Filtering Bias and Search Results. of our searches, called an algorithm1. Search engines use algorithms to determine the relevance of

Similar documents
Kevin DeBoer. Professor Culik. English October 12, Algorithms

MANAGING YOUR MAILBOX: TRIMMING AN OUT OF CONTROL MAILBOX

2016 All Rights Reserved

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

Key questions to ask before commissioning any web designer to build your website.

List Building Starter Course. Lesson 2. Writing Your Campaign. Sean Mize

VIDEO 1: WHY IS SEGMENTATION IMPORTANT WITH SMART CONTENT?

How to Use Your Autoresponder Series for Maximum Affiliate Profits

Lecture 1: Overview

Marketing Guide to Increase Sales

Dental Buyers Guide 101

12 Key Steps to Successful Marketing

Usability Test Report: Homepage / Search Interface 1

Recipes. Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24

Module 6. Campaign Layering

10 Tips For Effective Content

This Event Is About Your Internet Presence.

seosummit seosummit April 24-26, 2017 Copyright 2017 Rebecca Gill & ithemes

Content Curation Mistakes

Strong signs your website needs a professional redesign

Telkomtelstra Corporate Website Increase a Business Experience through telkomtelstra Website

Keyword research. Keywords. SEO for beginners training Module 2.1. What is a keyword? Head, mid tail and long tail keywords

A Step by Step Guide to Postcard Marketing Success

SOLUTIONS GUIDE. I Don t Know What to or

The Seven Habits of Highly Effective Usability People

Using icloud's Mail rules to delete a message before you see it.

COPYRIGHTED MATERIAL. Getting Started with Google Analytics. P a r t

Digital Workflow 10 Tech Rules to Guide You

RESPONSIVE WEB DESIGN IN 24 HOURS, SAMS TEACH YOURSELF BY JENNIFER KYRNIN

Azon Master Class. By Ryan Stevenson Guidebook #5 WordPress Usage

THE DEFINITIVE GUIDE

Taking Control of Your . Terry Stewart Lowell Williamson AHS Computing Monday, March 20, 2006

The 21 WORD . That Can Get You More Clients. Ian Brodie

Crash Course in Modernization. A whitepaper from mrc

MARKETING VOL. 1

How to Get Your Inbox to Zero Every Day

This session will provide an overview of the research resources and strategies that can be used when conducting business research.

How to Write Engaging s

FOUNDATIONS OF COMPUTER SCIENCE BY BEHROUZ A. FOROUZAN DOWNLOAD EBOOK : FOUNDATIONS OF COMPUTER SCIENCE BY BEHROUZ A. FOROUZAN PDF

THE SET AND FORGET SYSTEM

Anatomy of a Standard Transcript

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.

CLIENT ONBOARDING PLAN & SCRIPT

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead

It s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.

** Pre-Sell Page Secrets **

CLIENT ONBOARDING PLAN & SCRIPT

IMPORTANCE OF A MINISTRY WEBSITE

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the

A Beginner s Guide to Successful Marketing

CFMG Training Modules Classified Ad Strategy Module

In our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology.

search engines without algorithms behind them providing you with this filtered information.

15 Minute Traffic Formula. Contents HOW TO GET MORE TRAFFIC IN 15 MINUTES WITH SEO... 3

List Building Income

How To Create Backlinks

Image Credit: Photo by Lukas from Pexels

Page 1

EDULEADERSHIP. Handle Every Kind of for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP

If Statements, For Loops, Functions

Website Validity DOING QUALITY RESEARCH MR. ERFURTH, 2015

GMAIL BEGINNERS GUIDE

Analysis, Dekalb Roofing Company Web Site

Out for Shopping-Understanding Linear Data Structures English

Get Twitter Followers in an Easy Way Step by Step Guide

As a programmer, you know how easy it can be to get lost in the details

Rapid Software Testing Guide to Making Good Bug Reports

WebFire Presents: Wednesday Marke2ng Webinars. New Age SEO. Everything You Need to Know to Get Ranked Today

Table of Contents. 1 Website Enhancement Christmas-ify Your Website from VAT (POA) Falling Snow VAT...

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Introduction! 2. Why You NEED This Guide 2. Step One: Research! 3. What Are Your Customers Searching For? 3. Step Two: Title Tag!

