The Future Of Algorithmic Personalisation

bubble2-621x320.jpg

A recommendation engine that applies a classification process on trends can solves personalization problems

Personalisation algorithms influence what you’ve chosen yesterday, what might you choose today, and what you’ll be choosing tomorrow. Simultaneous y, there seems to be something wrong with personalisation. We are continuously bumping into obtrusive, uninteresting ads. Our digital personal assistant isn’t all that personal. We’ve lost friends to the algorithmic abyss of the News feed. The content we encounter online seems to repeat the same things again and again.
Personalisation’s image of us is like looking at, yourself in funfair’s house of mirrors.

Personalisation Gaps
There are five main reasons why personalization remains broken.
Data gap means that any algorithmic environment has only a limited amount of data about you. The system can understand you only on its own terms, based on the experience it provides and the feedback loops it uses. Even if the system uses external data sources, it still has only a partial understanding of your interests and preferences.
Computing gap refers to the limitations of computing power and machine-learning technologies. Today’s fastest systems become too slow when they try to understand the complexity of an individual on their own terms. Simultaneously, even the most advanced machine-learning solutions haven’t yet provided a way for computers to seamlessly learn from us and adapt to us.
Personalization caricaturizes us and creates a striking gap between our real interests and their digital reflection.
Interest gap is related to the conflicting interests of users, platforms and third-party actors (e.g., marketers). It comes down to this: Whose interests and preferences are prioritized when deciding what you can see and do? You might not be interested in ads, but they are shown to you nevertheless. When someone is paying for your attention, your ability to choose for yourself diminishes.
Action gap defines the incongruity between your true actions and the ones that are at your disposal. For example, you might want to press a non-existent “Not Cool” button. Or you might not want to see a certain image ever again, but there’s no method to make it happen. Your actions are simplified to fit the environment’s limited feedback loops.
Content gap denotes that any platform or application doesn’t always have content that serves your exact intentions or needs. It also means that the diversity of the served content might be very limited. Be it sports news or restaurant tips, the app or website might run out of relevant content. The more niche the topic, the smaller the chance that you continuously get content that works for you.
Personalization promises to modify your digital experience based on your personal interests and preferences. Simultaneously, personalization is used to shape you, to influence you and guide your everyday choices and actions. Inaccessible and incomprehensible algorithms make autonomous decisions on your behalf. They reduce the amount of visible choices, thus restricting your personal agency.
Because of the personalization gaps and internal paradox, personalization remains unfulfilling and incomplete. It leaves us with a feeling that it serves someone else’s interests better than our own.

Toward Human-Centered Algorithmic Personalisation
There are three design and development paths that would help personalization to serve us better as unique individuals.
Personalization needs a new user interface paradigm and interaction model. To bridge the data gap, personalization interface learns efficiently from direct and indirect actions. Similarly, the computing gap grows smaller as the system learns from what you do and what you’re not doing. To solve the interest gap, you can directly control what is visible to you. The interface allows you to intuitively view different alternatives, mixing in relevant content coming from third parties. You’re able to see why certain things are shown to you. This transparency enhances your ability to affect your preferences, benefitting also the platform and third parties.
To shrink the action gap, the adaptive user interface enables context-aware interactions, such as custom emojis or gestures, based on your real intentions and reactions. From a content gap point of view, the system is able to notify you when something interesting is available and actionable — with a little vibration on your wrist or a smart notification on your device’s screen. The new interface for personalization puts “my-time” above real-time.
Personalization should be able to provide a mix of relevant and surprising, timely and well aged content. From the data gap and computing gap perspective, the system can have a more granular understanding of your real interests if it provides a diverse set of alternative options. This allows you to express your personal interests in more detail. Simultaneously, the system can learn to recognize previously unknown or unorthodox connections based on your activity.
Interest gap-wise, the remix of relevant information and surprises allows you to decide yourself how to prioritize information. By introducing relevant yet diverse alternatives, the system is not caging you into a restrictive information silo. Even the time-to-time irrelevant content is not interfering with your experience. Both relevance and serendipity are subjective and contextual. Algorithms recognize when you are open to exploration or when you’re more goal-oriented, searching a specific piece of information.
To diminish the action gap, diverse smart recommendations let you define yourself on your own terms. The system starts to understand your short-term and long-term interests to anticipate your information needs. Timeliness does not equal relevance; a huge pool of content ages well without losing its appeal or meaning. Content gap shrinks effectively as the pool of interesting information gets wider and deeper.
Personalization should bring together collective intelligence and artificial intelligence. The connections become faster and the computers smarter and more efficient. To decrease the computing gap the focus is on enhancing the information flow between humans and machines. Humans are (still) the best pattern-recognition systems in the known universe. We can help each other to find and discover meaningful signals. Artificial intelligence should empower this sense-making by powering adaptive interfaces and predictive learning systems.
Human-centered personalization brings together human-curated signals and adaptive machine-learning solutions. In this way intelligent systems mature by learning from our individual and collective interactions and insights. In this way human imagination and irrationality can outplay the restrictions of algorithmic determinism.
What about the personalization paradox? There’s no objectivity (nor should there be claims of objectivity) in the realm of personalization. We shape the algorithms and the algorithms shape us continuously. To serve us better, personalization algorithms should be able understand our subjective way of seeing connections and meanings around us.
In the end, personalization as a concept derives from the world of industrial mass production and marketing. Maybe, in order to mark a new era of algorithmically assisted decision-making — and to emphasize the importance of personal agency — we should talk about choice algorithms instead of personalization algorithms.
Techcrunch: http://tcrn.ch/1GLelW3

« The Changing Face of Cyber Risk for Law Firms
Legality of Target Acquisition: The U.S. Needs a Drone Board »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Synechron

Synechron

Synechron is a leading global digital consulting firm, providing innovative technology solutions for business.