Review of “Networked” in Science And Public Policy

Reviews of Networked are beginning to be published in academic journals. This review in Science and Public Policy is especially nice and insightful and we got permission to republish it. We are very grateful for that.

By J. Francisco A ´ lvarez
National Distance University of Spain (UNED)

Lee Rainie and Barry Wellman are two outstanding researchers on the topics of the internet and the social changes triggered by information and communication technologies (ICT). The work carried out by Rainie at the Pew Research Center and by Wellman at the University of Toronto is well known in academic circles concerned with the network society. Those who are exposed to, and closely follow, the changes arising from the network society may know these two authors particularly well, since they are indeed both generators and analysts of new trends in cyberspace.

Around 60 books which include in their title the word ‘networked’ appeared in the Library of Congress Online Catalogue for 2012. It is probably not in the process of concept coinage that the authentic novelty of Networked: The New Social Operating System lies. The concept itself can be traced back, through previous work by these same authors to the widely read books by Manuel Castell. Yet, in my opinion, the way in which Rainie and Wellman make use of a quasi-fictional narrative to analyse the network society is truly innovative. Starting with how, in practice, certain characters experience all aspects of their lives within the network society—a truly transitional process which turns them into actual networked individuals— we can observe how a new type of sociability is thus generated from the multiple weak links which are possible thanks to the spread of ICT.

Prima facie, Networked exhibits a chronicle of daily life on the internet, with examples and practical situations, while at the same time capturing a large number of outcomes from research studies, reports and statistics that point towards the strengthening of a triple revolution which is currently taking place. In this process, the internet, mobile devices and the social networks are interwoven. This triple revolution supports what we could call a new type of social operating system, amounting to a new mode of human functioning. This transformation is not the simple outcome of the latest technological trend, but rather it is deeply rooted in sociability’s powerful impetus towards the establishment of extended human groupings, now enhanced by new capabilities for mobility and network expansion.

In a metaphorical sense, the book is thus a real ‘notice to mariners’ sailing the new world of digital transformation. Networked provides extensive recommendations and advice addressed to us all, the common people, for greater efficiency in our human activities within a sociotechnical society.

The specific cases described in the book show aspects of the network society in great detail, in a highly zoomed close-up. Still, this highly descriptive feature may hide what, in my opinion, is the best aspect of this very smart and witty book, namely, the characterisation and conceptualisation of the new actors, the networked individuals, who make up and structure network society.

When we understand this transformation and realise that now society moves, is organised, and is structured around the new social operating system (networked individualism), we can apply these new notions to any aspect of our personal, working, training and social life and consider the transformation that each of those aspects has undergone.

As the book progresses, it shows in practice both how a new social fabric is arising and how new types of individuals are interwoven. I believe that what we have here is a very well-balanced description and an enlightening prospective analysis which shows a broad range of possibilities and offers us a very useful metaphorical tool with which to understand our society. We find ourselves in a new society which operates in a different mode, where many frontiers are blurring:

Or we observe:

The key issue here is not the more or less good narratives of some characters that appear in the book. This is not fiction about the internet, it is a conceptual building on the triple revolution idea which points to possible paths for the network society in future.

The metaphor of the ‘operating system’ is a very powerful tool to understand what happens in our society beyond the obvious and increasing use of all types of devices and prostheses in our daily lives.

More and more weak links, fewer and fewer strong ones, offering a fine multi-layered weave that offers individuals new capabilities and provides them with other options and other goods in all overarching activities, ranging from their family, work, enterprise or hobby groups, to political parties or research teams.

Perhaps the best explanation I could offer for what networked individualism is about is to describe the process I have followed myself, as a networked individual, to carry out this review. To start with, I reached an agreement with the editors by email, following my positive response to a general request they put forward by email. But the most significant aspect is how I obtained extensive data on Lee Rainie and Barry Wellman without leaving my home desktop, a research style that would have been impossible only 10 or 20 years ago. But, as we can read in Networked,the transformation not only affects an individual, the changes are also relational. Thus you, the readers, are also able to change your experience as readers of reviews.

I ask you to take part in two short practical activities because I believe that they allow a better understanding of the main topics in this book. I suggest you connect to the following two internet sites and watch two videos that are freely available and accessible.

The first link is here, a video from the University of Arkansas, Clinton School of Public Service (4/14/2009) where: ‘an expert on social, computer, and communication networks, sociologist Barry Wellman gives a lecture titled, Connected Lives: The New Social Network Operating System’. Here we are able to observe the views developed by one of our authors three years before Networked was published as a book.

The second action I suggest you carry out is to follow this other link, where ‘Lee Rainie (6-5-2011) discusses technology and libraries at San Francisco Public Library’.

This review tries to show how currently the reviewer’s activities need and must change as we (both reviewer and reader) are networked individuals with an enhanced reality and with many new capabilities. This review is neither limited to, nor exhausted within, its 1,300 words. As a tweet, even just a few words can contribute to opening our eyes, modify our old surroundings and help us become part of a new global, interwoven society of individuals.

I do strongly recommend that you read Networked in depth, an experience which now involves an enlarged, multimedia reading. As the authors said in their preface:

. . . we note that all revolutions are lumpy. For example, despite all of our revolutionary talk, this book is still a traditional book—whether on paper or as an e-book. (p. x)

Rainie and Wellman offer us a truly powerful conceptual tool to help us think about our society. The idea of a new social operating system, transferring the notion of the operating system, as it is used in computer science, to society as a whole, is changing our comprehension of the network society and it challenges our traditional notions about sociability, social networks and human capabilities.

J. Francisco A ´ lvarez
National Distance University of Spain (UNED),
Despacho 318, Paseo de Senda del Rey, 7, 28040 Madrid, Spain;
Email: jalvarez (at)

Networked: The New Social Operating System by Lee Rainie and Barry Wellman

MIT Press, Cambridge, MA, 2012, 378 pages, US $29.95 (hardcover), ISBN 9780262017190


5 findings about privacy

By Lee Rainie and Mary Madden

Revelations about privacy problems and privacy breaches are now a staple of daily news: Your laptop webcam may be spying on you; tens of millions of Target Corp. customers’ credit card records might have been stolen; data brokers are under fire for selling lists of rape victims, police officers, domestic violence shelters, and AIDS sufferers and other groups to marketers.

The fallout from the Edward Snowden leaks about the surveillance programs of the National Security Administration continues: Federal Judge Richard Leon, called the NSA phone and email surveillance “almost Orwellian” and a likely violation of the Constitution; the 193-member United Nations General Assembly unanimously passed a resolution affirming “that the same rights that people have offline must also be protected online, including the right to privacy” in the wake of revelations that the US surveillance included leaders of Germany and Brazil; and a White House advisory panel recommended that the NSA kill its massive database of phone calls in the US.

The Pew Research Center has been studying privacy issues for years both from the technology side of the story and the policy side of the story. Here are five key insights we’ve gained along the way:

1) Paradoxes in public attitudes and activities lie at the heart of privacy research.

The vast majority of Americans say privacy matters to them as a personal value and yet many live their lives in ways where disclosures about personal information are commonplace and second nature. When it comes to their policy choices, they often say that privacy is an important value, but many also indicate that issues other than privacy – such as security or acting against terrorists – can matter more than privacy.

The PRC’s Internet Project’s first study about online privacy in 2000 found what others had found: Privacy matters to Americans and they are quite anxious about it being compromised. At the same time, we found that many online Americans were doing things online that involved personal information disclosure and felt they were getting benefits from that. These crosscurrents of opinion have persistence in the project’s work ever since.Perceptions-of-the-Governments-Data-Collection-Program

When PRC’s Politics pollsters have explored public opinion about surveillance programs, there are often split verdicts. For instance, in late July, PRC found that 56% of Americans said federal courts fail to provide adequate limits on government surveillance of telephone and internet data and 70% said they believed the government was using this data for purposes other than investigating terrorism. (This survey was conducted before Judge Leon’s ruling this week.) Still, by a 50%-44% margin, people approved of the government’s data-collection program, including a notable number who believed their own email and phone calls had been monitored.

2) Privacy is not an all-or-nothing proposition for most Americans.

People’s decisions about whether to disclose information about themselves and how to disclose it are highly context dependent and fluid. Their choices are shaped by what personal information is at issue; who is watching or capturing the data; and what they see as the “value proposition” of disclosing material. What really matters to people is that they be able to control how their information is captured and used.

PRC’s report about online anonymity in September is full of findings about how people place different values on different kinds of information. For example, online Americans are much more concerned about others knowing the content of their emails than they are about others knowing how they use search engines.

content to control

One of the foundational findings of pioneer privacy researcher Alan Westin a generation ago, was that the majority of Americans are what he called “pragmatists” – they are often in a transactional frame of mind as they ponder whether to disclose personal information or not. The pragmatists are judging whether the deal they are being offered for giving up some personal information is worth it as they are enticed by discounts, by access to products, services and content, or chances to win a prize or sweepstakes. The other groups he identified were “privacy fundamentalists” – the people who are eager to preserve their privacy – and “the unconcerned.”

