Attention economy

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Multiple billboards are competing for people's attention in this Dhaka street.

Attention economics is an approach to the management of information that treats human attention as a scarce commodity and applies economic theory to solve various information management problems. According to Hazel Henderson, "media in all forms now dominates... Attention is their valuable resource as competition moves to capturing eyeballs."[1]

In this perspective Thomas H. Davenport and John C. Beck[2] define the concept of attention as:

Attention is focused mental engagement on a particular item of information. Items come into our awareness, we attend to a particular item, and then we decide whether to act. (Davenport & Beck 2001, p. 20)

As content has grown increasingly abundant and immediately available, attention becomes the limiting factor in the consumption of information.[3] A strong trigger of this effect is that the mental capability of humans is limited and the receptiveness of information is hence limited as well. Attention allows information to be filtered such that the most important information can be extracted from the environment while irrelevant details are left out.[4]

Software applications either explicitly or implicitly take attention economy into consideration in their user interface design based on the realization that if it takes the user too long to locate something, they will find it through another application. This is done, for instance, by creating filters to make sure viewers are presented with information that is most relevant, of interest, and personalized based on past Web search history.[5]

Theory[edit]

Research from a wide range of disciplines including psychology,[6] cognitive science,[7] neuroscience,[8] and economics,[9] suggest that humans have limited cognitive resources that can be used at any given time, when resources are allocated to one task, the resources available for other tasks will be limited. Given that attention is a cognitive process that involves the selective concentration of resources on a given item of information, to the exclusion of other perceivable information, attention can be considered in terms of limited processing resources.[10]

History[edit]

The concept of attention economics was first theorized by psychologist and economist Herbert A. Simon[11] when he wrote about the scarcity of attention in an information-rich world:

[I]n an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention and a need to allocate that attention efficiently among the overabundance of information sources that might consume it. (Simon 1971, pp. 40–41)

He noted that many designers of information systems incorrectly represented their design problem as information scarcity rather than attention scarcity, and as a result, they built systems that excelled at providing more and more information to people, when what was really needed were systems that excelled at filtering out unimportant or irrelevant information (Simon 1971).Simon's characterization of the problem of information overload as an economic one has become increasingly popular in analyzing information consumption since the mid-1990s.

The term 'attention economy' was first given a formal definition in Hazel Henderson's Building a Win-Win World: Life Beyond Global Economic Warfare as "a form of economy associated with mediocracies, based on the production of information, entertainment, and other goods and services that compete with politicians and educators for the attention of the individuals."[12]

Some writers have speculated that "attention transactions" will replace financial transactions as the focus of our economic system (Goldhaber 1997, Franck 1999). Information systems researchers have also adopted the idea, and are beginning to investigate mechanism designs which build on the idea of creating property rights in attention (see Applications).

Intangibles[edit]

According to digital culture expert Kevin Kelly, the modern attention economy is increasingly one where the consumer product costs virtually nothing to reproduce and the problem facing the supplier of the product lies in adding valuable intangibles that cannot be reproduced at any cost. He identifies these intangibles as:[13]

  1. Immediacy - priority access, immediate delivery
  2. Personalization - tailored just for you
  3. Interpretation - support and guidance
  4. Authenticity - how can you be sure it is the real thing?
  5. Accessibility - wherever, whenever
  6. Embodiment - books, live music
  7. Patronage - "paying simply because it feels good",
  8. Findability - "When there are millions of books, millions of songs, millions of films, millions of applications, millions of everything requesting our attention — and most of it free — being found is valuable."

Social attention in social media[edit]

Attention economics is also relevant to the social sphere. Specifically, long-term attention can be considered according to the attention that a person dedicates to managing their interactions with others. Dedicating too much attention to these interactions can lead to "social interaction overload",[14] i.e. when people are overwhelmed in managing their relationships with others, for instance in the context of social network services in which people are the subject of a high level of social solicitations. Digital media and the internet facilitate participation in this economy by creating new channels for distributing attention. Ordinary people are now empowered to reach a wide audience by publishing their own content and commenting on the content of others.[15]

Social media companies and their use of algorithms based on viewership show the attention economy is expanding significantly. This has led malicious actors to capture the attention of unsuspecting users, such as Russia's disinformation campaign in 2016 as well as ISIS' recruitment tactics online.[16]

Applications[edit]

In advertising[edit]

"Attention economics" treats a potential consumer's attention as a resource.[17] Traditional media advertisers followed a model that suggested consumers went through a linear process they called AIDA - Attention, Interest, Desire and Action.[18] Attention is therefore a major and the first stage in the process of converting non-consumers. Since the cost to transmit advertising to consumers has become sufficiently low given that more ads can be transmitted to a consumer (e.g. via online advertising) than the consumer can process, the consumer's attention becomes the scarce resource to be allocated. As such, a superfluidity of information may hinder the decision making of an individual who keeps searching and comparing products as long as it promises to provide more than it is using up.[19]

Controlling information pollution[edit]

One application treats various forms of information (e.g. spam, advertising) as a form of pollution or 'detrimental externality'.[20] In economics, an externality is a by-product of a production process that imposes burdens (or supplies benefits), to parties other than the intended consumer of a commodity.[21] For example; air and water pollution are ‘negative’ externalities that impose burdens on society and the environment.

A market-based approach to controlling externalities was outlined in Ronald Coase's The Problem of Social Cost (1960).[22] This evolved from an article on the Federal Communications Commission (1959),[23] in which Coase claimed that radio frequency interference is a negative externality that could be controlled by the creation of property rights.

Coase's approach to the management of externalities requires the careful specification of property rights and a set of rules for the initial allocation of the rights.[24] Once this has been achieved, a market mechanism can theoretically manage the externality problem.[25]

E-mail spam[edit]

Sending huge numbers of e-mail messages costs spammers very little, since the costs of e-mail messages are spread out over the internet service providers that distribute them (and the recipients who must spend attention dealing with them).[26] Thus sending out as much spam as possible is a rational strategy: even if only 0.001% of recipients (1 in 100,000) is converted into a sale, a spam campaign can be profitable. Of course, it is very difficult to understand where all the revenue comes from since these businesses are run through proxy servers, however, if they were not profitable, it is reasonable to conclude that they would not be sending spam.[27] Spammers are demanding valuable attention from potential customers, but avoid paying a fair price for this attention due to the current architecture of e-mail systems.[28]

One way this might be mitigated is through the implementation of "Sender Bond" whereby senders are required to post a financial bond that is forfeited if enough recipients report an email as spam.[29]

Closely related is the idea of selling "interrupt rights", or small fees for the right to demand one's attention.[30] The cost of these rights could vary according to the person who is interrupted: interrupt rights for the CEO of a Fortune 500 company would presumably be extraordinarily expensive, while those of a high school student might be lower. Costs could also vary for an individual depending on context, perhaps rising during the busy holiday season and falling during the dog days of summer. Those who are interrupted could decline to collect their fees from friends, family, and other welcome interrupters.[31]

Another idea in this vein is the creation of "attention bonds," small warranties that some information will not be a waste of the recipient's time, placed into escrow at the time of sending.[32] Like the granters of interrupt rights, receivers could cash in their bonds to signal to the sender that a given communication was a waste of their time or elect not to cash them in to signal that more communication would be welcome.[33]

Web spam[edit]

As search engines have become a primary means for finding and accessing information on the web, high rankings in the results for certain queries have become valuable commodities, due to the ability of search engines to focus searchers' attention.[34] Like other information systems, web search is vulnerable to pollution: "Because the Web environment contains profit seeking ventures, attention getting strategies evolve in response to search engine algorithms".[35]

Since most major search engines now rely on some form of PageRank (recursive counting of hyperlinks to a site) to determine search result rankings, a gray market in the creation and trading of hyperlinks has emerged.[36][37] Participants in this market engage in a variety of practices known as link spamming, link farming, and reciprocal linking.[38]

Another issue, similar to the issue discussed above of whether or not to consider political e-mail campaigns as spam, is what to do about politically motivated link campaigns or Google bombs.[39] Currently, the major search engines do not treat these as web spam, but this is a decision made unilaterally by private companies.

Sales lead generation[edit]

The paid inclusion model, as well as more pervasive advertising networks like Yahoo! Publisher Network and Google's AdSense, work by treating consumer attention as the property of the search engine (in the case of paid inclusion) or the publisher (in the case of advertising networks).[40][41] This is somewhat different from the anti-spam uses of property rights in attention, which treat an individual's attention as his or her own property.

See also[edit]

References[edit]

  1. ^ ""MEDIOCRACIES AND THEIR ATTENTION ECONOMIES" | EthicalMarkets.com". Retrieved 2021-04-08.
  2. ^ Davenport, Thomas; Beck, John (2001). The Attention Economy: Understanding the New Currency of Business. Cambridge: MA: Harvard Business School Press. ISBN 9781578518715. Retrieved 29 October 2020.
  3. ^ Media, Crowdcentric (2014-05-20). On! The Future of Now: Making Sense of Our Always On, Always Connected World. ISBN 978-1483412429. Retrieved 2 June 2015.
  4. ^ Kiyonaga, Anastasia; Egner, Tobias (12 December 2012). "Working memory as internal attention: Toward an integrative account of internal and external selection processes". Psychonomic Bulletin & Review. 20 (2): 228–242. doi:10.3758/s13423-012-0359-y. PMC 3594067. PMID 23233157. Retrieved 28 October 2020.
  5. ^ Shekhar, Shashi; Agrawal, Rohit; Karm V., Arya (2010). "An Architectural Framework of a Crawler for Retrieving Highly Relevant Web Documents by Filtering Replicated Web Collections". 2010 International Conference on Advances in Computer Engineering: 29–33. doi:10.1109/ACE.2010.64. ISBN 978-1-4244-7154-6. S2CID 9388907. Retrieved 29 October 2020.
  6. ^ Le, Thanh P; Najolia, Gina M; Minor, Kyle S; Cohen, Alex S (2016). "The effect of limited cognitive resources on communication disturbances in serious mental illness". Psychiatry Research. 248 (248): 98–104. doi:10.1016/j.psychres.2016.12.025. PMC 5378554. PMID 28038440. Retrieved 30 October 2020.
  7. ^ Franconeri, Steven L; Alvarez, George A; Cavanagh, Patrick (2013). "Flexible cognitive resources: competitive content maps for attention and memory". Trends in Cognitive Sciences. 17 (3): 134–141. doi:10.1016/j.tics.2013.01.010. PMC 5047276. PMID 23428935. Retrieved 30 October 2020.
  8. ^ Desimone, R; Duncan, J (1995). "Neural mechanisms of selective visual attention". Annual Review of Neuroscience. 18: 193–222. doi:10.1146/annurev.ne.18.030195.001205. PMID 7605061. Retrieved 30 October 2020.
  9. ^ Christie, S; Schrater, Paul (2015). "Cognitive cost as dynamic allocation of energetic resources". Frontiers in Neuroscience. 9 (9): 289. doi:10.3389/fnins.2015.00289. PMC 4547044. PMID 26379482. S2CID 15545774. Retrieved 30 October 2020.
  10. ^ Barrouillet, Pierre; Bernardin, Sophie; Portrat, Sophie; Vergauwe, Evie; Camos, Vale ́rie (2007). "Time and Cognitive Load in Working Memory". Journal of Experimental Psychology. Learning, Memory, and Cognition. 33 (3): 570–585. doi:10.1037/0278-7393.33.3.570. PMID 17470006.
  11. ^ Simon, Herbert A (1971). Designing Organizations for an Information-rich World. Baltimore, MD: Johns Hopkins University Press. pp. 37–52. Retrieved 28 October 2020.
  12. ^ Henderson, Hazel (1996). Building a win-win world : life beyond global economic warfare. San Francisco: Berrett-Koehler Publishers. ISBN 1-58376-277-9. OCLC 47010049.