Online Scams. Ready to get started? Click on the green button to continue.

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER

A Brief Writer s Guide to Book Indexing

What is version control? (discuss) Who has used version control? Favorite VCS? Uses of version control (read)

Foundations, Reasoning About Algorithms, and Design By Contract CMPSC 122

DESIGNING RESPONSIVE DASHBOARDS. Best Practices for Building Responsive Analytic Applications

THE MAGIC BEHIND UNBOXING ON YOUTUBE

Writing for Use: Intersections Between Genre and Usability

The MailNinja 7-Step Success Formula For Sending Lead Generating Campaigns

Object-Oriented Thinking

Now that you ve got about 15 seed words, let s go examine the Keyword Planner tool.

AN SEO GUIDE FOR SALONS

Images help us relate to content, help us become involved. They help us to see ourselves in the science, rather than standing on the outskirts.

INTRODUCTION TO UNIX AND SHELL PROGRAMMING BY M. G. VENKATESHMURTHY

Below is another example, taken from a REAL profile on one of the sites in my packet of someone abusing the sites.

MARKETING FOR PROPERTY INVESTORS THE QUICK GUIDE

Writing Cover Letters

. Digital Marketing Agency Telephone: Parliament Street, Floor 3, Office 6, Liverpool, L8 5RN

Bonus Chapter: Going Live. Lesson One: Check Your Site

Fractions and their Equivalent Forms

SEO: SEARCH ENGINE OPTIMISATION

How I use Outlook: Rev 04/17/08

SPAM UNDERSTANDING & AVOIDING

Introduction to

IAE Professional s (02)

Your Clickbank Treasure Map

The Benefits of SMS as a Marketing and Communications Channel From The Chat Bubble written by Michael

Promoting Component Architectures in a Dysfunctional Organization

Transcription:

Group 2 11-12-2012 Professor Hugh Culik English 1190 Filtering Bias and Search Results Many people have become accustomed to the internet as an everyday luxury. It provides access to seemingly never ending information and connects us to our social media websites. Because of how +many people use the internet and how many websites there are, when a search is created, thousands and even millions of results are produced. Obviously this is way too much information to sift through for ourselves and becomes the job of a mathematical equation, which many search engines apply to all of our searches, called an algorithm1. Search engines use algorithms to determine the relevance of information in the index to what the user is searching for. These algorithms are personalized for the internet user. The mission of algorithms is to provide the internet user with less internet searching and show the user what they wanted. However, these algorithms are trapping us into our own little online universe called a filter bubble. Although the filtering is necessary to prevent an information overload, filter bubbles are also very problematic. These filter bubbles are created from algorithms which use past search and click history to control all of your searches. The information is acclimated for the internet user; however, the user cannot decide what gets in their filter bubble and what can get out. With these filter bubbles in place, our online searches become incomplete. Social media websites and search engines have created your own unique online identity for you based upon your past searches, what you've previously clicked on, and location. Although this individualized personalization seems great, there is a lot more to a human being that what they search 1 `Algorithms are a series of very complex equations and well defined instructions that calculate a function. We use these algorithms almost every day without even knowing -anti spam filters used on emails and online searches, images you view, searches you enter, and even the traffic lights you drive through all of these use some form of an algorithm to try and make our lives easier.

for online and what they click online. These algorithms only create a single identity for the user and we are much more complex than one single identity. A computer cannot pick up on all of our identities but it does the best it can with algorithms and our ever expanding filter bubbles. Identity is not certain; we act differently under different circumstances, around different people, and in different situations.

