Sei sulla pagina 1di 4

Sociotechnical Behavior Mining: From Data to Decisions?

Papers from the 2015 AAAI Spring Symposium

Analyzing Flash Mobs in Cybernetic Space and the Imminent Security Threats
A Collective Action Based Theoretical Perspective on Emerging Sociotechnical Behaviors

Samer Al-khateeb and Nitin Agarwal


Department of Information Science
University of Arkansas at Little Rock
2801 S University Ave, Little Rock, AR 72204
Email: {sxalkhateeb, nxagarwal}@ualr.edu

Abstract walls and continuously search for new ways to challenge


the rules of gravity. Parkour history is more than hundred
Since the occurrence of the first ‘flash mob’ organized by Bill years as Michael Atkinson states in his article “Parkour,
Wasik (senior editor of the Harper’s Magazine) in Manhat-
tan in 2003, flash mob phenomenon has become widespread.
Anarcho-Environmentalism, and Poiesis” (Atkinson 2009).
Recent journalistic accounts have reported that this form of This practice goes back to a style called Hebertism that
public engagement can pose significant threats to civil, po- emerged at the beginning of the 20th century. The practice
litical, social, and economic stability of a region. Gaps in contains variety of obstacles and landscapes usually in the
the scientific understanding of such phenomenon and the im- wooded setting “as an unfettered animal” (Mohilever 2012).
minent security risks posed by such acts call for a need to The first parkour was formed originally in Paris and since
systematically study them. In this ongoing research, we shed then it emerged all over the world, from Canada and USA
light on the social dynamics of the flash mob phenomenon to Russia and the Philippines. Due to a smaller number of
and build a conceptual model examining the necessary fac- participants involved in the act, parkour has not lead to as
tors for the formation of flash mob and predicting its success big security threats as flash mobs have. Also, parkour nature
or failure. Grounded in the sociological theories of collective
action and collective identity formation, we evaluate the mo-
was initiated as a postsport lifestyle and then it went through
tivations of a flash mob practitioner and logically analyze the a “sportization process” as Atkinson concludes. Sportiza-
choices he/she would face with regards to acting or withdraw- tion is the process by which subaltern or alternative forms
ing from the flash mob. More broadly, this work is an attempt of sport, leisure and play are co-opted and incorporated into
to bridge social and computational sciences that would help conventional sports cultures (Atkinson 2009).
clarify and explain manifestations of emerging sociotechnical Flash mobs (FMs) is another form of public engagement
behaviors such as parkour, campaigns, and social movements that is more commonly observed than parkour. Oxford En-
that are widely observed. glish dictionary defines a flash mob as “A large public gath-
ering at which people perform an unusual or seemingly ran-
1 Introduction dom act and then quickly disperse” (Oxford-Dictionary July
8 2004). Recent observations pertaining to the deviant as-
In the last decade and a half there has been an increasing pect of the flash mobs have insisted to add a highly debated
interest in the public participation-led guerrilla acts. Many perspective, which is the nature of the flash mob (whether it
new forms of public engagement have been observed such is for entertainment, satire, and artistic expression or is it a
as: parkours, flash mobs, campaigns, and social movements deviant act that can lead to robberies and thefts i.e. crim-
(see Figure 1). New technologies and the variety of afford- inal flash mobs). Flash mobs could be entertaining such
able and easy to use means of communications (such as so- as, Happy Birthday for a bus driver (Kirkland December
cial network platforms, viral e-mails, and SMS) increased 21 2011) or they can be the new face of transnational crime
the occurrences of such emerging sociotechnical behaviors organizations (TCOs) that can pose significant risks to civil,
(Mohilever 2012). With the increase of such behaviors, there political, social, and economic stability (Ackerman and oth-
is a need to systematically study such phenomena to be able ers 2013) such as, the Bash Mob that happened in Long
to assess the threats they could pose to human security. It Beach, California on July 9, 2013 when over 100 individ-
is important to know the motivations behind such acts, to ual who have been recruited using social media site partici-
know the way they are formed, and to be able to predict pated in the Pike and City Place area and committed a series
their outcome. Such studies could guide the development of thefts, property damage, and assaults (Holbrook July 19
of effective proactive measures and policies to eliminate the 2013).
security risks in cyberspace as well as physical spaces.
Parkour is the manifestation when traceurs (parkour prac- The new ways of communications such as the Internet,
titioners) jump between distance rooftops, climb vertical social media, and the mobile phones are widely responsi-
ble for the increasingly common occurrences of these prac-
Copyright  c 2015, Association for the Advancement of Artificial tices. The new communication media made the process of
Intelligence (www.aaai.org). All rights reserved. recruiting and training a specific sector of the society (spe-