3) Even as people want to be more anonymous at times, many feel it’s not possible in the current online environment, and they do not think current laws are good enough at protecting their privacy.

Fully 86% of internet users try to be anonymous at least occasionally, but 59% do not believe it is possible to be completely anonymous online, according to our September report.

Most internet users know that key pieces of personal information about them are available online – such as photos and videos of them, their email addresses, birth dates, phone numbers, home addresses, and the groups to which they belong. Some 50% say they are worried about that these days, up from 33% in 2009.

Two-thirds (68%) of internet users believe current laws are not good enough in protecting people’s privacy rights.

4) In the hierarchy of citizens’ privacy concerns, social surveillance is a more top-of-mind concern to people than government surveillance.

People are more likely to experience or witness reputational privacy breaches within their own social networks than they are to be aware of how the government’s access to their data might negatively impact their lives. When we asked internet users from whom they were trying to hide, their top answers were hackers and criminals, advertisers, friends, people from their past, and family members.

try to avoid

At the bottom of the list of concerns, only 5% of internet users said they were trying to be anonymous online to avoid the government and 4% said law enforcement.

5) The surveillance landscape has changed radically in the post 9-11, smart-phone world. Opting out of certain technologies is increasingly not a viable choice for those whose jobs or family communications depend on cell phones, social media and other online services.

There are actually several parts to this story that were highlighted in the Rainie- Barry Wellman book, Networked. First, and most obvious, is government and business surveillance and the merger of the two – even if the business world is an unwilling partner.

The second part of the story is what has been termed sousveillance. People have new ways to monitor the powerful and hold them accountable and there is really interesting energy in the worlds of journalism and civic enterprises to gather and interpret government and corporate data and hold big organizations accountable for their performance.

The final part of the story could be called coveillance – everybody is watching everybody else – sometimes in creepy, stalking ways; more often in open and harmless ways.

It’s the modern reality that media scholar danah boyd refers to as, “Public by Default … Private Through Effort” – the exact reverse of the situation in the pre-internet age when it was pretty easy to assume you could be private even when you were in public.

Next year will certainly bring more privacy news – and more insights about public behavior and attitudes. We at the PRC will be paying special attention to sorting through the contexts in which people make different kinds of decisions about disclosure and how much surveillance they will tolerate. We will also be trying to see if at least some of the reason people say privacy matters, but then behave as it if didn’t matter that much, is that they are not fully aware of all the ways information is gathered about them and how that aggregated information is used.


Digitizing Ozymandias

By Barry Wellman, NetLab, University of Toronto

The dialectic between the virtual and the material is not new. Recall Percy Bysshe Shelley’s 1819 poem Ozymandias describing the statue of a fictional great warrior, where only the legs and the pedestal remain. Here’s the poem:

I met a traveller from an antique land
Who said: Two vast and trunkless legs of stone
Stand in the desert. Near them, on the sand,
Half sunk, a shattered visage lies, whose frown,
And wrinkled lip, and sneer of cold command,
Tell that its sculptor well those passions read
Which yet survive, stamped on these lifeless things,
The hand that mocked them and the heart that fed:
And on the pedestal these words appear:
“My name is Ozymandias, king of kings:
Look on my works, ye Mighty, and despair!”
Nothing beside remains. Round the decay
Of that colossal wreck, boundless and bare
The lone and level sands stretch far away.

And of course, someone has constructed a physical replica of the non-existent statue that has been virtually portrayed in the poem.

Nor is Ozymandias a singular case. The next time you go to Verona, I guarantee you’ll see a crowd gathered at the base of “Juliet’s balcony”. Indeed, you can rent the balcony for your wedding ceremony.  But, of course, Juliet (and Romeo) existed only in the world of Shakespeare’s 16th century play. If they had lived today, they would have used mobile phones to stay alive. Their reliance on mobile phones would have removed them from the surveillance of their parents. “But their parents would have seen the bill at the end of the month,” one of my students protested. “Not if they texted,” another student from the Middle East answered knowingly.

So the interplay between the digital and the material – between atoms and bits – continues and develops. Yet, these are not separate worlds: there is no “digital dualism”, to use Nathan Jurgenson’s nice term (2012). Rather, we and our physical objects are part of the same worlds, although we need to think carefully about how we take care of and link our bodies, minds, and artifacts.

On November 13, 2012, Whitney Erin Boesel tweeted and emailed about a debate in her University of California Santa Cruz graduate course. Sociology professor Jenny Reardon asked her class, “What about albums: Do people still listen to albums.” Boesel reported: “This caused some confusions; what does she mean by ‘album?’ Do digital files count? I interjected to define an album as ‘a set of tracks that an artist records and releases together, as a set and in a specific order, that you listen to in that order.’” Prof. Reardon responded, “See, an album is no longer a ‘thing’; it’s become a concept!” The material album has become a virtual concept.

Yet, I am writing this essay while listening to the sound of the Rolling Stones’ greatest hits—on a vinyl LP of course. Next to me, the face of Keith Richards stares from the material cover of his majestic autobiography (2010), part of whose joy is its hefty 565 pages. This is an experience that cannot be fully reproduced in an e-book.

But even an e-book is crippled today. When I read Keith Richards on e-book, I should be able to click and hear the song he’s discussing, and I should be able to click on the photos or videos of the events he is recounting. I can’t get enough satisfaction just reading the text, despite a pretty good rock n roll memory. When Lee Rainie and I put together our Networked book (2012), we were frustrated that the Kindle e-book version did not have any hyperlinks. When Toronto subway riders read the electronic version of the porn novel Fifty Shades of Grey  (James, 2011), where are the animations, the moans, and the instructional videos? This might be one of the few places where earphones would be welcomed by all.

Look at how formerly stand-alone objects have gone digital and social. Consider the Mona Lisa, at whom multitudes have stared while trying to figure out who she was and why she is half smiling. Even Nat King Cole could not figure it out (

Of course, the social came before the digital. Leonardo didn’t just do solo shots: consider his The Last Supper. It may be two-dimensional, but it certainly shows some of the connections among Jesus and his disciples.

Nor is the digital always social. Some of us are old enough to remember that the first personal computers in the 1980s predated the internet. They were primarily stand-alone word processors and spread sheeters. But then social media came along, now epitomized by Facebook. Basically, it combines the Mona Lisa with the Last Supper. One heart of Facebook is the self-portraits it presents: the profiles that individuals prepare about themselves. This is the Mona Lisa and the Ozymandias approach. Or, if you prefer a digital approach, it resembles the one-way nature of Web 1.0 where many of us prepared self-description pages complete with bloggish musings. Imagine if Jesus had his own page, with all of his sayings on it. Or if you are secular, call up “facebook” on Google images, and the first screen will be filled with multiple pictures of Facebook founder Mark Zuckerberg. If you believe The Social Network movie, Zuckerberg founded Facebook to find friends (Fincher, 2010).

But, Facebook is more than profiles. It is also a series of fishing lines, connecting the person at the centre of the network to his or her “friends”. In short, it’s the fellowship of the Last Supper, with each person at the centre of his or her universe. Yet Facebook can do better than Leonardo in two ways. First, it can provide detailed profiles of each individual, and second, it can provide openings to learn about friends of friends. Just who was Judas hanging out with? Oxford sociologist Bernie Hogan and I are writing a paper about this called “The Relational Self-Portrait: How Social Network Sites Put the Network in Networked Individualism” (2013).

Moreover, just as Facebook connects individuals to their friends, the concatenation of these networks connects cities and continents. Although this is a relational artifact that only digital analysis can discover, nevertheless, it is real. At times, the digital and the physical coincidence: Yuri Takhteyev, Anatoliy Gruzd, and I (2012) have shown that interconnections on Twitter largely mirror airline routes. Many people use Twitter to talk to those with whom they have in-person contact.

In our NetLab’s work, we argue that North Americans—and perhaps others—are moving toward a networked society centred on individual connectivity—what Lee Rainie and I have called “networked individualism” (2012). What are the implications for the missions of libraries and archives?

In pre-industrial days—and still in very rural parts of Canada—the society was door-to-door. The building block was groups, embedded in villages and neighborhoods, with all of their social support and social control. This is where people got their information. This is what libraries originally served and where nascent archives—often in the hands of village schoolteachers, clerks or pastors—got their material. Indeed, some of us still wander churchyards to get our historical sense of a place. Big national libraries and archives were far away, difficult to access, and only for canonically important material. Mostly, knowledge came from within the group and stayed within the group.

