Analyzing Flash Mobs in Cybernetic Space and the Imminent Security...

advertisement
Sociotechnical Behavior Mining: From Data to Decisions? Papers from the 2015 AAAI Spring Symposium
Analyzing Flash Mobs in Cybernetic Space and the Imminent Security Threats
A Collective Action Based Theoretical Perspective on Emerging Sociotechnical Behaviors
Samer Al-khateeb and Nitin Agarwal
Department of Information Science
University of Arkansas at Little Rock
2801 S University Ave, Little Rock, AR 72204
Email: {sxalkhateeb, nxagarwal}@ualr.edu
walls and continuously search for new ways to challenge
the rules of gravity. Parkour history is more than hundred
years as Michael Atkinson states in his article “Parkour,
Anarcho-Environmentalism, and Poiesis” (Atkinson 2009).
This practice goes back to a style called Hebertism that
emerged at the beginning of the 20th century. The practice
contains variety of obstacles and landscapes usually in the
wooded setting “as an unfettered animal” (Mohilever 2012).
The first parkour was formed originally in Paris and since
then it emerged all over the world, from Canada and USA
to Russia and the Philippines. Due to a smaller number of
participants involved in the act, parkour has not lead to as
big security threats as flash mobs have. Also, parkour nature
was initiated as a postsport lifestyle and then it went through
a “sportization process” as Atkinson concludes. Sportization is the process by which subaltern or alternative forms
of sport, leisure and play are co-opted and incorporated into
conventional sports cultures (Atkinson 2009).
Flash mobs (FMs) is another form of public engagement
that is more commonly observed than parkour. Oxford English dictionary defines a flash mob as “A large public gathering at which people perform an unusual or seemingly random act and then quickly disperse” (Oxford-Dictionary July
8 2004). Recent observations pertaining to the deviant aspect of the flash mobs have insisted to add a highly debated
perspective, which is the nature of the flash mob (whether it
is for entertainment, satire, and artistic expression or is it a
deviant act that can lead to robberies and thefts i.e. criminal flash mobs). Flash mobs could be entertaining such
as, Happy Birthday for a bus driver (Kirkland December
21 2011) or they can be the new face of transnational crime
organizations (TCOs) that can pose significant risks to civil,
political, social, and economic stability (Ackerman and others 2013) such as, the Bash Mob that happened in Long
Beach, California on July 9, 2013 when over 100 individual who have been recruited using social media site participated in the Pike and City Place area and committed a series
of thefts, property damage, and assaults (Holbrook July 19
2013).
The new ways of communications such as the Internet,
social media, and the mobile phones are widely responsible for the increasingly common occurrences of these practices. The new communication media made the process of
recruiting and training a specific sector of the society (spe-
Abstract
Since the occurrence of the first ‘flash mob’ organized by Bill
Wasik (senior editor of the Harper’s Magazine) in Manhattan in 2003, flash mob phenomenon has become widespread.
Recent journalistic accounts have reported that this form of
public engagement can pose significant threats to civil, political, social, and economic stability of a region. Gaps in
the scientific understanding of such phenomenon and the imminent security risks posed by such acts call for a need to
systematically study them. In this ongoing research, we shed
light on the social dynamics of the flash mob phenomenon
and build a conceptual model examining the necessary factors for the formation of flash mob and predicting its success
or failure. Grounded in the sociological theories of collective
action and collective identity formation, we evaluate the motivations of a flash mob practitioner and logically analyze the
choices he/she would face with regards to acting or withdrawing from the flash mob. More broadly, this work is an attempt
to bridge social and computational sciences that would help
clarify and explain manifestations of emerging sociotechnical
behaviors such as parkour, campaigns, and social movements
that are widely observed.
1
Introduction
In the last decade and a half there has been an increasing
interest in the public participation-led guerrilla acts. Many
new forms of public engagement have been observed such
as: parkours, flash mobs, campaigns, and social movements
(see Figure 1). New technologies and the variety of affordable and easy to use means of communications (such as social network platforms, viral e-mails, and SMS) increased
the occurrences of such emerging sociotechnical behaviors
(Mohilever 2012). With the increase of such behaviors, there
is a need to systematically study such phenomena to be able
to assess the threats they could pose to human security. It
is important to know the motivations behind such acts, to
know the way they are formed, and to be able to predict
their outcome. Such studies could guide the development
of effective proactive measures and policies to eliminate the
security risks in cyberspace as well as physical spaces.