  13. ^ Kelly, Kevin (February 5, 2008). "BETTER THAN FREE". The Edge.
  14. ^ Maier, Christian; Laumer, Sven; Weinert, Christoph (2013). "The Negative Side Of ICT-Enabled Communication: The Case Of Social Interaction Overload In Online Social Networks". ECIS 2013 Completed Research. 86: 1–10. Retrieved 30 October 2020.
  15. ^ Jones, Rodney H.; Hafner, Christoph A. (2012). Understanding Digital Literacies. New York: Routledge. p. 90. ISBN 9780415673167.
  16. ^ ""MEDIOCRACIES AND THEIR ATTENTION ECONOMIES" | EthicalMarkets.com". Retrieved 2021-04-09.
  17. ^ Pedrycz, Witold; Chen, Shyi-Ming, eds. (9 December 2013). Social Networks: A Framework of Computational Intelligence. p. 229. ISBN 978-3-319-02993-1. Retrieved 1 June 2015.
  18. ^ Ullal, Mithun; Hawaldar, Iqbal T (2018). "Influence of advertisement on customers based on AIDA model". Problems and Perspectives in Management. 16 (4): 285–298. doi:10.21511/ppm.16(4).2018.24. Retrieved 30 October 2020.
  19. ^ Dolgin, Alexander (2008). The Economics of Symbolic Exchange. pp. 164–165. ISBN 978-3-540-79883-5. Retrieved 1 June 2015.
  20. ^ Chipman, John; Guoqiang, Tian (2012). "Detrimental Externalities, Pollution Rights, and the "Coase Theorem"". Economic Theory. 49 (2): 309–327. doi:10.1007/s00199-011-0602-1. JSTOR 41408714. S2CID 30488295. Retrieved 1 November 2020.
  21. ^ Castle, Emery N (1965). "The Market Mechanism, Externalities, and Land Economics". American Journal of Agricultural Economics. 47 (3): 542–556. doi:10.2307/1236272. JSTOR 1236272. Retrieved 1 November 2020.
  22. ^ Coase, R.H (1960). "The Problem of Social Cost". Classic Papers in Natural Resource Economics (Gopalakrishnan C. (eds) Classic Papers in Natural Resource Economics ed.). London: Palgrave Macmillan. pp. 87–137. doi:10.1057/9780230523210_6. ISBN 978-0-230-52321-0. Retrieved 1 November 2020.
  23. ^ Coase, R. H (1959). "The federal communications commission". The Journal of Law and Economics. 2: 1–40. doi:10.1086/466549. S2CID 222324889. Retrieved 1 November 2020.
  24. ^ Furubotn, E. G.; Pejovich, S (1972). "Property rights and economic theory: a survey of recent literature". Journal of Economic Literature. 10 (4): 1137–1162. JSTOR 2721541. Retrieved 1 November 2020.
  25. ^ Kim, J; Mahoney, J. T. (2005). "Property rights theory, transaction costs theory, and agency theory: an organizational economics approach to strategic management". Managerial and Decision Economics. 26 (4): 223–242. doi:10.1002/mde.1218. Retrieved 1 November 2020.
  26. ^ Park, S. Y.; Kim, J. T.; Kang, S. G. (2006). "Analysis of applicability of traditional spam regulations to VoIP spam". 2006 8th International Conference Advanced Communication Technology. 2: 3. Retrieved 1 November 2020.
  27. ^ Kanich, Chris; Kreibich, Christian; Levchenko, Kirill; Enright, Brandon; Voelker, Geoffrey M.; Paxson, Vern; Savage, Stefan (2008). "Spamalytics: an empirical analysis of spam marketing conversion". Proceedings of the 15th ACM Conference on Computer and Communications Security - CCS '08. Alexandria, Virginia, USA: ACM Press: 3. doi:10.1145/1455770.1455774. ISBN 978-1-59593-810-7. S2CID 53111639.
  28. ^ Thomas, K.; Grier, C.; Ma, J.; Paxson, V.; Song, D. (2011). "Design and evaluation of a real-time url spam filtering service". 2011 IEEE Symposium on Security and Privacy: 447–462. doi:10.1109/SP.2011.25. ISBN 978-1-4577-0147-4. S2CID 1398765. Retrieved 1 November 2020.
