grant from the Defense Advanced Research Projects Agency is supporting SFI research that will, the researchers hope, propel their understanding of networks to the next level. Nodes and links in real networks are cloaked in details, he says. They have already made progress.

“Spreadable Media” by Henry Jenkins. The social value of content sharing. Articles “Spreadable Media” by Henry Jenkins. The social value of content sharing Articles Essays New Media Open Culture Spreadable Media is the latest book by Henry Jenkins, professor at the University of South California and participatory culture theorist, written together with two digital strategists Sam Ford and Joshua Green. The book cover is, for once, very communicative and immediately explains the content: a series of taraxacum officinalis (lion’s tooth or dandelion) with moving spores. Viral marketing and Web 2.0 dominant idea that it is enough to create a “viral” campaign, or to produce a “meme” that function and will automatically replicate like a virus. In the idea of media as virus there is a subtle vision of the users like consumers who are passively contaminated and can do nothing but transmit the virus to their neighbours. Before spreading any content people must face several decisions: Is it worth sharing this content?

The Beginner's Guide to Tumblr Tumblr is a micro-blogging platform that churns out millions of posts on a daily basis. There are currently 108.6 million blogs on Tumblr, which might seem intimidating to anyone not already using it. Tumblr could be useful to you for many reasons, depending on what you're looking to get out of it, for example, inspiration, scrapbooking, communication or a portfolio. The site is a mix of bloggers, brands and tastemakers. Depending on how you want to utilize the platform, this guide will help you move from a Tumblr novice to power blogger. 1. Tumblr registration is simple: You only need an email address, password and username. With Tumblr, you can change your URL later, so if you absolutely hate it down the road, that can be fixed — but keep in mind that change will affect SEO. Be sure to upload a default image, too, to complete your profile. 2. Once you have an account, there are a number of following options, depending on how you want to utilize the site. 3. 4. 5. 6. 7.

How the cops watch your tweets in real-time Recent leaks about the NSA's Internet spy programs have sparked renewed interest in government surveillance, though the leaks touch largely on a single form of such surveillance—the covert one. But so-called "open source intelligence" (OSINT) is also big business— and not just at the national/international level. New tools now mine everything from "the deep Web" to Facebook posts to tweets so that cops and corporations can see what locals are saying. Due to the sheer scale of social media posts, many tools don't even aim at providing a complete picture. Others do. For instance, consider BlueJay, the "Law Enforcement Twitter Crime Scanner," which provides real-time, geo-fenced access to every single public tweet so that local police can keep tabs on #gunfire, #meth, and #protest (yes, those are real examples) in their communities. A look at the BlueJay interface shows it to be a fairly basic tool, but one that gets its power from full access to the Twitter "firehose" of all tweets.

How to Burst the "Filter Bubble" that Protects Us from Opposing Views The term “filter bubble” entered the public domain back in 2011when the internet activist Eli Pariser coined it to refer to the way recommendation engines shield people from certain aspects of the real world. Pariser used the example of two people who googled the term “BP”. One received links to investment news about BP while the other received links to the Deepwater Horizon oil spill, presumably as a result of some recommendation algorithm. This is an insidious problem. Much social research shows that people prefer to receive information that they agree with instead of information that challenges their beliefs. This is the filter bubble—being surrounded only by people you like and content that you agree with. And the danger is that it can polarise populations creating potentially harmful divisions in society. The result is that individuals are exposed to a much wider range of opinions, ideas and people than they would otherwise experience. It’s certainly a start.

The Influence Landscape: The Evolving Power of Shapers & Influencers Type the word “influence” into Google and it returns 142 million results. What is going on? The last two decades have seen major changes in the world which have reshaped the influence landscape – with power shifting away from position and traditional measures of status towards a much more fluid, fickle and democratic power structure. Today it is about the power of “me” and “we” more than the power of “they.” In this article we explore the emerging influence landscape and some of its potential implications. Influence is Power Essentially influence is about power, the ability to shift the actions, attitudes and behaviors of others, to be a compelling force leading the way towards a goal, an aspiration or a way of living or working. Even as recently as twenty or thirty years ago, the people with influence were relatively easy to spot: the President or Prime Minister of a nation, religious leaders, CEOs, and probably your parents. The Emancipation of Influence The Influence Landscape

Instagram And Snapchat Becoming More Popular Among Kids, Facebook Considered Less 'Cool' WASHINGTON — After Friendster came MySpace. By the time Facebook dominated social media, parents had joined the party, too. But the online scene has changed - dramatically, as it turns out - and these days even if you're friends with your own kids on Facebook, it doesn't mean you know what they're doing. Thousands of software programs now offer cool new ways to chat and swap pictures. The most popular apps turn a hum-drum snapshot into artistic photography or broadcast your location to friends in case they want to meet you. Kids who use them don't need a credit card or even a cellphone, just an Internet connection and device such as an iPod Touch or Kindle Fire. Parents who want to keep up with the curve should stop thinking in terms of imposing time limits or banning social media services, which are stopgap measures. Educators say they have seen kids using their mobile devices to circulate videos of school drug searches to students sending nude images to girlfriends or boyfriends. Rep.

Vous resterez célibataire en allant sur les sites de rencontre Vous venez de vous faire larguer et ça y est, on vous a convaincu(e) de vous en remettre aux supers algorithmes des sites de rencontre, que Business Insider tente de décrypter, espérant qu’ils vous trouveront LA bonne personne, celle avec qui vous allez finir votre vie. Pas de bol, il semblerait que ce ne soit pas la bonne stratégie explique le site Kernelmag: publicité «Ces sites ne sont que des intermédiaires. Adieu les beaux discours pseudo-scientifiques ou alors demandez à voir le résultat de leurs études d’efficacité, ce qu’ils ne feront jamais pour «ne pas avoir à expliquer ce qu’ils traficotent en coulisses». La théorie est simple: ces sites contribuent à votre célibat. Pour l’illustrer, Kernelmag reprend l’étude de la confiture, menée par un professeur de l’université de Columbia et présentée dans le New York Times en 2010. 60% des clients étaient attirés par l’assortiment le plus important contre 40% pour la plus petite sélection. À lire aussi sur Slate.fr

Related: