{"title":"亚历克斯·彭特兰著《社会物理学:好思想如何传播——一门新科学的教训》","authors":"Faruk Arslan","doi":"10.1080/15536548.2016.1243849","DOIUrl":null,"url":null,"abstract":"In Social Physics: How Good Ideas Spread-The Lessons from a New Science, Alex Pentland introduces the readers to a new field of science: social physics. This new field is defined by the author as “a quantitative social science that describes reliable, mathematical connections between information and idea flow on the one hand and people’s behavior on the other” (Pentland, 2014). This science is geared towards developing insights about the “flow of ideas between people” with the objective of creating better social structures such as companies and cities, for example. Pentland notes how the current studies in the social sciences suffer from using static and limited datasets, through which scientists can discover statistical regularities of social phenomena, but can’t exactly build a “causal theory of social structure.” The growing capability of big data technologies, which facilitate the retrieval, storage and analysis of massive amount of individual and peer to peer interaction data, act as the primary enabler of social physics. Through these technologies, the researcher can build a “living laboratory” and mine the “realities” occurring within the social structure using a diverse set of data-rich platforms such as digital sensing platforms and actual individual behavior. It is important to note that social physics rests upon a key premise—a lot of human behavior is habitual and primarily influenced by social learning, which occurs via peer to peer interaction within a social network. Pentland provides sufficient amount of empirical evidence throughout the book in support of this. The author organizes the book into four main parts following an introductory chapter (Chapter 1: From Ideas to Action). The Part I focuses on the field of social physics, whereas the Part II is dedicated to “idea machines”, which discusses the generation of collective intelligence and how social network incentives can be used as a tool to induce organizational change. Parts III and IV are dedicated to data-driven cities and societies respectively. In addition, the author provides four appendices to elaborate on key topics: Reality Mining (Appendix 1), OpenPDS (Appendix 2), Fast, Slow and Free Will (Appendix 3) and Math (Appendix 4). The author concludes this book by providing detailed notes for each chapter, references and index of key terms used in the book. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each part of the book and conclude my review.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"97 1","pages":"218 - 220"},"PeriodicalIF":0.5000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland\",\"authors\":\"Faruk Arslan\",\"doi\":\"10.1080/15536548.2016.1243849\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Social Physics: How Good Ideas Spread-The Lessons from a New Science, Alex Pentland introduces the readers to a new field of science: social physics. This new field is defined by the author as “a quantitative social science that describes reliable, mathematical connections between information and idea flow on the one hand and people’s behavior on the other” (Pentland, 2014). This science is geared towards developing insights about the “flow of ideas between people” with the objective of creating better social structures such as companies and cities, for example. Pentland notes how the current studies in the social sciences suffer from using static and limited datasets, through which scientists can discover statistical regularities of social phenomena, but can’t exactly build a “causal theory of social structure.” The growing capability of big data technologies, which facilitate the retrieval, storage and analysis of massive amount of individual and peer to peer interaction data, act as the primary enabler of social physics. Through these technologies, the researcher can build a “living laboratory” and mine the “realities” occurring within the social structure using a diverse set of data-rich platforms such as digital sensing platforms and actual individual behavior. It is important to note that social physics rests upon a key premise—a lot of human behavior is habitual and primarily influenced by social learning, which occurs via peer to peer interaction within a social network. Pentland provides sufficient amount of empirical evidence throughout the book in support of this. The author organizes the book into four main parts following an introductory chapter (Chapter 1: From Ideas to Action). The Part I focuses on the field of social physics, whereas the Part II is dedicated to “idea machines”, which discusses the generation of collective intelligence and how social network incentives can be used as a tool to induce organizational change. Parts III and IV are dedicated to data-driven cities and societies respectively. In addition, the author provides four appendices to elaborate on key topics: Reality Mining (Appendix 1), OpenPDS (Appendix 2), Fast, Slow and Free Will (Appendix 3) and Math (Appendix 4). The author concludes this book by providing detailed notes for each chapter, references and index of key terms used in the book. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each part of the book and conclude my review.\",\"PeriodicalId\":44332,\"journal\":{\"name\":\"International Journal of Information Security and Privacy\",\"volume\":\"97 1\",\"pages\":\"218 - 220\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/15536548.2016.1243849\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2016.1243849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Social Physics: How Good Ideas Spread-The Lessons from a New Science, by Alex Pentland
In Social Physics: How Good Ideas Spread-The Lessons from a New Science, Alex Pentland introduces the readers to a new field of science: social physics. This new field is defined by the author as “a quantitative social science that describes reliable, mathematical connections between information and idea flow on the one hand and people’s behavior on the other” (Pentland, 2014). This science is geared towards developing insights about the “flow of ideas between people” with the objective of creating better social structures such as companies and cities, for example. Pentland notes how the current studies in the social sciences suffer from using static and limited datasets, through which scientists can discover statistical regularities of social phenomena, but can’t exactly build a “causal theory of social structure.” The growing capability of big data technologies, which facilitate the retrieval, storage and analysis of massive amount of individual and peer to peer interaction data, act as the primary enabler of social physics. Through these technologies, the researcher can build a “living laboratory” and mine the “realities” occurring within the social structure using a diverse set of data-rich platforms such as digital sensing platforms and actual individual behavior. It is important to note that social physics rests upon a key premise—a lot of human behavior is habitual and primarily influenced by social learning, which occurs via peer to peer interaction within a social network. Pentland provides sufficient amount of empirical evidence throughout the book in support of this. The author organizes the book into four main parts following an introductory chapter (Chapter 1: From Ideas to Action). The Part I focuses on the field of social physics, whereas the Part II is dedicated to “idea machines”, which discusses the generation of collective intelligence and how social network incentives can be used as a tool to induce organizational change. Parts III and IV are dedicated to data-driven cities and societies respectively. In addition, the author provides four appendices to elaborate on key topics: Reality Mining (Appendix 1), OpenPDS (Appendix 2), Fast, Slow and Free Will (Appendix 3) and Math (Appendix 4). The author concludes this book by providing detailed notes for each chapter, references and index of key terms used in the book. In the upcoming paragraphs, I will provide a review of the key ideas discussed in each part of the book and conclude my review.
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.