One problematic issue with filter bubbles and personalization is that algorithms characterize the user's identity according to searches. For example, if I was doing a research paper on the best candidate for presidency and I searched for Obama, the algorithms computed may believe I am a Democrat even though I was just doing research. The search of Obama is saved into my filter bubble and can change my search results forever. These filter bubbles can provide information the user wanted but not necessarily what they needed. Searches are incomplete in the sense that they are personalized for our own unique online identity. Just because I search for something and find one website that I like doesn't necessarily mean that the search is complete. With filter bubbles, search engines are trying to take the research away and make it easier for the internet user to find material they want rather than information they need. Algorithms do not allow a careful or diligent search, and therefore, research is being limited to our own personal beliefs due in part to our own unique filter bubbles. Kelvin Newman (2012) gives us a great example of this with a junk food and vegetable analogy. Filter bubbles give us junk food when sometimes we need vegetables. For example, the website DuckDuckGo prides itself on being a search engine that does not use filter bubbles for the internet users. This can prevent your filter bubble from expanding and can lead to a better and more in depth search. Searches conducted on DuckDuckGo as opposed to Google come up with many different results. The search on DuckDuckGo provides you with information you actually searched for whereas Google shows you the information they think you want to see based upon your filter bubble and Google s algorithm. The information obtained on the front page of DuckDuckGo may be tucked into the one thousandth page of Google. Search engines can withhold information from us because the algorithms determine that it is information we would not want to see. Search engines can do this by looking at our complex world of filter bubbles and sorting through our previous history. The filtering is necessary to limit information

overload, however there can be a better way to edit our filter bubble and to expand our search results. Jonathan Stray (2012) stated that, if these individually-tailored filters are successful in giving us only what we want as measured by what we click on or like then maybe they ll remove all the points of view we disagree with, all of the hard truths we d prefer to ignore, and everything else in the world that might broaden our horizons. Stuck in our own little sycophantic universes, we ll be isolated, only dimly aware that other people exist or that we might need to work together with them in a shared world. Jonathan Stray (2012) also asks a very important question, Do filtered media worlds cause the online segregation we see, or do people construct self-reinforcing filters because they already have divergent beliefs? The desire to know everything is limited by technology. Algorithms are an enhanced equation which dictate your search results and shape your filter bubble. With these enhanced algorithms ruling our search results, our end results are limited and vague. Our information we retrieve may not be the information we need. These filter bubbles are needed, but they do limit our knowledge and search capability. Due to these complex algorithms, internet users find it easier to use search engines and don t do the actual research they are assigned. While our filter bubble is expanding, our knowledge of divergent ideas is contracting. Filter bubbles present a major risk to every internet user. The internet is becoming easier to use and all of our searches are easier to conduct. Companies like Google and Amazon track your clicks, purchases, and likes, and convert them into a personal profile they can then sell to targeted advertisers. Then, online advertisers can try and sell you products based upon your unique filter bubble. Spam and other related advertisements are a problem which directly relates to filter bubbles. For example, I was recently looking at the Google Nexus 7 tablet coming out to get as a gift for someone. When I was done searching online, I received a lot of spam e-mails regarding the new Ipad, even though I was searching for something entirely different. Mistaken identity and filter bubbles go hand in hand. What

online advertisers know about you your location, gender, purchasing preferences, favorite news sources doesn t change much from day to day. Online advertisers can only infer so much about your physical and emotional state. Identity is something that can't be established on the internet. In the virtual world, you can have multiple identities and people tend to take this as an opportunity to further explore different identities. Filter bubbles try and establish an identity for you based upon your click history and likes, which is virtually impossible. Algorithms characterize the user's identity according to online searches. Our searches are incomplete in the sense that they are personalized for our own unique online identity. Filtering is necessary to limit information overload, however there should be a better way to edit our filter bubble and to expand our search results to better compensate for our humanistic ideas rather than our virtual identities. People are so trapped in the virtual world of the internet that it is causing them to forget there true self. To have an identity, you need to have a specific set of beliefs. As humans we are continually changing our minds about things, and with this we have come to the conclusion that people do not have there own identity. The internet causes us to change our minds about ideas. We may feel that we have our ideas and beliefs set, but all it takes is one article to change our mind and then what we once believed, we no longer do or do not believe in one hundred percent. We are made up of ideas, beliefs and factors we get from others and not a single person has their own true identity. The biggest factor is the internet and how it frames us as a single identity. How can the internet, and more specifically, algorithms, create a single identity for you when identity does not truly exist in humans. In an article by Sherry Turkle (1999), she states today s life on the screen dramatizes and concretizes a range of cultural trends that encourage us to think of identity in terms of multiplicity and flexibility. Sherry Turkle supports her assertion by putting together theories of cyberspace and identity formation with

