{"@context":{"rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","owl":"http://www.w3.org/2002/07/owl#","foaf":"http://xmlns.com/foaf/0.1/","dc":"http://purl.org/dc/elements/1.1/","dct":"http://purl.org/dc/terms/","sioc":"http://rdfs.org/sioc/types#","blog":"http://vocab.amy.so/blog#","as":"https://www.w3.org/ns/activitystreams#","mf2":"http://microformats.org/profile/","ldp":"http://www.w3.org/ns/ldp#","solid":"http://www.w3.org/ns/solid#","view":"https://terms.rhiaro.co.uk/view#","asext":"https://terms.rhiaro.co.uk/as#","dbp":"http://dbpedia.org/property/","geo":"http://www.w3.org/2003/01/geo/wgs84_pos#","doap":"http://usefulinc.com/ns/doap#","time":"http://www.w3.org/2006/time#"},"@id":"https://rhiaro.co.uk/2015/06/notes-post-social","@type":"as:Article","blog:tmpcontent":"# Notes post social-informatics seminar talk\r\n\r\nmethodology: iterative, inductive\r\n\r\nResearchGate > Academia.edu\r\n\r\nResearch in use of avatars\r\n\r\nWhere the good enough boundary lies for managing?\r\nWhen is it dangerous, when serendipitous. What 'matters'?\r\nNo perfect model of social management/access control.\r\n\r\nEasier to look at different systems doing the same thing in different ways\r\n(things of a similar species)\r\n\r\nProfiles shaped strongly by the needs of the service providers\r\nProblems of their own survival are also played out in this space\r\nDifficulties people may have managing profiles are sometimes down to easily fixable poor design things\r\nInterests of people fight with interests of service\r\n\r\nGithub\r\n\r\nDefinition of ownership\r\n\r\nACNE and other diseases communities on twitter - people create second accounts to participate\r\n\r\n\"epidemic communication patterns\" - Robin Williams","as:actor":{"@id":"https://rhiaro.co.uk/about#me"},"as:content":"
Notes post social-informatics seminar talk
\r\nmethodology: iterative, inductive
\r\nResearchGate > Academia.edu
\r\nResearch in use of avatars
\r\nWhere the good enough boundary lies for managing? When is it dangerous, when serendipitous. What 'matters'? No perfect model of social management/access control.
\r\nEasier to look at different systems doing the same thing in different ways (things of a similar species)
\r\nProfiles shaped strongly by the needs of the service providers Problems of their own survival are also played out in this space Difficulties people may have managing profiles are sometimes down to easily fixable poor design things Interests of people fight with interests of service
\r\nGithub
\r\nDefinition of ownership
\r\nACNE and other diseases communities on twitter - people create second accounts to participate
\r\n"epidemic communication patterns" - Robin Williams
","as:inReplyTo":{"@id":"https://rhiaro.co.uk/2015/06/what-profile"},"as:name":["Notes post social-informatics seminar talk","Post Soc-Inf notes"],"as:published":[{"@type":"http://www.w3.org/2001/XMLSchema#datetime","@value":"2015-06-19T11:35:35+0100"},{"@type":"http://www.w3.org/2001/XMLSchema#datetime","@value":"2015-06-19T12:35:35+01:00"}],"as:tag":[{"@id":"https://rhiaro.co.uk/tags/social+web"},{"@id":"https://rhiaro.co.uk/tags/soc-inf"},{"@id":"https://rhiaro.co.uk/tags/notes"},{"@id":"https://rhiaro.co.uk/tags/seminar"},{"@id":"https://rhiaro.co.uk/tags/social+science"},{"@id":"https://rhiaro.co.uk/tags/methodology"},{"@id":"https://rhiaro.co.uk/tags/phd"}]}