Friend Finding in Federated Social Networks ∗
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Judging You by the Company You Keep: Dating on Social Networking
Judging You by the Company You Keep: Dating on Social Networking Sites Adeline Lee, Amy Bruckman College of Computing/GVU Center Georgia Institute of Technology 85 5th Street, Atlanta, GA 30332 [email protected]; [email protected] ABSTRACT functionality, and concepts that may explain SNS dating behavior This study examines dating strategies in Social Networking Sites such as identity, self-representation and social capital. While there (SNS) and the features that help participants achieve their dating are many SNS today, the study data come from two well- goals. Qualitative data suggests the SNS feature, the friends list, established sites with critical mass and widespread popularity: plays a prominent role in finding potential dates, verifying Friendster and MySpace. credibility, and validating ongoing relationship commitment levels. Observations of how study participants use the friends list 1.1 Friends List: My Friends are Top Friends may provide design implications for social networking sites The friends list is the public display of one’s entire social network interested in facilitating romantic connection among their users. in which the connections are reciprocated. A friends list can be More broadly, this research shows how subtle user-interface comprised of hundreds of friends, but only a subset of these design choices in social computing software can have a profound friends appear on the front page of a member’s profile. This effect on non-trivial activities like finding a life partner. selective display of friends is called “My Friends” in Friendster (Figure 1) and “Top Friends” in MySpace (Figure 2). For Categories and Subject Descriptors simplicity, we refer to the selective display as Top Friends for H.5 [Information Interfaces and Presentation]: Group and either site. -
What Is Social Network Analysis?
Scott, John. "Key concepts and measures." What is Social Network Analysis?. London: Bloomsbury Academic, 2012. 31–56. The 'What is?' Research Methods Series. Bloomsbury Collections. Web. 4 Oct. 2021. <http://dx.doi.org/10.5040/9781849668187.ch-003>. Downloaded from Bloomsbury Collections, www.bloomsburycollections.com, 4 October 2021, 00:35 UTC. Copyright © John Scott 2012. You may share this work for non-commercial purposes only, provided you give attribution to the copyright holder and the publisher, and provide a link to the Creative Commons licence. 3 Key concepts and measures Chapter 2 traced the history of social network analysis through the three broad mathematical approaches that have domi- nated the field: graph theory, algebraic approaches and spatial approaches. In this chapter I will first consider the principal methods of data collection for social network analysis, and I will then outline and define, in sequence, the key concepts and measures associated with each mathematical approach consid- ered in Chapter 2. I will suggest that graph theory provides the formal framework common to all these approaches. I will not present highly technical definitions, as these are more appropri- ate to the various handbooks of social network analysis (Scott 2012; Degenne and Forsé 1994; Prell 2012). Having done this, I will set out some of the statistical procedures used in assessing the validity of network measures in actual situations. 31 32 What is social network analysis? Collecting network data Relational data for social network analysis can be collected through a variety of methods. These include asking questions about the choice of friends, observing patterns of interaction, and compiling information on organisational memberships from printed directories. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
Gossip and Friendship on a College Campus 1
GOSSIP AND FRIENDSHIP ON A COLLEGE CAMPUS 1 Being in the know: Social network analysis of gossip and friendship on a college campus Meltem Yucel* University of Virginia, Psychology Department, Charlottesville (VA), USA Gustav R. Sjobeck University of Virginia, Psychology Department, Charlottesville (VA), USA Rebecca Glass Widener University, Institute for Graduate Clinical Psychology (IGCP), Chester (PA), USA Joshua Rottman Franklin & Marshall College, Psychology and Scientific & Philosophical Studies of Mind, Lancaster (PA), USA Forthcoming Human Nature *Correspondence concerning this article should be addressed to Meltem Yucel, Department of Psychology, University of Virginia, West Complex, CDW 2574, Charlottesville, VA 22903, USA. Email: [email protected] GOSSIP AND FRIENDSHIP ON A COLLEGE CAMPUS 2 Declarations Funding Source: This work was supported by Psi Chi, The International Honor Society in Psychology and the Franklin & Marshall College Committee on Grants. Conflicts of interest/Competing