2
(a) (b) (c) (d)

Figure 1: Examples of different forms of public performance. (a) Palestinians Practicing Parkour in Gaza, (b) a Flash Mob
Dance in a Shopping Mall, (c) Saudi Arabian Women’s Right to Drive Campaign’s Bumper Sticker, and (d) The 2011 Arab
Spring Social Movement.

cific gender, age, political affiliation, interest, and cultural these laws should be evaluated under the Brandenburg test
background) easier than it was before. (Steinblatt 2011).
In this ongoing research, we focus on the flash mob be- Another research in this area focuses on the development
havior that takes place in the cyberspace but could possi- of flash mobs’ manifestations through the history. It also
bly extend to the physical space. Here, we explore the fac- shows the linkage of these manifestations with the new tech-
tors that lead to this phenomenon and develop a conceptual nologies and networking platforms and how these technolo-
model that is able to predict the occurrence and the outcome gies influenced their formation, ideology, and diffusion (Mo-
of such phenomenon. We look at both cyber as well as phys- hilever 2012).
ical spaces, or “Cybernetic Space”, because as Mitra and Flash mobs exhibit characteristics of complex social and
Schwartz claimed that in order “to understand how the no- group dynamics and could be considered as manifestations
tion of space is transformed by new technologies we need of collective actions. Various sociological theories such as
to move away from the rigid definitions of real and cyber collective action (Coleman 1973), collective identity forma-
spaces, to a flexible and relative conception of cybernetic tion (Klandermans and others 2002) (Melucci 1996), and
space” (Mitra and others 2001). Cybernetic space helps an- collective decision (Coleman 1966) have been studied to ex-
alyze the system and the interaction between its different plain complex social processes, such as social movements.
elements as a “whole” (Mohilever 2012). However, these theories have never been used to study or
As stated earlier, flash mobs pose non-negligible concerns model flash mobs, to the best of our knowledge. Under-
for public safety and national security, which warrants a sys- standing and modeling flash mobs is an important research
tematic study to advance our understanding of such emerg- problem, which studies the factors that lead to this phe-
ing sociotechnical behavior. Therefore, in this study, we nomenon and the factors that lead to its success or failure.
seek answers to the following questions: What are the fac- In the book by James S. Coleman entitled, “The math-
tors that motivate an individual to participate in a flash mob? ematics of Collective Action” (Coleman 1973), Coleman
What are the choices an individual could possibly have re- proposed a framework for collective action and provided
garding acting (or not) in a flash mob?, and Using the factors 25 mathematical definitions within that framework. The
identified in the previous questions, can we develop a con- concepts of power, control, utility, and interest, defined by
ceptual framework that is capable of modeling the formation Coleman are explored in our proposed model, in addition
and predicting the outcome of a flash mob, i.e., success or to other concepts like social capital (Coleman 1966), hy-
failure? Toward this direction, the article makes the follow- pergraph (Estrada and others 2006), and network modular-
ing contributions, identify the factors that motivate an indi- ity (Newman 2006). The concepts have been appropriately
vidual to act in a flash mob, develop a conceptual framework modified for the cybernetic space.
that can predict the success or failure of a flash mob, and log-
ically analyze the choices an individual has in case of acting 3 Methodology
(or not) in a flash mob.
This research is an attempt to shed light on the emerging In this paper, we focus on advancing our understanding of
sociotechnical behaviors, the risks they pose to human se- the flash mob phenomenon by logically investigating the
curity, and advance our understanding of such behaviors by factors that lead to its formation and to predict its suc-
bridging social and computational sciences. cess/failure. It is an attempt to explain the motivation needed
to sustain such highly coordinated acts. A flash mob is a
form of public participation that is primarily organized us-
2 Literature Review ing cyber platforms. The action benefits multiple members
One of the research studies conducted in this field focuses on of the group (e.g., by accomplishment of the shared goal)
the laws and regulations that can be posed against the people but has an associated cost (or risk) which is impossible for a
who organize and participate in flash mobs that can lead to single member to undertake. Hence, the action is undertaken
violence, security threats, and crimes. Hannah Steinblatt ar- collectively to share the cost (or, risk). Since flash mobs are
gues the need to create “content-based” or “content-neutral” coordinated and could even be conducted online, there is a
laws to regulate digital speech that incites flash mobs and heightened sense of motivation among members to connect