understandings of identity found in psychology, sociology, and philosophy. Theories on cyberspace and identity claim that identity is multiple and cyclical. Many humans believe that we have our own identities, but the truth is that because of our constant changing of ideas and beliefs, we truly do not have a single identity. Humans are made up of divergent and constantly changing ideas, beliefs, and thoughts that shape who we are and who we are to become as a human being. Sense of self is not something that is created but rather established through all of these constantly changing ideas and beliefs. Sherry Turkle (1999) states that, The many manifestations of multiplicity in our culture, including the adoption of online personae, are contributing to a general reconsideration of traditional, unitary notions of identity. For centuries individuals have found a way of cementing their identity or guaranteeing a lasting memory of themselves by publishing books, writing plays, creating pieces of art, etc. But we have never had the accessibility that we have now. Lauren Fisher (2012) asks an excellent question: Is it really worth looking your best in an outfit, eating the tastiest meal or looking at the most beautiful sunset if you can t then share that moment with your friends online, simultaneously creating a record for yourself? Fisher also states that, It is these actions which are changing the way we approach identity. It is much less about identity through ourselves, and more about the self through others, more so now than ever before. What then, does this mean for the notion of identity? On the one hand, social media affords us an opportunity to create a more permanent, public version of ourselves, solidifying the idea of our identity, and on the other it has made identity fragile, to the point where it can be completely fake. Is social media strengthening identity or eroding it? The answer, it seems, is neither. What it is doing is changing the idea of identity to something that we have not quite yet got our heads around.

Works Cited 1. Green, Holly. Breaking Out of Your Internet Filter Bubble. N.p.: Forbes, 2011. N. pag. Web. 18 Sept. 2012. <http://www.forbes.com/sites/work-in-progress/2011/08/29/breaking-out-of-yourinternet-filter-bubble/> 2. Doctorow, Cory. "Digital natives" need help understanding search. N.p.: BoingBoing, 2011. N. pag. Web. 24 Sept. 2012. <http://boingboing.net/2011/08/22/digital-natives-need-helpunderstanding-search.html?dlvrit=36761> 3. Johnson, Benjamen. Does Google s Filter Bubble Bias Your Information. N.p.: Minnesota Skeptics, 2011. N. pag. Web. 1 Oct. 2012. <http://minnesotaskeptics.com/tag/filter-bubble/> 4. Wakefield, Jane. When Algorithms Control The World. N.p.: BBC News, 2011. 1-4. BBC News. Web. 10 Oct. 2012. <http://www.comp.dit.ie/btierney/bsi/when%20algorithms %20Control%20the%20World.pdf>. 5. Newman, Kelvin. A Crash Course in Filter Bubbles. N.p.: State of Search, 2012. N. pag. Web. 10 Oct. 2012. <http://www.stateofsearch.com/a-crash-course-in-filter-bubbles-akagoogle-search-your-web/>. 6. Stray, Jonathan. Are We Stuck In Filter Bubbles? N.p.: Nieman Journalism Lab, 2012. N. pag. Nieman Journalism Lab. Web. 10 Oct. 2012. <http://www.niemanlab.org/2012/07/ are-we-stuck-in-filter-bubbles-here-are-five-potential-paths-out/>. 7. Venable, Melissa. Search Engine Savvy: Evaluating Websites. N.p.: Online College, 2011. Online College. Web. 10 Oct. 2012. <http://www.onlinecollege.org/2011/05/05/searchengine-savvy-evaluating-websites/>. 8. Turkle, Sherry. Cyberspace and Identity. Vol. 28. N.p.: Contemporary Sociology, 1999. 643-48. Contemporary Sociology. Web. 7 Nov. 2012. <http://www.jstor.org/stable/ 2655534?seq=6>.

9. Fisher, Lauren. Why social media is leading to a new era of identity. N.p.: Simply Zesty, 2012. N. pag. Web. 7 Nov. 2012. <http://www.simplyzesty.com/social-media/why-socialmedia-is-leading-to-a-new-era-of-identity/#>. 10. Larana, Enrique, Hank Johnston, and Joseph Gusfield. New Social Movements: From Ideology to Identity. N.p.: Temple University Press, 1994. N. pag. Temple University Press. Web. 11 Nov. 2012. <http://books.google.com/books? hl=en&lr=&id=yeglnvarb4cc&oi=fnd&pg=pa1&dq=social+media +identity&ots=xurbisw_lx&sig=w7vb53qldrho32kaylkhq5a_2o#v=onepage&q=social%20media%20identity&f=false>.