The situation changed in the late twentieth century with the proliferation of multiple technologies that weakened the boundaries of distance: the telephone, the car, the airplane for two-way communication, and the radio, movies, and television for one-way information flows. In this “glocalized” milieu, family and work units remained important, but information and communication links were less constrained by distance—what we call “place-to-place” connectivity (Wellman and Hampton 1999).

Rather than a single canonical source of information and communication, people were embedded in multiple, partial social networks that sometimes conflicted. Information sources proliferated, and while archives remained distant, they became more accessible. Although I write in the past tense, this situation continues for many people.

Personal networks have come to the forefront with the proliferation of personal computers, the internet, mobile devices, and multiple-car households. People function more as networked individuals and less as group members. This provides them with greater access to multiple sources of information and communication, at the cost of less contact with tangible objects. I call up a picture of Ozymandias or The Last Supper rather than having a direct physical encounter with them. Rather than LP records or CDs, there are personal MP3 players. Information has become networked through links, crowdsourcing, perpetual editing, and feedback. The social control of the group has been replaced by the social control of governments and large organizations that have access to emails and databases of search information. For better or worse (and in fact, both simultaneously), amateur experts sit aside credentialed experts. Books, music and objects—the historic domain of libraries and archives—are now going to people rather than people going to them.

The map we now have of how people will communicate and get informed is undoubtedly wrong. We know little about the bulk of online communication that resides in the dark web that Google and Facebook do not access; we know even less about what the future will bring. We do know there will be ongoing tensions between personal freedom and mega-organizational control (Kling, 1989; McElheran 2012; Rainie and Wellman, 2012; Chapter 11). Who will the agent-based software work for? We do know the half-century long struggle between digital personalization and central control will continue as we all grope toward a better future.


Fincher, David, director. 2010. The Social Network. Culver City, CA: Columbia Pictures. October 10.

Hogan, Bernie & Barry Wellman. 2013. “The Relational Self-Portrait: How Social Network Sites Put the Network in Networked Individualism.” Forthcoming in Society and the Internet, edited by Mark Graham and William Dutton. Oxford: Oxford University Press.

James, E(rika). L(eonard). 2011. Fifty Shades of Grey. New York: Vintage.

Jurgenson, Nathan. 2012. “The IRL Fetish.” The New Inquiry, June 28.

Kling, Rob. 1989. “The Institutional Character of Computerized Information Systems.” Office: Technology and People 5(1): 7-28.

McElheran, Kristina. 2012. “Decentralization versus Centralization in IT Governance.” Communications of the ACM 56, 11: 28-30.

Rainie, Lee and Barry Wellman. 2012. Networked: The New Social Operating System. Cambridge, MA: MIT Press. Kindle e-book:

Richards, Keith. 2010. Life. New York: Little Brown

Shakespeare, William. c1597. Romeo and Juliet.

Shelley, Percy Bysshe 1819. “Ozymandias” in Rosalind and Helen, a Modern Eclogue, with Other Poems. London: Ollier.

Takhteyev, Yuri, Anatoliy Gruzd and Barry Wellman, 2012. “Geography of Twitter Networks.” Social Networks: 34, 1: 73–81

Wellman, Barry and Keith Hampton. 1999. “Living Networked On and Offline.” Contemporary Sociology 28, 6: 648-54

1 All photographic reproductions of works of art are taken from Wikipedia. These photographs, as well as the original masterpieces, are held in the public domain.


I am grateful for the comments of the participants in the Library and Archives Canada “Whole-of-Society” seminar (Ottawa, November 2012) and for the editorial support of Isabella Chiu and Esther Jung Yun Sok.

How to thrive in a networked world – book chapter excerpt

By Lee and Barry

The theme of our book is that it is a networked world, and that being networked is not so scary. Rather, it provides opportunities for people to thrive if they know how to maneuver in it. Arguably, the emerging divide in this world is not the “digital divide” but the “network divide.” Technology continues to spread through populations, so the emerging need is for people to learn how to cultivate their networks—and to get out from the cocoon of their bounded groups.

Those who want to thrive in the network operating system need insight into its realities and need to practice how to function effectively in this changed world. People and institutions exist now in information and communication environments that are strikingly different from the ones that existed just a generation ago. People’s relationships remain strong—but they are networked. Neighbors, and neighborhoods still exist, to be sure, but they occupy a smaller portion of people’s lives. It is hard to borrow a cup of sugar from a Facebook friend 1,000 miles away, but it has become easier to socialize, get advice, and exchange emotional support at whatever distance. Where commentators had been afraid that the internet would wither in-person ties, it is clear that they enhance and extend them. It is not an either in-person OR online dichotomy; it is an in-person AND the internet AND mobile contact comprehensiveness. They all intertwine in the ecology of the relationship.

These, then, are the hallmarks of the new operating system in which networked individuals function: The volume of information has grown and the pace is accelerating. The variety of information sources has boomed. The velocity of information is accelerating (especially at the level of personal news and niche communities). The places and times in which people encounter information, media, and each other have expanded to anywhere at any time as long as there are mobile connections. People’s attention to communicating and gathering information has become simultaneously more fractured as sources multiply and more focused as their searches become more specific. Information itself has become networked and more densely packed, making people’s experiences with it more immersive and participatory. The capacity of people to find relevant, abundant information on topics has radically improved in the era of instant search. The ability of people to tell their own stories and share their own ideas has substantially broadened in the era of social media. And their ability to build, tap into, and learn from personal networks has bounded upward with the rise of social networking sites and other applications.

These changes in the network operating system have affected individual’s behavior and attitudes. Among other things, people now expect to find information on almost every subject quickly. They expect that they are more findable and reachable at many more times and places than in the past—and they assume others are equally as likely to be accessible. They change the way they use their time and allocate their attention. They pack more information and communications exchanges into their days and they are interruptible in their activities more often. Their sense of place, distance, and presence with others is transformed as they participate in more encounters that feature “absent presence” or “present absence.” Their sense of self transforms from a hard unitary shell to a reconfigurable amoeba with situationally changing pseudopods. Their sense of personal efficacy grows as they practice the art of seeking and gaining social, emotional, and economic support using new technologies. Those activities also highlight the extra effort that networking requires.

This is an operating system that confers social and economic advantages to those who behave effectively as networked individuals, blending significant personal encounters and new media as they solve problems and build social support….

[The book then describes an extended story of Linda Evans, a woman who rebuilt her life after a divorce by tapping into her extended and extensive network and using technology to access information and people who could give her assistance and help her make decisions. We discuss how her friends and her use of technology helped rebuild her social life and remarry; how she used her social network and online searches to find a pathway to getting advanced academic degrees and moved her career along; how her extended group of friends and acquaintances helped her make solid financial decisions; how she built a powerful and far-reaching online support group for those suffering from Myasthenia Gravis; and how her technology use played a central role in her mothering and in her efforts to stay connected to those she loved.]

The New Rules of Networked Individualism

Linda Evans is a networked individual. Her story of how she used the various strands of her social network to meet her needs is typical of those who now navigate their personal networks to get the aid and comfort they need. There was very little overlap among the various groups who assisted her in different aspects of her life-rebuilding effort. The people who were most instrumental in helping her make her educational and career-development choices do not know the people to whom she turned when her emotional and social life was troubled. And people in those groups had no direct point of connection with the people and online resources that were important to Linda as she wrestled with questions about her finances.

Linda’s story demonstrates how the social shift toward networked individuals changes the rules of the game—the operating system—for social, economic, and personal success. Abundant evidence shows that good, strong social networks of all kinds have important benefits. Moreover, those with relatively big and diverse networks, including many weak-tie associates, gain special advantages. They get information, support, and advice from more—and more diversified—sources. They are freer to move between different networks, when one becomes too controlling or does not supply what they need. They have the capacity to construct their own groups and negotiate the terms of their engagement with others.

Without consciously following the “rules” of the new social operating system, Linda was practicing the precepts of those who generally do better in a world of networked individuals:

Invest in existing relationships via the Golden Rule so that help will be there when needed: Some old friends were the ones who checked in with Linda regularly right after her separation, commiserated during long phone calls when she felt poorly, and were sounding boards during the legal process leading to divorce. Other long-time pals served as coaches and technical support when she needed to master computers and the internet. And still others helped out with household logistics such as carpools for her children. “My best friends walked with me every step of the way,” she says. Surely that was because Linda had given similar aid and comfort to them when they had times of need.

Use Information and Communication Technologies (ICTs) enthusiastically and nimbly: Linda developed from having little involvement with ICTs into an enthusiastic active user of a variety of internet and mobile technologies. Beyond appreciation of technology and having the skills to use it, media-literate people are in better shape as networked individuals in their ability to find information, assess it, react to it, and even remix it with their own creative spin on it. With this sort of media realism, people can manage their networks better. Not surprisingly, those who have broadband internet connections and are serious internet and mobile users tend to have bigger and more diverse networks and have contact with a wider array of partners. They do not sacrifice the quality of their relations for the greater quantity of their ties. New digital tools give them more ability to function in larger networks.