3
Figure 2: The factors that lead to the formation of flash mobs

and act online due to the anonymity and reduced personal


risk perception afforded by the cyber environment.
In analyzing flash mobs, social networks can be presented
as networks of individuals. Social networks thus contribute
significantly to individual participation. Here, prior social
ties operate as a basis for action, recruitment and established
social settings are the locus of flash mobs’ emergence. Typ-
ically, participants of a flash mob are linked through both
‘private’ and ‘public’ ties before a flash mob develops. Per-
sonal friends, relatives, colleagues, and neighbors may all Figure 3: Four possible scenarios flash mob practitioner
affect individual decisions to become involved in the flash could face
mob. Individuals may also be linked through indirect ties
generated by their joint involvement in specific activities ceeds certain (predetermined) threshold value, then we can
and/or events (e.g., following a meme or hashtag on social determine that a flash mob will more likely succeed. Oth-
media, affiliated to same organization, geographically co- erwise, the flash mob is more likely to fail (see Figure 2).
located, ‘familiar strangers’, etc.). The threshold value can be determined from historical data
on successful and failed flash mobs.
3.1 Logical Framework for the Formation of
Flash Mobs 3.2 Scenarios a Flash Mob Practitioner will Face
There are four possible scenarios that flash mobs practition-
To model the phenomenon of flash mob, a deep study of
ers could face. These scenarios will determine the decision
the sociological theories of collective action and collective
they make with regard to acting or not in a flash mob. Their
identity has been performed to extract the factors that lead
decision will be based on their interest in the flash mob and
to these phenomena and their success or failure in the cyber-
the amount of control they have over it as shown in the four
netic space. Collective action can be defined as all activity
scenarios below (also depicted in Figure 3):
of common or shared interest among two or more individu-
als (Olson 1977). From the theories of collective action and 1. If an individual has interest and has control then the like-
collective identity, we found out that flash mobs will occur lihood of his/her participation is the highest, i.e., the indi-
when the flash mob practitioners (nodes in the network) gain vidual will act.
some utility as Coleman argued in his book that “there is a 2. If an individual has interest but does not have control
single action principal which governs the actions of the ac- then he/she may act, or the likelihood of his/her partici-
tors in the system: Each actor chooses those actions which pation is relatively lower than the previous case.
maximize his utility given environmental context created by 3. If an individual does not have interest, but has control
the events...” (Coleman 1973). Thus the utility difference then the individual has two choices – either will withdraw,
which is defined as the amount of utility gained by an ac- i.e., will not act, or execute power exchange (i.e., relin-
tor (node) from the pair of possible outcomes (success or quish power to possibly gain control over other events
failure) of the same event (flash mob) will determine their (flash mobs) or to simply gain social capital). Social cap-
interest in that flash mob. The more utility they will gain by ital, as stated by Pierre Bourdieu, is “the value that one
participating the more they are interested to participate and gains from personal connections such as membership in a
vice versa. family, an ethnic association, elite clubs, or other solidar-
Another factor that could affect flash mob participation ity groups” (Biggart 2008).
is control, i.e., to what extent an individual could affect the
outcome of the event (Coleman 1973). A flash mob practi- 4. If an individual has no interest and no control then the
tioner needs control as well as interest in order for him/her individual will have two choices – either will simply with-
to be powerful. The more control and interest a flash mob draw or withdraw and act against the group.
practitioner has the more powerful that individual (node) is. The proposed model helps in categorizing individuals (or
By summing the power of all nodes we can find out the im- nodes in the flash mob network) in one of the four aforemen-
portance of a flash mob. If the importance of a flash mob ex- tioned scenarios. Identifying the individuals in each of the

