scispace - formally typeset
Search or ask a question
Author

Jonathan A. Obar

Bio: Jonathan A. Obar is an academic researcher from York University. The author has contributed to research in topics: The Internet & Social media. The author has an hindex of 15, co-authored 48 publications receiving 1758 citations. Previous affiliations of Jonathan A. Obar include University of Ontario Institute of Technology & Michigan State University.

Papers
More filters
Journal ArticleDOI
TL;DR: This introduction to a special issue of "Telecommunications Policy" entitled "The Governance of Social Media" begins with a definition of social media that informs all contributions in the special issue, and synthesize definitions presented in the literature.
Abstract: This introduction to a special issue of "Telecommunications Policy" entitled "The Governance of Social Media" begins with a definition of social media that informs all contributions in the special issue. A section describing the challenges associated with the governance of social media is presented next, followed by an overview of the various articles included in the special issue.While the Internet and the World Wide Web have always been used to facilitate social interaction, the emergence and rapid diffusion of Web 2.0 functionalities during the first decade of the new millennium enabled an evolutionary leap forward in the social component of web use. This and falling costs for online data storage made it feasible for the first time to offer masses of Internet users access to an array of user-centric spaces they could populate with user-generated content, along with a correspondingly diverse set of opportunities for linking these spaces together to form virtual social networks.To define “social media” for our current purposes, we synthesize definitions presented in the literature and identify the following commonalities among current social media services:1) Social media services are (currently) Web 2.0 Internet-based applications,2) User-generated content is the lifeblood of social media,3) Individuals and groups create user-specific profiles for a site or app designed and maintained by a social media service,4) Social media services facilitate the development of social networks online by connecting a profile with those of other individuals and/or groups.Transformative communication technologies have always called for regulatory innovation. Theodor Vail’s vision of “one policy, one system, universal service” preceded more than one-hundred years of innovative regulations aimed at connecting all Americans to a single telephone network. The sinking of the Titanic, caused in part by “chaos in the spectrum” led to the Radio Act of 1912 and the creation of a command and control model designed to regulate broadcast radio. Safe-harbor hours were put in place after a father and son heard George Carlin’s “seven dirty words” routine over the radio in their car. The fairness doctrine and the minority tax certificate program were designed to address inequalities in the broadcast television industry. The Digital Millennium Copyright Act responded to intellectual property concerns raised by a global Internet and the FCC’s 700mhz auction was the result of demand for smarter mobile phones. Now we must consider the role of regulatory innovation in response to the emergence of social media.

503 citations

Journal ArticleDOI
TL;DR: The Governance of Social Media as discussed by the authors is a special issue of Telecommunication Policy with a focus on the role of regulatory innovation in response to the emergence of social media and the challenges associated with social media.

386 citations

Journal ArticleDOI
TL;DR: Qualitative findings suggest that participants view policies as nuisance, ignoring them to pursue the ends of digital production, without being inhibited by the means.
Abstract: This paper addresses ‘the biggest lie on the internet’ with an empirical investigation of privacy policy (PP) and terms of service (TOS) policy reading behavior. An experimental survey (N=543) assessed the extent to which individuals ignore PP and TOS when joining a fictitious social networking site, NameDrop. Results reveal 74% skipped PP, selecting ‘quick join.’ For readers, average PP reading time was 73 seconds, and average TOS reading time was 51 seconds. Based on average adult reading speed (250-280 words per minute), PP should have taken 30 minutes to read, TOS 16 minutes. A regression analysis revealed information overload as a significant negative predictor of reading TOS upon signup, when TOS changes, and when PP changes. Qualitative findings further suggest that participants view policies as nuisance, ignoring them to pursue the ends of digital production, without being inhibited by the means. Implications were revealed as 98% missed NameDrop TOS ‘gotcha clauses’ about data sharing with the NSA and employers, and about providing a first-born child as payment for SNS access.