This is not a blanket endorsement that urges everyone to be early adopters of new ICTs. Rather, it is to note that the evidence suggests that people do well as networkers if they are not timid about technology. In some Pew Internet findings, more active technology users had bigger and more diverse networks, and more socially useful contact on a regular basis.

Use technology to develop your access to a wider audience that can share your interests: Linda Evans used technology to create and maintain a thriving Myasthenia Gravis support group. The wisdom of crowds can now be tapped in ways that were impossible in the pre-internet era. The web is full of examples of people acting altruistically or seeking help from strangers and getting it. The “audience” layer of people’s networks often stands ready to respond when a request for help comes along. In a modest, unscientific sampling of 294 tech-savvy people who had agreed to take online surveys, Pew Internet found that roughly two-thirds had done something altruistic online on behalf of strangers or just to give a distant connection a helping hand. Many had responded on listservs and other discussion forums to strangers who had technology problems. Many others had given consumer tips on products and services.

One respondent said he was happy to act as an informal trip adviser just for the fun of helping people have good travel experiences. Another performed language translation activities for non-English-speaking inquirers. Another acted as an advice giver and listener to anonymous victims of domestic violence. Another was a group leader on Griefnet and regularly interacted with newcomers to the site seeking to be consoled. Another who was an amateur genealogical expert after years of practicing it as a hobby online said she regularly assisted others get started on their own family trees and provided links to relevant resources. Another helped connect people seeking to adopt pets to those trying to get rid of pets on Craigslist. Another had created an online support group for people suffering from lupus and dealt with queries from strangers every day. Another did the same for those recovering from weight-loss surgery. Another provided free editing assistance for wannabe writers. Another described a prolonged online session where he comforted someone who had received a death threat and extortion scheme that proved bogus. A photography enthusiast regularly posted free advice columns offering tips to amateur photographers. Another acted as an aggregator of links and advice to parents of gifted children. Another took it upon herself to become a patient advocate for strangers seeking help from the Veterans Benefit Administration. Another ran an online support group for families with soldiers in Iraq and Afghanistan. And on and on and on.

Stay active and nimble: Know how to scan the different segments of your social network so you can access the people who are the most suitable to provide the needed information and support. Linda used a variety of contacts as she was making decisions about her educational options—different ones during periods when she was pondering new options. “When I first went back to school, I ran it by a few girlfriends, but it wasn’t a hard decision,” she recalls. “I had to do it and there was an easy option. When I was going for the higher degrees I felt it was best to talk to professionals and experts—and do a lot more research on my own. My effort was more serious because the stakes were higher and I was less certain at the beginning what the best choice was.”

Do not count on a single, tightly connected group of strong ties to help: Linda pulled together one-to-one encounters or ad hoc groupings on an “as needed” basis. “I often had very specific needs and each new need was different enough from the last one that I needed another person to help me,” she said. Groups in the networked age are often too weak, small, specialized, and uncoordinated to hang together over the course of an extended problem-solving period. They often lack access to a shifting diversified set of resources. One-to-one relationships and partial networks are the ones that usually are most effective and efficient.

Develop meaningful new ties as you go along and be especially alert to reaching into new social circles that serve your purposes: Linda made new friends in the church group of divorced people, her teacher buddy Barb who linked her to information relevant to entering the master’s program, her classmate Marci who affirmed her decision to seek a Ph.D., and her tax preparer’s son Troy who became her financial mentor. None knew the others or traveled in the same circles. They had varying interests and expertise. All were appropriate choices for advice and support when Linda was making decisions. Asked if she was consciously trying to diversify her social network in these choices, Linda demurred: “It would be more accurate to say that I had a sense of who had the most knowledge to help me or whose insights into me and my personality seemed accurate.”

Develop larger and more diverse networks: Personal networks can now run to thousands of people, if you count the most remote, but still meaningful consequential strangers. Look at all the ties that Linda was accreting in little more than a decade, with many more ties to come and few to lose. No doubt she will rely on Facebook or similar software to keep in some contact with friends from past years and life experiences.

Although bigger is not always better, those with diverse, broad-ranging networks are often in better social shape and have a greater capacity to solve problems than those who have smaller networks. Quantity does equal quality. Not only do larger networks provide more overall sociability, support, information, and connections to the rest of the world, but also preliminary research shows that each tie in a large network is likely to be more supportive than those in smaller networks. A culture and network of support breeds more support. And, those with many functional “weak ties” can find support and solve problems more adeptly than those who are deeply embedded in a small, tight social network.

In the digital era, networking behavior turns out to be an efficient way to collect and verify information. Recent research has shown that connections between clusters of friends—or websites—are efficient structures for acquiring information. Most clusters contain superconnectors—people linked to large numbers of others in multiple social milieus—and these connectors rapidly diffuse information. At the same time, talking to friends within clusters allows people to assess and validate the information they have received.3

Act “transitively” and not “dyadic”: Look beyond your friends to become aware of the people in their networks who could provide access to new worlds. That is what Linda did when she asked her boss Susan for help finding someone who could help her manage her divorce nest egg. That same impulse prompted Linda to ask a similar question of Cynthia, the tax preparer. “I didn’t know any good financial advisers on my own,” recalls Linda, “so I had to get tips from the people who seemed more financially-savvy than I am. I figured there would be someone in their lives who’d be a good fit for me.”

Act as autonomous agents to cultivate your personal networks: In the good old days of strong kinship systems and closely knit villages, people could sit back and let things happen to them. They’d wander to the pub and find friendship, go to their mother-in-law’s house every Sunday for dinner, and know there would be support when trouble struck. With dispersed, sparsely knit person-to-person networks, those days are no longer here. Linda had to reach out and actively get help and advice. She even had to go to her church group for help rather than waiting for them to come to her.

This is the era of free agents and the ethic of personal agency. Social advantages and privileges accrue to those who prospect for network ties the way effective sales agents prospect for clients. The individuals primed to take advantage of this are the ones who are motivated to reach out to others, share their stories and support, and then invite conversation, feedback, and reciprocal gestures. The internet and mobile phones vastly expand the capacity of people to do the outreach and nurturing of friendships that are part of prospecting.

Monitor and manage your reputation—your personal brand: At the first level, individuals need to monitor the information about them because there is likely to be much more available in social media such as Facebook, blogs, listservs, photograph sites such as Flickr, video sites such as YouTube, and online discussion forums.

Information persists once it has been created and communicated online. As information scientist danah boyd notes, “What you say sticks around. This is . . . not so great when everything you’ve ever said has gone down on your permanent record. . . . [Moreover,] you can copy and paste a conversation from one medium to another, adding to the persistent nature of it. This is great for being able to share information, but it is also at the crux of rumor-spreading.”

In effect, there are limitless possible ways to recreate and reshare and recommunicate material after it has been created digitally. Even worse for those bent on anonymity, boyd points out that people and information are searchable even if you segment your network: “With social media, it’s quite easy to track someone down or to find someone as a result of searching for content. . . . This is great in some circumstances, but when trying to avoid those who hold power over you, it may be less than ideal.”

The increased prevalence of self-monitoring and observation of others creates a dynamic environment where people promote themselves or shroud themselves depending on their intended audience and circumstances. In several surveys about reputation management, Pew Internet found that 57 percent of American internet users had searched for material about themselves online.Overall, the message from the surveys was that when people consider the trade-offs of disclosure vs. privacy in the digital era, the majority of them see advantages in disclosure and the prospect of being findable. They take modest steps to limit information about themselves, but most are not deeply worried about disclosures they think are reasonable and confer benefits.

This is a reality for all networked individuals, but it is especially important for those whose livelihoods depend on the outside world knowing who they are and what their reputation is. In the 2009 Pew Internet survey, 12 percent of the respondents said their job required them to promote themselves or market their name. That population segment will surely grow and the portion of them monitoring their online identities will likely rise. Fully 84 percent of the people with those jobs had checked for information about themselves in 2009; 73 percent were social networking site users and 29 percent were bloggers. There will also likely be broader awareness of the online tools that are available to those who want to check up on their “virtual selves.” Those tools include email alerts and syndicated news feeds when an individual’s name is mentioned on news or other prominent sites and buzz-monitoring tools for the rankings, ratings, and social media sites where that person’s name might pop up.

The incentive to monitor and control information will become more pronounced as more information about people finds its way into databases and online venues. As Daniel Solove argues, once information about us finds its way into the minds of others, we can’t control what they think about it. Our ability to exercise control consists of being able to limit the circulation of information about us.” Solove points to the key conflict for networked individuals in reputation management: too much information disclosure harms individuals’ privacy and freedom to act; too little information inhibits people’s ability to promote themselves and, more important, to build trust. Too little information also stifles free speech and the free flow of information.