4
four possible scenarios help simplify the analysis of the flash numbers: N000141010091 and N000141410489).
mob. It is quite evident that the individuals in the fourth sce-
nario will not participate, meaning such individuals could be References
eliminated from the analysis thereby removing noise from Ackerman, G., et al. 2013. The “new” face of transnational
the analysis. On the other hand, individuals from the first crime organizations (tcos): A geopolitical perspective and
scenario are the most likely to act, hence the analysis could implications to us national security.
focus on such individuals. Atkinson, M. 2009. Parkour, anarcho-environmentalism,
The second and third scenarios are of equal importance and poiesis. Journal of Sport & Social Issues
because the individuals in the third scenario provide the re- 33(2):169–194.
sources needed by the individuals in the second scenario,
Biggart, N. W. 2008. Readings in economic sociology,
i.e., control. The individuals of the second scenario are will-
volume 4. John Wiley & Sons.
ing to gain control over the events that interest them to be
Coleman, J. S. 1966. Foundations for a theory of collective
more powerful while the individuals of the third scenario
decisions. American Journal of Sociology 71.
are willing to relinquish control over the events that do not
interest them. These two scenarios help demonstrate a pos- Coleman, J. S. 1973. Mathematics of collective action.
sible condition of power exchange among individuals. If the Estrada, E., et al. 2006. Subgraph centrality and clustering
power exchange is executed, individuals belonging to sec- in complex hyper-networks. Physica A: Statistical
ond scenario would possibly act. Furthermore, monitoring Mechanics and its Applications 364:581–594.
the nodes from the third scenario could help identify other Holbrook, B. July 19, 2013. Lbpd prepared for potential
possible flash mobs. bash mob event. In Everything Long Beach (URL:
http://www.everythinglongbeach.com/lbpd-prepared-for-
potential-bash-mob-event/). Last checked: August 15,
4 Conclusions and Future Work 2014.
In this work, we shed light on a phenomenon that poses se- Kirkland, C. December 21, 2011. 12 great examples of
rious threats to human security in cyber as well as physical flash mobs. In Econsultancy (URL:
spaces, or cybernetic space. The research explored the fac- http://econsultancy.com/blog/8548-12-great-examples-of-
tors that can cause this increasingly occurring phenomenon flash-mobs). Last checked: August 15,
from the theories of collective action and collective identity 2014.
and designed a conceptual framework that is able to predict Klandermans, B., et al. 2002. Identity processes in
the success or failure of the flash mob. We systematically collective action participation: Farmers’ identity and
explored the options that a flash mob practitioner can have farmers’ protest in the netherlands and spain. Political
when it comes to act or not (i.e., withdraw) in a flash mob Psychology 23(2):235–251.
through four scenarios. We envision that this exploration Melucci, A. 1996. Challenging codes: Collective action in
will help in bridging social science and computational sci- the information age. Cambridge University Press.
ence in order to form a comprehensive understanding of the Mitra, A., et al. 2001. From cyber space to cybernetic
emerging sociotechnical behaviors, e.g., flash mobs. space: Rethinking the relationship between real and virtual
As one of our immediate future directions, we plan to em- spaces. Journal of Computer-Mediated Communication
pirically evaluate the model using data collected from social 7(1):0–0.
media sites. Unusually high number of flash mob occur- Mohilever, Y. S. 2012. Taking over the city: Developing a
rences have been reported during the holiday season. More- cybernetic geographical imagination-flash mobs & parkour.
over, unsurprisingly, most of them are organized using social THEATRE SPACE AFTER 20 TH CENTURY 188.
media platforms such as Twitter, Facebook, etc. As BART
Newman, M. E. 2006. Modularity and community
spokesman Linton Johnson said “The difference between 10
structure in networks. Proceedings of the National
years ago and now is massive... technology has just made it
Academy of Sciences 103(23):8577–8582.
easier to organize faster” (Steinblatt 2011). We will collect
data from social media sites using APIs targeting real-world Olson, M. 1977. The logic of collective action: public
flash mobs, such as flashmobs.com which will be used to goods and the theory of groups. Harvard University Press.
collect data on various successful/failed FMs. We seek to Oxford-Dictionary. July 8, 2004. Definition of flash mob
develop a socio-computational approach leveraging hyper- from oxford english dictionaries online. In Oxford English
graph constructs that will help in understanding the mul- Dictionaries (URL:
tidimensional and supradyadic dynamics of various social http://www.oxforddictionaries.com/definition
processes, such as group formation, activation, decentralized /english/flash-mob). Last checked: August 22, 2014.
decision making, and collective action underlying flash mob Steinblatt, H. 2011. E-incitement: A framework for
behaviors. regulating the incitement of criminal flash mobs. Fordham
Intell. Prop. Media & Ent. LJ 22:753.
Acknowledgements
This research is funded in part by the U.S. National Sci-
ence Foundation (award numbers: IIS-1110868 and IIS-
1110649) and the U.S. Office of Naval Research (award

Potrebbero piacerti anche