February 2012

Why most Facebook users get more than they give

Most Facebook users receive more from their Facebook friends than they give, according to a new study that for the first time combines server logs of Facebook activity with survey data to explore the structure of Facebook friendship networks and measures of social well-being.

These data were then matched with survey responses. And the new findings show that over a one-month period:

  • 40% of Facebook users in our sample made a friend request, but 63% received at least one request
  • Users in our sample pressed the like button next to friends’ content an average of 14 times, but had their content “liked” an average of 20 times
  • Users sent 9 personal messages, but received 12
  • 12% of users tagged a friend in a photo, but 35% were themselves tagged in a photo

The Facebook and More

[Commentary] Every week as we consider our round up we weigh delving into the week’s biggest story or shedding light on articles that may have flown below the radar. This week is no different. The biggest story of the week, by far, is Facebook taking its first step toward becoming a publicly traded company as it filed to sell shares on the stock market. In addition, there were big developments in privacy, ensuring low income Americans have affordable access to telecommunications, and spectrum policy.

Votizen Brings The Empowerment Of The Internet To Elections

A Q&A with David Binetti.

Before political campaigns were all over blogs, Meetup.com, YouTube, Twitter, and Facebook, there was USA.gov, cofounded by Binetti in 2000. The site, which was the platform for the first ever webcast from the Oval Office, is now the U.S. Government's official portal. Binetti's new venture is a Silicon Valley tech startup called Votizen, a social network where voters can campaign for a candidate or a cause. Users reach out primarily to friends or acquaintances, leveraging their own social networks to organize. Votizen was used heavily in last November's San Francisco mayoral race, which resulted in the election of Ed Lee, the first Chinese-American mayor in that city's history. With the 2012 campaign heating up, we spoke with David Binetti, Votizen's CEO and cofounder, about the disruptive impact of technology on the political landscape and the challenges of innovating in the federal government.

Internet TV faces big obstacles

You say TV, I say Internet. Toe-mate-o, toe-maht-o. Technology increasingly blurs the lines between computer, television, phone and tablet. Online video options grow almost by the hour. A screen, in the era of cyber choice, is a screen is a screen. You can now plug the Internet straight into the newest TVs. You can buy gadgets that will bring the Web to your old set. Or you can use your phone, tablet or other electronic gizmos to tap into the Internet to give you TV on the go. Still, to fill your screen with popular sports, comedies and dramas from the brands that dominate your television, generations-old economic models will have to be rearranged for the wild, wild Web. Some entrepreneurs are toying with new models that tap into an Internet specialty — the ability to tailor choices to the individual viewer — that might give advertisers a better platform on the Internet than they have in one-size-fits-all cable TV audiences. But true Internet TV is facing a big obstacle: It’s the old-school cable and cable-like services, after all, that have got the makers of programming locked up in mega-contracts.

Google won't delay new privacy policy despite EU concerns

Google does not plan to delay its new privacy policy despite calls from Europe's data protection watchdog.

The Article 29 Working Party (A29 WP), made up of the data regulators from all European Union member states as well as the European Data Protection Supervisor (EDPS), sent a letter to Google saying that the Internet giant should "pause" before going ahead with the planned changes to its privacy policy. In January Google announced that it would "simplify" its privacy regulations as of March 1. This would create a single privacy policy for all its services including YouTube, Gmail and Google+. However, the request is not legally binding and Google believes that any changes to its schedule would confuse users. Spokesman Al Verney also expressed some surprise at the timing of the letter: "We briefed most of the members of the working party in the weeks leading up to our announcement. None of them expressed substantial concerns at the time."

Was Google’s Disastrous January A Passing Storm Or Sign Of Things To Come?

It’s a little stunning to contemplate how wrong things have gone for Google in just the first month of 2012, as the company hopes to put a disastrous January in the rear-view mirror with perhaps another tear-jerking Super Bowl ad this Sunday.

Larry Page and Sergey Brin haven’t turned into Jim Balsillie and Mike Lazaridis or anything, but Google just endured the worst month in the company’s history and nothing will get easier as rivals and the government take aim at what used to be such a delightful fuzzy little tech success story. Google’s unlikely to have a month like that again, this year anyway. But it’s kind of shocking to contemplate just how uneasy the company has made a lot of people by its decisions around social search and privacy. Perhaps more troubling, its responses to those big questions have been tone-deaf and almost defiant, traits one did not associate with Google until recently.

$10 million offered for ideas on creating trusted online identities

The National Institute of Standards and Technology is making up to $10 million available for research projects addressing the challenges of implementing a trusted online identity ecosystem.

The Obama Administration released its National Strategy for Trusted Identities in Cyberspace last year, a conceptual framework for a system of voluntary, interoperable credentials that could be widely accepted for online transactions. The goals of this identity ecosystem are to enable more economic activity on the Internet while ensuring consumer privacy and security. Although technology and techniques exist for verifying identify online, challenges of scalability, ease of use and reliability hinder the widespread adoption of any but the simplest and least secure solutions, such as the commonly used user name and password. This has resulted in a lack of confidence in online transactions, the need for individuals to maintain multiple sets of login credentials, and growing threats to privacy through data breaches as well as leaking and reuse of data.

How Can Health IT Lead to a More Sustainable Health Care System?

Across the country, health care providers are making significant investments to redesign care processes and strengthen their health information technology (health IT) capabilities with the goal of achieving better care, better health, and lower costs. For the American health care system as a whole, the simultaneous pursuit of all three of these aims is essential to sustaining any one of them. Over the years, economists and health IT experts have projected a wide range of cost savings from health IT implementation. These kinds of analyses are challenging because they require experts to predict how health IT will influence changes in provider and consumer behavior, and how those changes in behavior in turn influence quality and financial outcomes. Yet it is still important to understand how health IT can support the nation’s efforts to “bend the cost curve” and ultimately slow the growth of health care spending, while improving outcomes and the health of the population. Within this context, a single health care health IT-enabled intervention that achieves the goal of improving health care quality may be more likely to spread if that intervention has also demonstrated measurable net reductions in health care expenditures.

Rooting for the Race

[Commentary] Journalists are suddenly eager to admit the media is biased in favor of an extended campaign. Will they do anything about it?

Microsoft researchers say anonymized data isn't so anonymous

Data routinely gathered in Web logs -- IP address, cookie ID, operating system, browser type, user-agent strings -- can threaten online privacy because they can be used to identify the activity of individual machines, Microsoft researchers say.

At the same time, analysis of such data when anonymized can help detect malicious activity and so improve overall Internet security, they add. The researchers found that 62 percent of the time, HTTP user-agent information alone can accurately tag a host. Combine that same information with the IP address, and the accuracy jumps to 80.6 percent. If the user-agent information is combined with just the IP prefix the accuracy is still 79.3 percent, they say. The highest accuracy came when more than one user ID was linked to a single host, as would be the case in a family that shares a single computer. In such cases, multiple IDs would accurately represent that one host computer. The accuracy rate was 92.8 percent. The analysis of this seemingly benign information was based on a month - August 2010 - of anonymized Hotmail and Bing data on hundreds of millions of users. The researchers say they tried to find out whether a single piece of log data can uniquely reveal a particular host.