Segment your identity: Linda’s networked identity consists of multiple, different networks: her church group, her divorce group, her teaching-support group, her graduate school friends, and two different groups focused on Myasthenia Gravis. She does not hide them from each other, but there is not much overlap.

Over time, more people will take at least a few steps to manage their identities by segmenting pieces of themselves—in effect, embracing a networked identity in which different parts of themselves are on display to different audiences in their networks. It is not that they will have separate selves for different segments of their networks, or for online versus offline interactions. Rather than different personas, people’s selves are networked: there is a core, but different aspects of that self get emphasized in different social situations. These are difficult trade-offs for networked individuals to calculate. They know, though, that people can be especially hurt by mismanaging their identities in one of several ways. For example, if an individual does not disclose her needs, talents, and achievements she will miss opportunities to gain help or advance. Or, if she discloses too much inappropriate material about her life she may likewise find herself denied opportunities. And if she does not monitor what is known or said about her online, she cannot know where her reputations falls short of reality or where it could be bolstered.

Develop the knack of functioning effectively in different contexts and “collapsed contexts”: For Linda, like all of us, the act of joining and belonging to multiple groups requires a development of group understanding or knowledge as each has different histories, norms, and folklore. As boyd puts it: “Some behaviors are appropriate in one context but not another, in front of one audience but not others. Social media brings all of these contexts crashing into one another and it’s often difficult to figure out what’s appropriate, let alone what can be understood.”

People must learn the ropes in these different milieus. The more gracefully they can do this, the quicker they can assume greater roles within multiple communities and networks. Effective networkers have to take this into account by expanding the milieus in which their activity can be understood, and explaining themselves in ways that multiple audiences can comprehend. Realize that intense scrutiny—even in unexpected situations—is a realistic possibility. As coauthor Rainie’s Pew colleague Susannah Fox likes to point out, the new social networking environment means that people “should always be ready for their close-ups” nowadays, because that close-up moment could be viewed and reviewed and reviewed after that.

Build high levels of trust and social capital in each network segment: Linda has worked diligently at this as she has navigated her complex life. Social capital can be earned, amassed, to some extent banked, and often used. A bedrock law of social networking is that people need to discover and interact with those who can provide resources. Although humans seem to be hardwired for reciprocity, social capital has its own rewards as it allows us to gain prestige with individuals or within groups, get things done, and enhance our sense of self. The essential point is that trust and reciprocity are primary currencies for networked individuals.

Digital media and social networks provide new ways to offer and procure social capital online, and the basic value of social capital is growing because such networks are so essential to people’s success. Just as digital technology has changed the contours of identity and privacy for networked individuals, it has also added elements to the dynamics of trust building. One particularly challenging change is tied to what the technology community calls “transparency.” Trust building at the personal level has always required evolving levels of disclosure, but now the audience for such disclosures is bigger and the expectation it will take place is also greater.

Another aspect of trust building that has intensified in the digital era relates to mistakes. Everybody makes them. But when they occur online or are captured digitally, people’s mistakes can be more widely disseminated and accessed. It is not clear yet whether social norms have become—or will become—more forgiving of prior indiscretions because of this or whether people will “pay” for their mistakes over a longer period of time because they are archived and findable by would-be friends, by would-be employers, by would-be romantic partners, by would-be clients, and by people from the past. The technology community’s response is to encourage people to admit their mistakes, correct them if possible, and seek forgiveness.

Manage boundaries: As the power of formal, densely knit groups wanes in light of the buildup of personal networks, personal and community boundaries are less distinct. With digital technologies, more private information is potentially available to interested members of the public—and to government and organizational surveillance authorities. Networked individuals need to develop nuanced understandings of what to make public, which publics to make information available to, and how to intermix technologies of privacy with those of public narrowcasting. People used to do that more or less routinely in real life, as they encountered the sights, sounds, smells, and the people of different social milieus. But online, all they face is a screen. As danah boyd puts it:

“There’s the blurring of public and private. These distinctions are normally structured around audience and context with certain places or conversations being “public” or “private.” These distinctions are much harder to manage when you have to contend with the shifts in how the environment is organized. . . . Trying to keep social acts to one space online is futile, even though that is the norm in unmediated environments.”

Other identity-shaping boundaries are also blurred or obliterated in the digital age. The edge between home and work (or school) becomes less distinct as people work at home outside “regular” work hours and do “leisure” activities while they are sitting at their desks on the clock at the office. Similarly, the border between education and entertainment is not as clear as it used to be in the era of “serious games” that have educational purposes at their core. Surely the longstanding distinction between consumer and producer has eroded as people remix media, and as nonprofessionals broadcast their works on video-sharing websites and publish their thoughts on blogging sites.

Manage time well; multitask strategically: People need to manage their attention more carefully than ever before. Effective networkers exploit this new digital environment more powerfully than those who get lost in their browsing or swamped by information inputs. Under the conditions of networked individualism, people need to work harder to stay on top of their own needs. They must spend more time maintaining ties in their networks and making sure that stores of social capital are replenished. Moreover, they know they are a part of others’ networks and they have a heightened sense of obligation to meet the needs of those who consider them social ties. A new widely accepted etiquette for transitory networked relationships has not emerged to create acceptable social rules that allow people to more easily enter into or break off from networked relationships. But it is taking shape in the context of perpetual engagement and partial attention.

New Literacies for Networked Individuals

The networked individuals who thrive have a combination of talent, energy, altruism, social acuity, and tech-savviness that allows them to build big, diverse networks and tap into them when they have needs. They are mastering a set of new literacies to navigate the network operating system.

They have graphic literacy that recognizes that more and more of life is experienced as communications and media on screens. They can interpret this material and feel some need to contribute to it. They know how to participate in digital conversation and creation. This literacy requires networking behavior that is often conducted graphically.

Networked individuals also have navigation literacy, a sense of internet geography that allows them to maneuver through multiple information channels and formats. They understand the change that has occurred as linear information formats such as print and broadcast media have given way to the nonlinear realities of hyperlinked, networked information. Not only do they know how to navigate, they also use their communications and contributions to help others navigate, often by recommending links in their digital communications or by creating their own posts to show others what they have learned.

Beyond that, they have context and connections literacy that helps them weave together the information and chatter that is flowing into their lives at a quickening pace. Even if the tidbits they gather are disaggregated from any larger context, they have the wherewithal—often with help from the network helpers—to puzzle through the material they collect. Networked individuals draw on their family, friends, and associates to make meaning of the things they encounter and the things that happen around them.

We suspect that networked individuals who are thriving have focus literacy as well: the capacity to minimize the distractions of the digital cacophony and complete the work they need to do for their jobs and their personal enrichment, even as they multitask. The paradox is that even while connecting people to multiple social networks, digital technologies carry with them almost an insistence that people stay connected on their mobile phones or the internet. Yet there are other times when people who are completing an urgent or personally satisfying project require a more individualized mastery of material and creation of knowledge. The most accomplished networked individuals are better at turning the solitude switch on so that they can focus.

Despite their focus, they also have multitasking literacy: the ability to do several things (almost) at once. With multiple inputs from family, friends, work, and institutions—and multiple in-person, internet, and mobile sources provide these inputs—thriving networkers have gained the ability to attend to them all with manageable fuss. Those who say it can’t be done forget the reality of driving a car in a big city, which routinely integrates steering, breaking, checking gauges, scanning the surroundings, chatting with passengers, and listening to music.

One of the great challenges in this age of overabundance of information requires skepticism literacy. Internet veteran Howard Rheingold’s NetSmart outlines the essential case that people need new tools and effort for “crap detection”—the ability of individuals to evaluate what they encounter online. This is especially urgent for those who get an unrelenting stream of material from others in their social networks. The most successful networked individuals have the capacity to assess inputs from friends and media sources for their accuracy, authority, relevance, objectivity, and scope. Skepticism literacy is the ability to weed out the media and people who have outdated, biased, incomplete, and agenda-driven or just dead-wrong ideas to pass along.

Connected to this is the idea that networked individuals should have an ethical literacy as they network with others. Successful networked individuals build trust and value for their partners by being accurate and thoughtful with the information they create and pass along. When everyone can be a publisher and broadcaster, there are advantages that accrue to those who are found to be reliable and transparent about the information they share. In contrast, social penalties are conferred on those who cheat, misrepresent information, cut corners, exploit relationships, and are mysterious about the sources of their information.

In a sense, you could say that the basic argument of this chapter is that the most successful networked individuals have networking literacy. Like Linda Evans, they know how to move adroitly through their network operating system—personal, institutional, and digital—without getting locked into one world. They follow the Golden Rule. They scan their existing networks for the possibility of gaining introduction to new networks that can expand their reach and diversify their sources of information. They strike useful balances between being “on the grid” taking advantage of opportunities and being available to help others, and “off the grid” when they need time to rebalance and contemplate without interruption. In short, they are masters of the new network operating system’s universe.