282 citations

Journal ArticleDOI
TL;DR: A survey of representatives from 53 national advocacy/activist groups operating in the United States was conducted to assess the extent to which these groups perceive and use social media as tools for facilitating civic engagement and collective action.
Abstract: In light of a thriving interest in social media’s ability to enhance various forms of political and organizational communication, a survey of 169 representatives from 53 national advocacy/activist groups operating in the United States was conducted to assess the extent to which these groups perceive and use social media as tools for facilitating civic engagement and collective action. Quantitative results reveal that all groups are using a variety of social media technologies to communicate with citizens almost every day. Facebook is the outlet of choice, followed closely by Twitter. Email remains popular with some groups emailing 8 million members each week. Qualitative results suggest that groups believe that social media can facilitate civic engagement and collective action by strengthening outreach efforts, enabling engaging feedback loops, increasing speed of communication and by being cost-effective. While some groups raised doubts about social media’s ability to overcome the limitations of weak ties and generational gaps, an overwhelming majority of groups see social media as essential to contemporary advocacy work and social movements, and laud its democratizing function.

268 citations

Journal ArticleDOI
TL;DR: In this article, an empirical investigation of privacy policy and terms of service policy reading behavior is presented. But the authors do not address the problem of the biggest lie on the internet.
Abstract: This paper addresses ‘the biggest lie on the internet’ with an empirical investigation of privacy policy (PP) and terms of service (TOS) policy reading behavior. An experimental survey (N = 543) as...

232 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, the role and ethics of planners acting as sources of misinformation are considered, and a practical and politically sensitive form of progressive planning practice is defined. But the authors do not discuss the role of planners in this process.
Abstract: Abstract Information is a source of power in the planning process. This article begins by assessing five perspectives of the planner's use of information: those of the technician, the incremental pragmatist, the liberal advocate, the structuralist, and the “progressive.” Then several types of misinformation (inevitable or unnecessary, ad hoc or systematic) are distinguished in a reformulation of bounded rationality in planning, and practical responses by planning staff are identified. The role and ethics of planners acting as sources of misinformation are considered. In practice planners work in the face of power manifest as the social and political (mis)-man-agement of citizens' knowledge, consent, trust, and attention. Seeking to enable planners to anticipate and counteract sources of misinformation threatening public serving, democratic planning processes, the article clarifies a practical and politically sensitive form of “progressive” planning practice.

1,961 citations

Journal Article
TL;DR: The Net Delusion: The Dark Side of Internet Freedom by Evgeny Morozov New York: Public Affairs, 2011 409 pages $16.99 [ILLUSTRATION OMITTED] as discussed by the authors.
Abstract: The Net Delusion: The Dark Side of Internet Freedom by Evgeny Morozov New York: Public Affairs, 2011 409 pages $16.99 [ILLUSTRATION OMITTED] In January 2010, Secretary of State Hillary Clinton gave a highly touted speech on Internet freedom in which she stated, "The freedom to connect is like the freedom of assembly, only in cyberspace. It allows individuals to get online, come together, and hopefully cooperate. Once you're on the Internet, you don't need to be a tycoon or a rock star to have a huge impact on society." Evgeny Morozov, in his book The Net Delusion, takes great issue with the implication, however, that the so-called "Arab Spring" and "Twitter Revolution" were caused by unfettered access to the Internet. Instead, Morozov, a research academic, provides a cautionary tale about what he argues is any attempt to establish a monocausal relationship to meaningful political change (especially when that single focus is information technology). The book opens with a discussion of cyber-utopianism and Internet-centrism--mind-sets that focus on the positive "emancipatory" aspects of Internet communication while ignoring the downsides. The argument throughout centers on nation-state policy, or lack thereof, that attacks the "wicked" problem of authoritarianism by, as a colleague of mine has dubbed it, "wiring the world." Morozov, expectantly, but importantly, cites the hedonistic world portrayed by Huxley and the "Big Brother" world of Orwell to consider both the proactive and reactive approaches to Internet freedom by authoritarian regimes. Interestingly, he notes that there is often a mix of both. Such regimes certainly use the anonymity and openness of the Internet to spy on their people and shutdown undesirable sites. But there is also a subtle approach that belies the jackboot on the keyboard methodology. While China may be known more for suppressing the Internet and for employing the masses to counter antiregime rhetoric, Russia imposes no formal Internet censorship. It relies on entertainment (porn is specifically cited) to soothe the masses, assuming that given options for political discourse and anything else, most opt for "anything else." Hitler would understand. And in nations where freedom is not widely understood from a western perspective, any bit of additional mindless diversion may be viewed as liberty by the populace. Perhaps most importantly, Morozov rails against social media determinism as driving the end of authoritarianism, labeling it "an intellectually impoverished, lazy way to study the past, understand the present, and predict the future." He does not dismiss the value of Facebook and Twitter to quickly mobilize like-minded individuals. He notes as well that the development of that very like-mindedness is complex and potentially can be manipulated by authoritarian governments using the same Internet freedom. …