interests: None. Availability of data and material: All data and scripts for this study are available at: https://osf.io/95q82/ Ethics approval: The questionnaire and methodology for this study was approved by the Human Research Ethics committee of the Franklin & Marshall College, on 02/07/2017 for the application #R_z8tMp5lSWgH7STL. Consent to participate: Informed consent was obtained from all individual participants included in the study. Consent for publication: Not applicable Acknowledgements: We would like to thank all participants; Psi Chi, The International Honor Society in Psychology, for their support to Meltem Yucel; and the Franklin & Marshall College Committee on Grants for funding to Rebecca Glass. We would also like to thank Allan Clifton for his very generous guidance with the study, and Alex Christensen for their guidance with statistical analyses. -
Mastodon.Py Documentation Release 1.5.1
Mastodon.py Documentation Release 1.5.1 Lorenz Diener Mar 14, 2020 Contents 1 A note about rate limits 3 2 A note about pagination 5 3 Two notes about IDs 7 3.1 ID unpacking...............................................7 4 Error handling 9 5 A brief note on block lists 11 6 Return values 13 6.1 User dicts................................................. 13 6.2 Toot dicts................................................. 14 6.3 Mention dicts............................................... 15 6.4 Scheduled toot dicts........................................... 15 6.5 Poll dicts................................................. 16 6.6 Conversation dicts............................................ 16 6.7 Hashtag dicts............................................... 16 6.8 Hashtag usage history dicts....................................... 17 6.9 Emoji dicts................................................ 17 6.10 Application dicts............................................. 17 6.11 Relationship dicts............................................ 17 6.12 Filter dicts................................................ 18 6.13 Notification dicts............................................. 18 6.14 Context dicts............................................... 18 6.15 List dicts................................................. 19 6.16 Media dicts................................................ 19 6.17 Card dicts................................................. 20 6.18 Search result dicts............................................ 20 6.19 Instance dicts.............................................. -
Challenges in the Decentralised Web: the Mastodon Case∗
Challenges in the Decentralised Web: The Mastodon Case∗ Aravindh Raman1, Sagar Joglekar1, Emiliano De Cristofaro2;3, Nishanth Sastry1, and Gareth Tyson3;4 1King’s College London, 2University College London, 3Alan Turing Institute, 4Queen Mary University of London faravindh.raman,sagar.joglekar,[email protected], [email protected], [email protected] Abstract cols to let instances interact and aggregate their users to offer a globally integrated service. The Decentralised Web (DW) has recently seen a renewed mo- DW platforms intend to offer a number of benefits. For ex- mentum, with a number of DW platforms like Mastodon, Peer- ample, data is spread among many independent instances, thus Tube, and Hubzilla gaining increasing traction. These offer al- possibly making privacy-intrusive data mining more difficult. ternatives to traditional social networks like Twitter, YouTube, Data ownership is more transparent, and the lack of centralisa- and Facebook, by enabling the operation of web infrastruc- tion could make the overall system more robust against techni- ture and services without centralised ownership or control. cal, legal or regulatory attacks. Although their services differ greatly, modern DW platforms mostly rely on two key innovations: first, their open source However, these properties may also bring inherent chal- software allows anybody to setup independent servers (“in- lenges that are difficult to avoid, particularly when consid- stances”) that people can sign-up to and use within a local ering the natural pressures towards centralisation in both so- community; and second, they build on top of federation pro- cial [12, 49] and economic [42] systems. -
Decentralized Social Networking Platforms: Current Status and Trends Protocols Used by Existing DOSN Platforms Taxonomy by Proto