Networked Individuals in a Networked Posse

I was especially pleased for two reasons to be invited to participate on October 17 in the Keith Davey Forum at the University of Toronto to discuss politics and social media.

The first is that I can reconnect with my co-author and Toronto native  Barry Wellman and his wonderful students, who are now also my pals. The second is that I will get to meet the other Forum participant for the first time. He’s Jesse Hirsh and it will be nice to meet face-to-face because he writes one of my favorite blogs and it was through that blog that he introduced me to one of my favorite stories about networked individuals in action.

The material below is the full story as we wrote it for an early draft of the book. It fell in our chapter about “networked creators” in a section that described several new kinds of activities that have become popular thanks to the growth of social media. In that chapter, we also cite examples of …

1) how networked individuals can produce content online that helps them expand their social network and increase their social standing. We used some terrific casework done by Patricia G. Lange for the MacArthur Foundation’s comprehensive research on kids digital learning to describe how youth use YouTube for these purposes.

2) how networked individuals can construct just-in-time and just-like-me support groups through telling their stories and building archives or links to others’ content. In this case, we cited research done by my late friend, Tom Ferguson, about Karen Parles and the amazing resource she built at Lung Cancer Online. Tom taught us at the Pew Internet Project many things about e-health and his friends have carried on his work in an exceptional group blog about e-patients and in the Ferguson-and-friends book, ePatients: how they can help us heal health care.

3) how networked individuals can use social media to solve problems. This is the section that uses Jesse Hirsh’s tale of a “meta-mob” in action. Here’s what we wrote:

To catch a thief: a social posse in action

 Another new kind of social activity afforded by social media is illustrated by what Toronto-based internet strategist and columnist Jesse Hirsh has called a “meta-mob.” He has written occasionally about a meta-mob of car enthusiasts who tried over many months to stop a car-parts thief.[1]

In April 2009 the thief struck in a parking lot of Toronto’s Yorkdale Mall. While the victim was at work, someone stole a specialized front bumper-lip from his car, an Acura TSX. Cleverly, the thief used his own car to block passersby from seeing what he was doing. The victim, though, was smart enough to go to mall security to get the security video footage of the crime. But, because the thief took the plates off his car, and there were no witnesses, the police said there was nothing they could do. So, the victim turned to the site, a forum for Acura TSX owners. He started the thread in the early hours of May 21, 2009.

Almost immediately after Hirsh posted a link to the thread, the group identified a suspect. One of the discussion group’s members recognized the car in the security video as being almost identical to photos of a car posted by another user of the site.

“At first people were hesitant to point fingers, but when the user tried to defend himself with a poorly written reaction, intense scrutiny started to fall on the suspect,” Hirsh wrote. The meta-mob began to examine the user’s history and found a connection between the suspect and the victim. A few weeks before the theft of the bumper lip, the victim had posted a “help wanted” ad for his workplace and the suspect had asked what hours the store was open. The group began to think that by asking about the store’s hours, the suspect felt he could safely strip the car when the victim was working.

Hirsh noted: Once this connection was identified, a frenzy ensued.[2] Many of the users on the site were also users on other forums and recognized a pattern.

Within hours, multiple user accounts on multiple sites were linked to the same suspect who had been accused of stealing cars and car parts and reselling them via these forums and all these various aliases…. Ironically, one of the real tell-tale signs of the connection between all these accounts and identities was the language and writing style used by the suspect, which included poor grammar and spelling.

Hirsh described how the meta-mob came to believe that the suspect’s defense of himself had fallen apart when mob members accessed a account he used to post images to all kinds of auto enthusiast forums. “The suspect was using the photobucket account to host images of the allegedly stolen parts he was selling on the various sites,” noted Hirsh. “By looking at the web address URL and then details of the photos, people were able to identify his license plate, house number, and even photos of him.” Rather than giving up or confessing, the person then created a new account under a new name, and used the identity from the new account to “confess” to the crime, as an attempt to divert scrutiny from photo accounts that were under suspicion.

Hirsh continued. “However, [the suspect] used his same computer to create the new account, thereby having the same internet address and browser information, linking this posted confession to all [his] other accounts. A day later, after realizing how totally stupid that was, he removed those posts. But by then it was too late. The group had their guy.”

After the internet forensics were complete, and group members were convinced they had their man, the first thing that emerged were image mashups of the alleged thief, mostly making fun of him. Soon thereafter, users combed over Google Maps using the pictures of his car in front of his house and information that it was in Richmond Hill neighborhood and eventually they were able to identify his address by recognizing it in the satellite view.

And then, even more information was unearthed: “They were able to identify his mom and where she lives, his grandmother and where she lives, his sister, her employment, and some of his past crimes, including the fact that he is currently driving even though his license is suspended.” This was then followed by suggestions that all members of all auto clubs in the Toronto area show up at the purported thief’s house. Some started talking about the violence they would like to inflict upon him. On his end, the targeted suspect continued to post on the site and reply, escalating the violent rhetoric.

Hirsh concluded this telling of the story by noting that on May 27, six days after the first postings, the thread on the Acura TSX fan site was closed by site administrators. The suspect’s account was closed and his computer’s internet address was barred from accessing the site.

That did not end the matter, though. Other members of the site launched a petition seeking a police investigation – and rounded up several dozen signatories.[3] For weeks afterwards, people continued to post items about sightings of the suspect, his new license plate numbers, and pictures of him.

Hirsh himself concluded: “This is a fascinating example of the rapid rise of a ‘meta mob,’ which was the result of not a single community or forum, but rather an aggregation of many sites working together to connect the dots and remove a predator lurking among them…. This is something we’re going to have to come to terms with, as it’s certain to re-appear frequently as people realize the power of this kind of mobilization. Why turn to the police when you can raise a mob of Internet people to help bring justice?” Well into 2010, the meta-mob was still at work, watching out for the suspect and posting pictures of him from time to time. The police had not taken any steps to intervene in the case, though. Hirsh summarized: “He is essentially stalked by tons of people who when they do see him post photos so that others can watch out. So, his purported racket is ruined. I would guess, too, that this group’s faith in the rule of law has been diminished substantially. So, if there was any takeaway from this, I’d say that incidents like this erode the rule of law while creating templates for vigilante justice.”

Still, it was not just the style of the mobilization that was fascinating. It was also the way this group did research and posted material using “old” content-creation technologies tools such as discussion boards and new tools like Google maps and picture-uploading.

Networked individuals in these situations are creators and sharers as well as investigators. They network by creating content or finding it elsewhere and passing it along to the tribe that has gathered around their work. One way they stand out from community-builders in the past is that they do not have to depend on their direct access to friends or even friends of friends to get out the word about a project that galvanizes them. They simply convene with those who are connected even if they are complete strangers to each other.

The posts on the Acura discussion board make clear that few of them actually knew each other. Yet they still felt a sense of common purpose in the hunt. They performed networking activity merely by the act of searching for content, staying vigilant, and sharing what they found.

[1] Hirsh, Jesse. “An epic thread yields rapid internet justice.” Available at: … Much of the raw material for Hirsh’s story comes from this message thread:

[2] See

[3] See

The future of networked individuals

We were asked in June by the comments editor at New Scientist magazine to “finish” the final chapter of Networked. And the new issue of magazine has just been issued with our conclusion under the thunderous title, “The battle of freedom and control in a networked world.”

In that book chapter and our New Scientist article, we outline two scenarios about the future of networked individualism in an ever-more-technology-saturated world.

In one scenario, we sketch a vision where technology mostly advances the the well being of users: “Virtual assistants operating in a semantic web – one in which machines can better assess the ocean of information – seamlessly mesh a user’s life logistics and interests, allowing people to be more productive and more effective at integrating their needs. The merger of data and the physical environment, especially in augmented reality apps, enriches people’s experiences …. In this benign world, the challenges of information overload are reduced as these smart agents perform filtering and relevance tests. This lets people interact with their social networks and growing information stores in productive and socially beneficial ways.”

The other scenario is more dystopian. Is is “a walled online world of tight corporate permissions and Big Brotherish surveillance by business and the state limits networked life. Personal agents turn out to be double agents, feeding back information on users that can be sold.”

Jon pressed us to write which version of the future we thought would most likely occur.

We split the difference by noting that elements of both future scenarios are likely occur and we concluded: “The world will fragment, with some parts moving towards the brighter side of networked individualism and other parts moving towards gated communities and more tightly controlled information flows.”

We noted that “networked individualism is tightly tied to technological changes” and the world of networked individuals will be shaped by 1) the architecture of the internet itself; 2) emerging legal strictures on information; and 3) evolving social norms.