  29. ^ Hoanca, B. (2006). "How good are our weapons in the spam wars?". IEEE Technology and Society Magazine. 25 (1): 22–30. doi:10.1109/MTAS.2006.1607720. S2CID 23623868. Retrieved 1 November 2020.
  30. ^ Fahlman, S. E. (2002). "Selling interrupt rights: A way to control unwanted e-mail and telephone calls". IBM Systems Journal. 41 (4): 759–766. doi:10.1147/sj.414.0759. Retrieved 1 November 2020.
  31. ^ Lueg, C. (2003). "Spam and anti-spam measures: A look at potential impacts". Proc. Informing Science and IT Education Conference: 24–27. Retrieved 1 November 2020.
  32. ^ Loder, T.; Van Alstyne, M.; Wash, R.; Benerorfe, M. (2004). "The spam and attention bond mechanism faq" (PDF). Technical Report, University of Michigan. Retrieved 1 November 2020.
  33. ^ Loder, T.; Van Alstyne, M.; Wash, R. (2006). "An economic response to unsolicited communication". The BE Journal of Economic Analysis & Policy. 6 (1). doi:10.2202/1538-0637.1322. S2CID 154784397. Retrieved 1 November 2020.
  34. ^ Ge, S.; Dou, Z.; Jiang, Z.; Nie, J. Y.; Wen, J. R. (2018). "Personalizing Search Results Using Hierarchical RNN with Query-aware Attention". Proceedings of the 27th ACM International Conference on Information and Knowledge Management: 347–356. arXiv:1908.07600. doi:10.1145/3269206.3271728. ISBN 9781450360142. S2CID 53034987. Retrieved 1 November 2020.
  35. ^ Page, L.; Brin, S.; Motwani, R.; Winograd, T. "The PageRank citation ranking: Bringing order to the web 1999". Stanford InfoLab. Retrieved 1 November 2020.
  36. ^ Zook, M. A.; Graham, M. (2007). "Mapping DigiPlace: geocoded Internet data and the representation of place". Environment and Planning B: Planning and Design. 34 (3): 466–482. doi:10.1068/b3311. S2CID 6884167. Retrieved 1 November 2020.
  37. ^ Gonçalves, M. A.; Almeida, J. M.; dos Santos, L. G.; Laender, A. H.; Almeida, V. (2010). "On popularity in the blogosphere". IEEE Internet Computing. 14 (3): 42–49. doi:10.1109/MIC.2010.73. S2CID 11296597. Retrieved 1 November 2020.
  38. ^ Ghosh, S.; Viswanath, B.; Kooti, F.; Sharma, N.K.; Korlam, G.; Benevenuto, F.; Ganguly, N.; Gummadi, K. P. (2012). "Understanding and combating link farming in the twitter social network". Proceedings of the 21st International Conference on World Wide Web: 61–70. doi:10.1145/2187836.2187846. ISBN 9781450312295. S2CID 15556648. Retrieved 1 November 2020.
  39. ^ Hargittai, E. (2007). "The social, political, economic, and cultural dimensions of search engines: An introduction". Journal of Computer-Mediated Communication. 12 (3): 769–777. doi:10.1111/j.1083-6101.2007.00349.x. Retrieved 1 November 2020.
  40. ^ Weideman, Melius (2004). Ethical issues on content distribution to digital consumers via paid placement as opposed to website visibility in search engine results. Greece: University of the Aegean. ISBN 960-7475-25-9. Retrieved 1 November 2020.
  41. ^ Moss, Kenneth A.; Watson, Eric; Seidman, Eytan D. "Paid inclusion listing enhancement 2011" (PDF). U.S. Patent No. 7,953,631. Retrieved 1 November 2020.
  42. ^ Ferriss, Tim. "Low-Information Diet". The Blog of Author Tim Ferriss. Retrieved 5 August 2015.

Further reading[edit]

External links[edit]