Decentralized Social Networking Platforms: Current Status and Trends Andres Ledesma, George Pallis and Marios Dikaiakos Laboratory for Internet Computing (LInC), Department of computer Science, University of Cyprus. {aledesma, gpallis, mdd}@cs.ucy.ac.cy Protocols Used by Existing DOSN Platforms DOSN Platforms Trendy … Trendiest! Open Graph Activity Protocol XOXO + 400 k Stream users *Document Representation Collaboration Tent *Partial Connection to other OSN XRI OExchange *Desktop (e.g. Facebook) Content PubSubHubbub Peer-to-Peer *Project Fork pump.io Identification Exchange LAMP node.js (e.g. identi.ca) OEmbed Salmon RSS / Atom Taxonomy by Protocols and Release Stage Content protocols identify, represent and exchange social content (e.g. posts, likes The three circles represent the release stage of the platform (i.e. the maturity and comments) in DOSNs. of the platform). Libertree Thimbl PGP Protocols used: newebe Cunity Duuit! XMPP pump.io XMPP + Others buddycloud Security and DSNP OpenSSL OpenPGP All Lipsync.it Friendica Tent encryption XMPP + Ostatus Retroshare OpenLink Data Spaces Ostatus + Others Kune Diaspora* DOSN rely on protocols to make the communication as private and secure as possible. Partial Ostatus + Others Ostatus Jappix Lorea StatusNet Others stable WebID Authentication OpenID beta Salut à Toi alpha User Layered Overview OAuth Identification WebFinger Activity Streams hCard Social Content RSS/Atom User Protocols deal with authentication and identification. User authentication across PuHubSubbub Salmon services is an essential part of DOSNs. User identification provides limited and OStatus Comet XMPP Mr. Privacy Psyc controlled user data to service and application without giving up privacy. HTTP SMTP, IMAP P2P TCP/IP Social FOAF XFN Representation Food for thought… Social representation refers to protocols that express the social graph. -
Friend-Of-A-Friend-Sample.Pdf
FRIEND OF A FRIEND . ALSO BY DAVID BURKUS Under New Management: How Leading Organizations Are Upending Business as Usual The Myths of Creativity: The Truth About How Innovative Companies and People Generate Great Ideas FRIEND OF A FRIEND . Understanding the Hidden Networks That Can Transform Your Life David Burkus Houghton Miffin Harcourt Boston New York 2018 Copyright © 2018 by David Burkus All rights reserved For information about permission to reproduce selections from this book, write to [email protected] or to Permissions, Houghton Miffin Harcourt Publishing Company, 3 Park Avenue, 19th Floor, New York, New York 10016. www.hmhco.com Library of Congress Cataloging-in-Publication Data CIP data TK Book design by Chrissy Kurpeski Printed in the United States of America DOC 10 9 8 7 6 5 4 3 2 1 To my parents Contents Introduction 1 1. Find Strength in Weak Ties 13 2. See Your Whole Network 35 3. Become a Broker and Fill Structural Holes 52 4. Seek Out Silos 71 5. Build Teams from All over Your Network 91 6. Become a Super-Connector 106 7. Leverage Preferential Attachment 123 8. Create the Illusion of Majority 141 9. Resist Homophily 158 10. Skip Mixers — Share Activities Instead 174 11. Build Stronger Ties Through Multiplexity 192 Conclusion 209 Going Further 216 Acknowledgments 217 Notes 219 Index 234 About the Author 235 Introduction Or How I Learned to Stop Networking and Love Network Science n 1999, a young computer engineer and aspiring en- I trepreneur named Adam Rifkin was looking for advice on his next move. -
Functional Breakdown of Decentralised Social Networks
University of Amsterdam Master System and Network Engineering Research Project 2 Functional breakdown of decentralised social networks Student: Supervisor: Wouter Miltenburg Michiel Leenaars [email protected] [email protected] July 6, 2015 Abstract Current centralised social networks are used by a huge number of users for a variety of reasons. With Facebook, Google+, LinkedIn, or Twitter, users are not in control of their own data and access control is centralised and proprietary. Decentralised social networks could be a solution to these problems and gives the control of the data back to users. This research is focused on the question which of the decentralised social networks is currently most suited to be provided as a service by hosting providers. This paper will therefore provide information about the current implementations, the protocols used by the various implementations, and will give a functional breakdown of the various decentralised social networks. Various implementations have been analysed, namely diaspora*, Friendica, GNU social, pump.io, and RedMatrix. The paper also describes the set of standards and protocols used by the various implementations. As most implementations use their own protocol, or implement the standards slightly differently, there is no interoperability without the use of extra plugins or enabling certain features. While there are a lot of standards for facilitating the message exchange, there are however standards missing that would make interoperability possible, which is described in this paper as well. RedMatrix is currently most suited to be provided as an alternative to the current centralised social networks and that can be provided as a service by hosting providers. -
Introduction to Social Network Analysis May 2017