870 citations

Journal Article
TL;DR: Jonathan Zittrain's book discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system.
Abstract: The Future of the Internet and How to Stop It Jonathan Zittrain. New Haven: Yale University Press, 2008. 342 pages. $30.00.Jonathan Zittrain's book, The Future of the Internet and How to Stop It, discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system (70). This generativity, Zittrain argues, is the greatest strength of personal computers and the Internet and had led to great innovations, including creative software, peer-to-peer networking, blogs and content sites such as Wikipedia, and even the Internet itself. Yet this same generativity has also spawned security, legal, and social problems that may lead to the demise of personal computers and the Internet as they exist today (101). If we do not find solutions for these problems, Zittrain warns, we will be faced with government or corporate control of personal computers and the Internet, similar to current controls of cellular telephones and cable converter boxes, which will effectively shut down the innovations that personal computers and the Internet currently enable (245). Personal computers, according to Zittrain, will become nothing but appliances programmed by the manufacturer, capable only of limited tasks, and stripped of the tools and capabilities necessary for innovation.The first part of the book traces the history of personal computers, mainframes, proprietary servers, and the Internet. This section highlights how differences in technology and administration fostered generativity in personal computers and on the Internet and prohibited innovation on the mainframes and proprietary networks. Yet the innovations made possible by the generative nature of the Internet and personal computers also created its vulnerabilities: viruses, worms, malware, and spyware. Despite his obvious support of generativity, Zittrain admits that the current situation is "not sustainable" (43), but warns that the obvious solutions-such as limited functionality, governmental controls, and censorship-completely undermine the creativity made possible by personal computers and the Internet. The sec- ond part of the book defines generativity and explores its benefits and detriments. Here, Zittrain proposes that information technology functions best when generative, while admitting that we cannot ignore the problems caused by generativity (64), and warns equally of the dangers of controlled appliances: censorships, surveillance, forced legal compliance, and unannounced changes in machine functions. Chapter 6 in this section considers Wikikpedia as a self-regulating generative system that functions imperfectly but well. Part Three proposes technological, legal, and social solutions to the problems discussed earlier in the book.The Future of the Internet intertwines its analysis of current personal computer/Internet problems with current and historical examples from business, law, culture (Internet and otherwise), and technology. These examples, often worthwhile and interesting in and of themselves, underpin Zittrain's analysis rationally and support his conclusions. The examples show that the kind of sledgehammer solutions that Zittrain predicts are not merely possibilities or potentialities, but already have been and are being employed by various companies and governments. Perhaps best of all, Zittrain's use of these historical and current examples avoids the sensationalism often seen in other works that predict governmental and corporate control of options, behavior, and creativity. …

639 citations

Journal ArticleDOI
TL;DR: This research offers a significant and timely contribution to both researchers and practitioners in the form of challenges and opportunities where it highlights the limitations within the current research, outline the research gaps and develop the questions and propositions that can help advance knowledge within the domain of digital and social marketing.

588 citations

MonographDOI
28 Apr 2014
TL;DR: Social Media Mining introduces the unique problems arising from social media data and presents fundamental concepts, emerging issues, and effective algorithms for network analysis and data mining.
Abstract: The growth of social media over the last decade has revolutionized the way individuals interact and industries conduct business. Individuals produce data at an unprecedented rate by interacting, sharing, and consuming content through social media. Understanding and processing this new type of data to glean actionable patterns presents challenges and opportunities for interdisciplinary research, novel algorithms, and tool development. Social Media Mining integrates social media, social network analysis, and data mining to provide a convenient and coherent platform for students, practitioners, researchers, and project managers to understand the basics and potentials of social media mining. It introduces the unique problems arising from social media data and presents fundamental concepts, emerging issues, and effective algorithms for network analysis and data mining. Suitable for use in advanced undergraduate and beginning graduate courses as well as professional short courses, the text contains exercises of different degrees of difficulty that improve understanding and help apply concepts, principles, and methods in various scenarios of social media mining.

550 citations