If Romeo and Juliet had mobile phones

By Wellman and Rainie

One of the most inspired writing ideas that we embraced in Networked came from Lee’s boss, Andrew Kohut, CEO of the Pew Research Center. Kohut’s notion was that a fun and powerful way to remind people how much the world had changed since the arrival of mobile phones would be to use popular culture references to life before mobile connectivity had become a widespread consumer reality.

At the time he suggested this idea, Kohut had just watched a rerun of the 1970 movie, The Out of Towners,  a Neil Simon farce starring Jack Lemmon and Sandy Dennis as suburbanites who run into a series of problems in New York City when they try to have a getaway weekend. Unable to get to a landline phone, the couple cannot: hold their hotel room reservation and the room is given to someone else; call ahead and reschedule Lemmon’s crucial job interview when they run into trouble; check on a con artist’s false story; summon help or seek follow-up assistance when they are mugged twice, kidnapped, and abandoned in Central Park; or let their children know where they are.

We took the idea and expanded it in Chapter 4 of our book to include several more examples. Barry adapted the notion to the plot of Romeo and Juliet and has now amplified it even more in a new article for the important, new journal, Mobile Media & Communication, and our friend, Rich Ling. He and his many insights about the mobile age are featured throughout our book.

With the journal’s permission, we run the article below:

If Romeo and Juliet Had Had Mobile Phones

Remember Juliet’s cry in the balcony scene, “Romeo, O Romeo, wherefore art thou Romeo?” (II, 2, 33). It’s the precursor of networked individualism as Juliet wonders why Romeo, a Montague, is  moving beyond group boundaries to woo her, a Capulet.*

Modern readers might understand Juliet’s cry as “where are you?” Both meanings suggest how the Triple Revolution—the turn to social networks, the pervasive internet, and the always accessible mobile phone—have changed the ways in which we connect with each other. Nowadays, Juliet would routinely text or call Romeo via their mobile phones: “what are your feelings about me?, can you get away from your family?, and when will you be coming?” It’s not like the days when people called each other on their wired-in (“landline”) phone at home or work—they knew exactly where those people were and had a pretty good idea of the social and physical context in which they were operating.

In our Networked book (Rainie & Wellman, 2012), we have thought about how the pervasive adoption of mobile phones—and more recently tablets and highly portable laptop computers—has affected our lives. Among other things, the Mobile Revolution has promoted networked individualism—connectivity that is not bound up in solidary groups—and connectivity that paradoxically provides both location awareness (“where are you?”) and facilitates communication without regard to location—I can connect with you wherever you are.  Although our focus has been on the United States and Canada, we think our findings hold true for much of the developed world and increasingly large segments of the less-developed world. We argue that mobile phones have revolutionary social affordances: technologies that provide possibilities and constraints for our lives.

You Can Take It With You

The most obvious affordance is that mobile phones are mobile. In the early days, that meant 35-kilogram phones were so heavy that they had to be mounted in cars. Yet, even one of those would have helped Brad and Janet in the Rocky Horror Picture Show escape from the aliens when their car got stranded (O’Brien and Sharman, 1975). Of course, phones have slimmed down: at first to 1 kilogram, unreliable, analogue bricks that required holsters or bulging purses, and now to small, sleek easily-pocketable digital units weighing only 140 grams—a decrease of 99% from the original car phones. They would have easily fit into bodices and codpieces. Indeed, Leopoldina Fortunati (2003), Romeo and Juliet’s Verona neighbor, notes that the mobile phone is now our third skin. The number of U.S. mobile subscriptions has grown from 340,000 in 1985 to more than 302 million in 2011, comprising 83% of the adult population and 75% of teenagers (Rainie and Wellman, 2012).

While the internet made communication personal and less constrained by distance, it has been bound to physical locations, be it the house, office, or a WiFi-equipped coffee shop. Having their own mobile phones—along with tablets and light notebooks—would have allowed Romeo and Juliet to move around, liberated from locale and parental surveillance. They would have been less worried about their families when they were figuring out where to meet. At the same time, their parents would have felt reassured because they could call their children and ask where they were and what they were doing. But, would Romeo and Juliet have told the truth? A location-aware app would also have been useful for parents in tracking them. Or they might have prowled friends’ Facebook updates or photo albums for clues.

One Phone to Rule Them All

Today, Romeo and Juliet could connect with each other because mobility means accessibility and availability. They’d be on each other’s top-five speed dial. And they would probably have had a location-aware app that that showed exactly where each other were: no wandering the streets of Verona looking for each other. Rather than using separate phones at home and at work—not to mention payphones at gas stations and on the street, people carry one phone that integrates all of their roles. Mobile phones have become versatile accessories that are always at hand with many thousands of apps to communicate, identify bird songs, and locate secret trysting spots: “” actually exists. Indeed, many young adults sleep with their mobiles near them, either on their beds or on their night tables: “I don’t want to miss a text; it’s my alarm clock”. If Romeo or Juliet had a voice-recognition app such as Siri, it might have echoed Ruth’s words to Naomi (1:16): “Whither thou goest, I will go”.

For a while, the constant availability of mobile users meant that they annoyed others with ringing phones in public. In 1992, co-author Wellman was shocked when a Hong Kong concert audience was asked to turn off its mobile phones: he hadn’t thought about such issues back then. By 2003, he sympathized when concert pianist Andrea Schiff stormed off the stage in Rome after a mobile phone rang twice in the audience. Nowadays, accessibility has become more silent. As phones increasingly vibrate rather than ring, people exchange text messages rather than talk.  The percentage of texters in the adult population has nearly doubled from 31% in spring 2006 to 59% in spring 2011 (Rainie and Wellman, 2012). Public spaces have become more silent, as people concentrate on their text messages, while downwardly-peering texters have limited eye contact.

Constant availability can be annoying in other ways. People can be contacted by unwanted others. Imagine Romeo making plans to meet Juliet in the park, but his father calls to say that he has to come home immediately. At least, the mobile connection would have allowed Romeo to alert Juliet to his role conflict and possible absence. Or they might suffer social overload as they feel normative pressure to remain connected when they’d prefer not to be: if Juliet kept insecurely texting Romeo, she might have driven  away.

The Personalization of Communication

Romeo and Juliet’s exchanges would have been personal, a revolutionary change from landline telephone communication that came into the entire household. As long as they talked or texted in private, neither the Montagues nor the Capulets would know – unless, of course, they snuck peeks at the list of previous calls and texts on the phones. Instead of a phone ringing in a home—where all would hear it and possibly become part of the conversation—internet communication and mobile communication are usually exchanges between two individuals. Juliet could ask  privately “wherefore art though?” about Romeo’s state of mind as well as his location.

By contrast, in the not-so-olden days, when someone called the household, all family members could gather around the speakerphone or pick up extensions around the house. But the increasing absence of home landline phones means that when modern Juliets call home they reach only the one family member whose mobile phone they are calling. Thus, the absence of landlines hinders conversations with the entire household.

This dance of the personal and the household happens in real life, as many teens will tell you. For example, some Arab Israeli young men give mobile phones to the women they are dating. But they control the bill. “Use the phone only in your own room, and put it on silent vibrate when I call at 10PM. And don’t call anyone else, because I can see it when I get the bill” (Hijazi-Omari & Ribak, 2008).

The Networked Family

The shift from household phones to personal mobile phones is part of the shift away from solidary families to networked families (Kennedy & Wellman, 2007; Rainie, Wellman & Kennedy, 2012). Homes were refuges for Romeo and Juliet—and their families. There were strong boundaries between households and the public, problematic streets. As late as the 1960s, mothers would stay home while fathers would go off to work.

Homes now have permeable boundaries. Mom as well as Dad usually goes off to work, and each family member has a separate agenda. There is more need to use their mobile phones to communicate and coordinate the mundane aspects of life: who will pick up the kids from soccer practice? If they cannot get their employers’ permission to phone or text each other at work, they’ll use their lunch and bathroom breaks.

Mobile contact has become multigenerational, as teens—and even children—are increasingly getting their own mobile phones. This affords people of all ages opportunities to become more autonomous agents. Many parents lend their young children mobile phones or tablets to use as pacifiers. In this way, children learn digital skills before they go to school, playing Angry Birds or Angelina Ballerina. The big step is personal possession.  In 2009, most Canadian children had their own mobile phones by the age of 13; it undoubtedly is lower now (Wellman, Garofalo and Garofalo 2009). As they grew up, Romeo and Juliet had gotten past their childhoods of being household and neighborhood bound.  They made contact by encounters in public places. Teens still do that—the shopping mall is the new agora—but their mobile phones also afford continuous contact with their homes and distant friends.