Parkour is the manifestation when traceurs (parkour practitioners) jump between distance rooftops, climb vertical
c 2015, Association for the Advancement of Artificial
Copyright Intelligence (www.aaai.org). All rights reserved.
2
(a)
(b)
(c)
(d)
Figure 1: Examples of different forms of public performance. (a) Palestinians Practicing Parkour in Gaza, (b) a Flash Mob
Dance in a Shopping Mall, (c) Saudi Arabian Women’s Right to Drive Campaign’s Bumper Sticker, and (d) The 2011 Arab
Spring Social Movement.
cific gender, age, political affiliation, interest, and cultural
background) easier than it was before.
In this ongoing research, we focus on the flash mob behavior that takes place in the cyberspace but could possibly extend to the physical space. Here, we explore the factors that lead to this phenomenon and develop a conceptual
model that is able to predict the occurrence and the outcome
of such phenomenon. We look at both cyber as well as physical spaces, or “Cybernetic Space”, because as Mitra and
Schwartz claimed that in order “to understand how the notion of space is transformed by new technologies we need
to move away from the rigid definitions of real and cyber
spaces, to a flexible and relative conception of cybernetic
space” (Mitra and others 2001). Cybernetic space helps analyze the system and the interaction between its different
elements as a “whole” (Mohilever 2012).
As stated earlier, flash mobs pose non-negligible concerns
for public safety and national security, which warrants a systematic study to advance our understanding of such emerging sociotechnical behavior. Therefore, in this study, we
seek answers to the following questions: What are the factors that motivate an individual to participate in a flash mob?
What are the choices an individual could possibly have regarding acting (or not) in a flash mob?, and Using the factors
identified in the previous questions, can we develop a conceptual framework that is capable of modeling the formation
and predicting the outcome of a flash mob, i.e., success or
failure? Toward this direction, the article makes the following contributions, identify the factors that motivate an individual to act in a flash mob, develop a conceptual framework
that can predict the success or failure of a flash mob, and logically analyze the choices an individual has in case of acting
(or not) in a flash mob.
This research is an attempt to shed light on the emerging
sociotechnical behaviors, the risks they pose to human security, and advance our understanding of such behaviors by
bridging social and computational sciences.
2
these laws should be evaluated under the Brandenburg test
(Steinblatt 2011).
Another research in this area focuses on the development
of flash mobs’ manifestations through the history. It also
shows the linkage of these manifestations with the new technologies and networking platforms and how these technologies influenced their formation, ideology, and diffusion (Mohilever 2012).
Flash mobs exhibit characteristics of complex social and
group dynamics and could be considered as manifestations
of collective actions. Various sociological theories such as
collective action (Coleman 1973), collective identity formation (Klandermans and others 2002) (Melucci 1996), and
collective decision (Coleman 1966) have been studied to explain complex social processes, such as social movements.
However, these theories have never been used to study or
model flash mobs, to the best of our knowledge. Understanding and modeling flash mobs is an important research
problem, which studies the factors that lead to this phenomenon and the factors that lead to its success or failure.
In the book by James S. Coleman entitled, “The mathematics of Collective Action” (Coleman 1973), Coleman
proposed a framework for collective action and provided
25 mathematical definitions within that framework. The
concepts of power, control, utility, and interest, defined by
Coleman are explored in our proposed model, in addition
to other concepts like social capital (Coleman 1966), hypergraph (Estrada and others 2006), and network modularity (Newman 2006). The concepts have been appropriately
modified for the cybernetic space.
3
Methodology
In this paper, we focus on advancing our understanding of
the flash mob phenomenon by logically investigating the
factors that lead to its formation and to predict its success/failure. It is an attempt to explain the motivation needed
to sustain such highly coordinated acts. A flash mob is a
form of public participation that is primarily organized using cyber platforms. The action benefits multiple members
of the group (e.g., by accomplishment of the shared goal)
but has an associated cost (or risk) which is impossible for a
single member to undertake. Hence, the action is undertaken
collectively to share the cost (or, risk). Since flash mobs are
coordinated and could even be conducted online, there is a
heightened sense of motivation among members to connect
Literature Review
One of the research studies conducted in this field focuses on
the laws and regulations that can be posed against the people
who organize and participate in flash mobs that can lead to
violence, security threats, and crimes. Hannah Steinblatt argues the need to create “content-based” or “content-neutral”
laws to regulate digital speech that incites flash mobs and
3
Figure 2: The factors that lead to the formation of flash mobs
and act online due to the anonymity and reduced personal
risk perception afforded by the cyber environment.