engage@liverpool Introduction to Social Network Analysis May 2017 Paul Hepburn engage@liverpool • What is SNA? Definition(s) Theory or method Introduction toHistory Social of development Network Analysis Basic24 concepts May 2017 • Applied use Examples of how it has been useful - issuesPaul of mixedHepburn methods, temporality Example from my own research • Next steps? What is SNA? • Underpinned by Graph Theory but influenced by other disciplines • Graph theory allows mathematical manipulation of sociograms • A graph (or sociogram) is a set of vertices (nodes, points) and a set of lines (arcs, edges) between pairs of nodes • A NETWORK consists of a graph and additional information on the nodes or lines of the graph. What is SNA • Or a NETWORK is simply a relationship between objects which could be people, organisations, nations, Google search, or brain cells. • We study at a basic level a number of points (or ‘nodes’) that are connected by links. Generally in social network analysis, the nodes are people and the links are any social connection between them • We are interested in what passes, and how it passes, through these networks – friendship, love, money, power, ideas, and even disease • The basic unit of analysis is not the individual (gender, ethnicity etc.) – it is the connections they are embedded in What is SNA? History of SNA A number of diverse academic strands have shaped, and continue to shape, the development of SNA Gestalt theory Field theory Group dynamics Structural functional anthropology Graph theory Harvard structuralists -
Federated (Mobile) Social Networking
GRUPPO TELECOM ITALIA May 2012 Università di Bologna Federated (Mobile) Social Networking • The past, present & future of the next generation of social communications Telecom Italia /Innovation & Industry Relations – Laurent-Walter Goix laurentwalter.goix@telecomitalia .it Table of contents ► Part 1: Introduction to the Social Networking topic, current trends & issues ► Part 2: Technical overview of the Social Network “standards” landscape ► Part 3: Internal “Research & Prototyping “activities Part 1: Introduction to the Social Networking topic, current trends & issues The value of Federated (Mobile) Social Networking Source: http://makemesocialblog.wordpress.com/2011/02/17/where-were-you/ May 2012 The FbkFacebook story The new communication ppgaradigm, the “wall”, is introduced in September 2006 http://mashable.com/2006/09/05/facebooks-facelift-mini-feeds- and-news-feeds/ GOIX Laurent-Walter / II.RP 4 The value of Federated (Mobile) Social Networking May 2012 Fundamental #1: what is the “wall” about? • For its owner, the “wall” (and its usual settings) can be considered –As the history of private/public activities (social, but potentially SMS sent, calls, etc) –As a privacy filter when propagating information (based on followers/circles/lists) The “wall” (or stream) is an always-on virtual presence on the Internet • For a viewer –Access to *authorized* content anytime, anywhere (without being seen, no real-time constraints) –Notification settings The “wall” is a new way of communicating: asynchronous, indirect • The wall may only be a -
Privacy Analysis on Microblogging Online Social Networks: a Survey
This report is under review by ACM Computing Surveys (CSUR) December 2017 Privacy Analysis on Microblogging Online Social Networks: a Survey Samia Oukemeni1, Helena Rifa-Pous` 2, Joan Manuel Marques` Puig3 Abstract In the last ten years, Online Social Networks (OSNs) embrace many different forms of interactive communication, including multimedia sharing, microblogging services, etc. They allow users to create profiles, connect with friends and share their daily activities and thoughts. However, this ease of use of OSNs come with a cost in terms of users’ privacy and security. The big amount of personal data shared in the users’ profiles or correlated from their activities can be stored, processed and sold for advertisement or statistical purposes. It attracts also malicious users who can collect and exploit the data and target different types of attacks. In this paper, we review the state of the art of OSNs existing either in the literature or deployed for use. We focus on the OSN systems that offer, but not exclusively, microblogging services. We analyze and evaluate each system based on a set of characteristics, and we compare them based on their usability and the level of protection of privacy and security they provide. This study is a first step towards understanding the security and privacy controls and measuring their level in an OSN. Keywords Online social networks (OSNs) – Microblogging systems — Social network security and privacy – Privacy protections – Usability in security and privacy [email protected], Universitat Oberta de Catalunya, Barcelona, Spain [email protected], Universitat Oberta de Catalunya, Barcelona, Spain [email protected], Universitat Oberta de Catalunya, Barcelona, Spain Contents 4.3 Functionalities.......................