Networked Individuals Interconnect Mobile, Internet and In-Person

Some pundits fear that mobile users rarely look up to engage with each other in person (Turkle, 2011). If they are right, Romeo and Juliet might never look up from their mobile phones to see each other. Or, would the course of true love have led them away from their screens and into each other’s arms?

Yet, such fears are not based on systematic evidence. Instead, a variety of research shows that mobile phones—and the internet, for that matter—are integrated into people’s face-to-face interactions (Hampton, et al., 2009; Wang and Wellman, 2010; Rainie, et al., 2006, Rainie and Wellman, 2012).

It is not as if there are few separate realms of online and in-person contact. Rather, we are networked individuals, and our personal networks integrate the internet, phones, and in-person encounters. People intertwine mobile, internet, and in-person contact into a seamless whole.

For example, Rhonda McEwen’s study of how university students use mobile phones nicely shows the intricate dance that the internet, mobile phones, and in-person contact make. Students first set up get-togethers on the internet. Then, as they get close to the time and place of meeting, they phone or text each other: “I’m a little late”. “Which corner are you standing at?” The get togethers are, of course, in person, but afterwards there are almost immediate follow-up calls and texts: what the French call “L’esprit de l’escalier”—the “spirit of the staircase” when afterthoughts come to mind. If it was a group gathering, emails and Facebook posts provide collective reinforcement (McEwen & Fritz, 2010).

From Group to Network

The story of Romeo and Juliet is the story of two individuals escaping the bounds of their densely knit groups. It is a story of the social network revolution that began well before Facebook: the move from group-bound societies to networked individuals. This turn to networked individualism transforms communication from being place-based to person-based.

Mobile phones have played a key role in the developed world’s transformation from group-bound societies to networked societies in which people move among sparsely knit networks of diverse others. Consider the mutually-exclusive groups of Montagues and Capulets. Nowadays, people have partial memberships in multiple clusters of ties (Castells, 2000; Rainie and Wellman, 2012). And when trouble develops, they use their mobile phones to call for help from whatever networks seem most appropriate. Smart networked mobs form through viral word-of-mouth communication by mobile phone and the internet, as well as via traditional in-person contact (Lane, 2011; Rheingold, 2000).

Thus, in little more than a decade, mobile phones have become the concrete instantiation of the turn away from groups to networked individualism. Romeo and Juliet would have used them—and loved them almost as much as they loved each other. With their mobile phones, the course of their true love would have been more connected—and perhaps would have run more smoothly. If only Romeo and Juliet had had mobile phones, they might have lived happily ever after.

* We made a modernist mistake in the first version of this article. Shakespeare’s “Wherefore” does not translate as “Where.” It means “Why.” Juliet’s cry is not to know where her lover is. Her cry is one of the heart. “Why do you come from the enemy clan?” We are indebted to correspondent Adam Babcock for pointing this out – and doing so pretty gently.


Castells, M. 2000. The Rise of the Network Society. 2nd ed. Oxford: Blackwell.

Fortunati, L. 2003. “Front stage/back stage: mobile communication and the renegotiation of the social sphere.” Pp. 1-16 in Mediating the Human Body: Technology, Communication, and Fashion, edited by L. Fortunati, J. Katz and R. Riccini. Mahwah, NJ: Lawrence Erlbaum.

Hampton, K.N., L.F. Sessions, E.J. Her, and L. Rainie. 2009. Social Isolation and New Technology. Pew Internet & American Life Project: Washington.–Social-Isolation-and-New-Technology.aspx.

Hijazi-Omari, H. and Ribak, R. 2008. Playing with fire: on the domestication of the mobile phone among Palestinian teenage girls in Israel. Information, Communication and Society, 11(2), 149-66.

Kennedy, T. and Wellman, B. 2007. The networked household.” Information, Communication and Society 10 (5), 647-70.

Lane, J. 2011. “‘Twitter is maaade for trouble’: Violence and status on the digital street.” Center for Information Technology Policy, Princeton University, Princeton, NJ, April.

McEwen, R. & Fritz, M. 2011. “EMF social policy and youth mobile phone practices in Canada.” Pp. 133-156 in Mobile Communication, edited by J. Katz. Piscataway, NJ: Transaction.

O’Brien, R. and Shanahan, J. 1975. Rocky Horror Picture Show. Los Angeles: 20th Century Fox.

Rainie, L., Horrigan, J., Wellman, B. and Boase. J. 2006. “The strength of internet ties.” Pew Internet & American Life Project: Washington.

Rainie, L. and Wellman, B. 2012. Networked: The New Social Operating System. Cambridge, MA: MIT Press.

Rainie, L. Wellman, B. , and Kennedy, T. “Networked Families.” Chapter 6 in Rainie, L. and Wellman, B. Networked: The New Social Operating System. Cambridge, MA: MIT Press.

Rheingold, H. 2003. Smart Mobs. New York: Basic Books.

Shakespeare, W. 1597. Romeo and Juliet.

Turkle, S. 2011. Alone Together. New York: Basic Books

Wang, H. and Wellman, B. 2010. “Social connectivity in America: changes in adult friendship network size from 2002 to 2007.” American Behavioral Scientist 53 (8): 1148-1169.

Wellman, B., Garofalo, A.  and Garofalo, V. 2009. “The Internet, Technology and Connectedness.” Transition 39, 4 (December): 5-7

Voice of America and the Triple Revolution

How nice to be described as “restrained” but “not in the mushy middle.”

A lovely review of the book has just appeared in the Voice of America’s smart Digital Frontiers section.

Ross Slutsky and one of my favorite reporters, Doug Bernard, have some nice things to say and, more importantly “get” the big themes in the book and “get” where we’re coming from.

“In keeping with their academic pedigrees, they work hard to objectively weigh the implications, both positive and negative, of the digital age. But this is no document from the mushy middle. In the end, they land closer to sunny tech evangelists like Vint Cerf and Chris Anderson than their somewhat gloomier peers like Sherry Turkle and Evgeny Morozov….

“The picture they draw is more finely detailed than previous efforts, such as Robert Putnam’s Bowling Alone, that overly focus on the decline of civic groups like the Kiwanis or local bowling leagues. Rainie and Wellman counter that these groups’ membership declines don’t reflect a loss in American sociability so much as a change in how Americans are connecting with one another. Additionally, the authors exhibit a nuanced understanding of the Arab Spring, offering a comprehensive account of the role of both social media and offline mobilization in the uprisings.”

While I’m referring to Doug Bernard, let me add that you should look soon for his piece and interview with my colleague Prof. Janna Anderson from Elon University about our new report about the future of corporate responsibility and how tech companies will deal with repressive regimes that want to use their gear to thwart or crack down on dissidents.


The “Cyborg” side of things

It’s just stone flattering to know that others have taken the time to read our book and it’s beyond flattering to see that they have taken the time to say smart — and quite nice — things about it.

The review by Jenny Davis on the impressive and important Cyborgology site is thoughtful and fair. How can you not like passages like these:

“The book has several strengths, but I want to highlight two.

“1) First, the theoretical contribution of networked individualism cannot be understated. This gives us a language with which to discuss a shift away from the group, without devolving into a narrative of rugged individualism. It breaks the false dichotomy between individual and group, and eloquently describes the complex reality in which we live.

“2) The second strength lies in the data. The authors combine extensive statistical analyses of large random and non-random samples, with in-depth qualitative anecdotes, and poignant personal accounts. This elegant mixed methods approach is the standard of rigor that social scientists ubiquitously herald, but so rarely achieve. This work is a literal reference guide to the empirical realities a networked era.”

She also notes in the way of mild criticism that 1) the book’s tone leans towards optimism about the social impact of technology and 2) we could/should have wrestled more with some of the theoretical implications of the communications revolutions we cover. Even in that, though, she’s quite forgiving.

By way of explanation, I’ll offer that both Barry Wellman’s data and Pew Internet’s are a bit more positive than not about the impact of technology, though there are plenty of cautionary notes to sound. And I’ll take the fall for the dearth of theoretical work in our book. Theory building is our territory at Pew Internet, which we bill as a “fact tank.” Barry had to go along for that restricted ride as the price for working with me. However, I would love to see what he’d say on the issues Jenny raises.

Her review will be followed soon by one by PJ Rey, which should be fun.

I first got to “know” him and learn of his work after he took a lot of time to respond to Pew Internet Project queries of experts about the future of the internet. I tweeted about his wry aphorisms about the future of gamification and he mingled happily with twitter-critics and fans who responded to his views.

So, thanks so much to Jenny for making my week and preemptive thanks to PJ for whatever he ends up writing.

Podcast interview about “Networked”

Ian Jacobs of the World Wide Web Consortium (W3C) asked some wonderful questions about the book in a podcast interview that was just posted along with a transcript.


In addition to hitting on the big themes of the book, we covered some of the history of the Pew Internet Project and the background of how Barry Wellman and I came together for this work.

Continue Reading