In analyzing flash mobs, social networks can be presented
as networks of individuals. Social networks thus contribute
significantly to individual participation. Here, prior social
ties operate as a basis for action, recruitment and established
social settings are the locus of flash mobs’ emergence. Typically, participants of a flash mob are linked through both
‘private’ and ‘public’ ties before a flash mob develops. Personal friends, relatives, colleagues, and neighbors may all
affect individual decisions to become involved in the flash
mob. Individuals may also be linked through indirect ties
generated by their joint involvement in specific activities
and/or events (e.g., following a meme or hashtag on social
media, affiliated to same organization, geographically colocated, ‘familiar strangers’, etc.).
3.1
Figure 3: Four possible scenarios flash mob practitioner
could face
ceeds certain (predetermined) threshold value, then we can
determine that a flash mob will more likely succeed. Otherwise, the flash mob is more likely to fail (see Figure 2).
The threshold value can be determined from historical data
on successful and failed flash mobs.
Logical Framework for the Formation of
Flash Mobs
3.2
Scenarios a Flash Mob Practitioner will Face
There are four possible scenarios that flash mobs practitioners could face. These scenarios will determine the decision
they make with regard to acting or not in a flash mob. Their
decision will be based on their interest in the flash mob and
the amount of control they have over it as shown in the four
scenarios below (also depicted in Figure 3):
1. If an individual has interest and has control then the likelihood of his/her participation is the highest, i.e., the individual will act.
2. If an individual has interest but does not have control
then he/she may act, or the likelihood of his/her participation is relatively lower than the previous case.
3. If an individual does not have interest, but has control
then the individual has two choices – either will withdraw,
i.e., will not act, or execute power exchange (i.e., relinquish power to possibly gain control over other events
(flash mobs) or to simply gain social capital). Social capital, as stated by Pierre Bourdieu, is “the value that one
gains from personal connections such as membership in a
family, an ethnic association, elite clubs, or other solidarity groups” (Biggart 2008).
4. If an individual has no interest and no control then the
individual will have two choices – either will simply withdraw or withdraw and act against the group.
The proposed model helps in categorizing individuals (or
nodes in the flash mob network) in one of the four aforementioned scenarios. Identifying the individuals in each of the
To model the phenomenon of flash mob, a deep study of
the sociological theories of collective action and collective
identity has been performed to extract the factors that lead
to these phenomena and their success or failure in the cybernetic space. Collective action can be defined as all activity
of common or shared interest among two or more individuals (Olson 1977). From the theories of collective action and
collective identity, we found out that flash mobs will occur
when the flash mob practitioners (nodes in the network) gain
some utility as Coleman argued in his book that “there is a
single action principal which governs the actions of the actors in the system: Each actor chooses those actions which
maximize his utility given environmental context created by
the events...” (Coleman 1973). Thus the utility difference
which is defined as the amount of utility gained by an actor (node) from the pair of possible outcomes (success or
failure) of the same event (flash mob) will determine their
interest in that flash mob. The more utility they will gain by
participating the more they are interested to participate and
vice versa.
Another factor that could affect flash mob participation
is control, i.e., to what extent an individual could affect the
outcome of the event (Coleman 1973). A flash mob practitioner needs control as well as interest in order for him/her
to be powerful. The more control and interest a flash mob
practitioner has the more powerful that individual (node) is.
By summing the power of all nodes we can find out the importance of a flash mob. If the importance of a flash mob ex-
4
four possible scenarios help simplify the analysis of the flash
mob. It is quite evident that the individuals in the fourth scenario will not participate, meaning such individuals could be
eliminated from the analysis thereby removing noise from
the analysis. On the other hand, individuals from the first
scenario are the most likely to act, hence the analysis could
focus on such individuals.
The second and third scenarios are of equal importance
because the individuals in the third scenario provide the resources needed by the individuals in the second scenario,
i.e., control. The individuals of the second scenario are willing to gain control over the events that interest them to be
more powerful while the individuals of the third scenario
are willing to relinquish control over the events that do not
interest them. These two scenarios help demonstrate a possible condition of power exchange among individuals. If the
power exchange is executed, individuals belonging to second scenario would possibly act. Furthermore, monitoring
the nodes from the third scenario could help identify other
possible flash mobs.
4
numbers: N000141010091 and N000141410489).
References
Ackerman, G., et al. 2013. The “new” face of transnational
crime organizations (tcos): A geopolitical perspective and
implications to us national security.
Atkinson, M. 2009. Parkour, anarcho-environmentalism,
and poiesis. Journal of Sport & Social Issues
33(2):169–194.
Biggart, N. W. 2008. Readings in economic sociology,
volume 4. John Wiley & Sons.
Coleman, J. S. 1966. Foundations for a theory of collective
decisions. American Journal of Sociology 71.
Coleman, J. S. 1973. Mathematics of collective action.
Estrada, E., et al. 2006. Subgraph centrality and clustering
in complex hyper-networks. Physica A: Statistical
Mechanics and its Applications 364:581–594.
Holbrook, B. July 19, 2013. Lbpd prepared for potential
bash mob event. In Everything Long Beach (URL:
http://www.everythinglongbeach.com/lbpd-prepared-forpotential-bash-mob-event/). Last checked: August 15,
2014.
Kirkland, C. December 21, 2011. 12 great examples of
flash mobs. In Econsultancy (URL:
http://econsultancy.com/blog/8548-12-great-examples-offlash-mobs). Last checked: August 15,
2014.
Klandermans, B., et al. 2002. Identity processes in
collective action participation: Farmers’ identity and
farmers’ protest in the netherlands and spain. Political
Psychology 23(2):235–251.
Melucci, A. 1996. Challenging codes: Collective action in
the information age. Cambridge University Press.
Mitra, A., et al. 2001. From cyber space to cybernetic
space: Rethinking the relationship between real and virtual
spaces. Journal of Computer-Mediated Communication
7(1):0–0.
Mohilever, Y. S. 2012. Taking over the city: Developing a
cybernetic geographical imagination-flash mobs & parkour.
THEATRE SPACE AFTER 20 TH CENTURY 188.
Newman, M. E. 2006. Modularity and community
structure in networks. Proceedings of the National
Academy of Sciences 103(23):8577–8582.
Olson, M. 1977. The logic of collective action: public
goods and the theory of groups. Harvard University Press.
Oxford-Dictionary. July 8, 2004. Definition of flash mob
from oxford english dictionaries online. In Oxford English
Dictionaries (URL:
http://www.oxforddictionaries.com/definition
/english/flash-mob). Last checked: August 22, 2014.
Steinblatt, H. 2011. E-incitement: A framework for
regulating the incitement of criminal flash mobs. Fordham
Intell. Prop. Media & Ent. LJ 22:753.
Conclusions and Future Work
In this work, we shed light on a phenomenon that poses serious threats to human security in cyber as well as physical
spaces, or cybernetic space. The research explored the factors that can cause this increasingly occurring phenomenon
from the theories of collective action and collective identity
and designed a conceptual framework that is able to predict
the success or failure of the flash mob. We systematically
explored the options that a flash mob practitioner can have
when it comes to act or not (i.e., withdraw) in a flash mob
through four scenarios. We envision that this exploration
will help in bridging social science and computational science in order to form a comprehensive understanding of the
emerging sociotechnical behaviors, e.g., flash mobs.
As one of our immediate future directions, we plan to empirically evaluate the model using data collected from social
media sites. Unusually high number of flash mob occurrences have been reported during the holiday season. Moreover, unsurprisingly, most of them are organized using social
media platforms such as Twitter, Facebook, etc. As BART
spokesman Linton Johnson said “The difference between 10
years ago and now is massive... technology has just made it
easier to organize faster” (Steinblatt 2011). We will collect
data from social media sites using APIs targeting real-world
flash mobs, such as flashmobs.com which will be used to
collect data on various successful/failed FMs. We seek to
develop a socio-computational approach leveraging hypergraph constructs that will help in understanding the multidimensional and supradyadic dynamics of various social
processes, such as group formation, activation, decentralized
decision making, and collective action underlying flash mob
behaviors.
Acknowledgements
This research is funded in part by the U.S. National Science Foundation (award numbers: IIS-1110868 and IIS1110649) and the U.S. Office of Naval Research (award
5
Download