Social Software: Fun and Games, Or Business Tools?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Regional Use of Social Networking Tools
Regional Use of Social Networking Tools Kate Meeuf December 2014 TECHNICAL REPORT CMU/SEI-2014-TR-018 CERT® Division http://www.sei.cmu.edu Copyright 2014 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center sponsored by the United States Department of Defense. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of Department of Homeland Security or the United States Department of Defense. This report was prepared for the SEI Administrative Agent AFLCMC/PZM 20 Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted be- low. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. -
Archetypes of Enterprise Social Network Users
Proceedings of the 51st Hawaii International Conference on System Sciences j 2018 Archetypes of Enterprise Social Network Users Christian Oettl, Thomas Berger, Markus Böhm, Manuel Wiesche, Helmut Krcmar Technical University of Munich {c.oettl, thomas.berger}@tum.de, {markus.boehm, manuel.wiesche, krcmar}@in.tum.de Abstract organizations will promote the introduction and development of ESNs in the future [8]. Investments in enterprise social networks (ESNs) have However, even if ESNs are implemented in increased rapidly in recent years. However, an ESN organizations, their value contribution appears unclear utilization intensity develops slowly, and there are a because 80% of projects do not fulfill expectations few well-grounded approaches to understand ESN [16]. The typical ROI of any social technology usage. To elaborate on different archetypes of ESN becomes positive when 15% to 25% of employees use users, we conducted a case study that comprised 28 such technology extensively and companies should not interviews with a large IT services company. We assume that “If we build it, they will come” [3]. present a model to characterize ESN users and classify This was also observed in the company that was them as archetypes based on the following two considered in this study. In 2014, a large multinational dimensions: individual openness to ESNs and IT service provider started a radical metamorphosis perceived task-fit. We determine six archetypes of ESN from an email centered to an ESN centered users, namely, power users, limited users, reluctant organization. The implemented solution provides users, repudiators, hidden champions, and question typical key functionalities that characterize an ESN as marks. -
THE SIGNIFICANCE of SOCIAL SOFTWARE Danah Boyd UC
THE SIGNIFICANCE OF SOCIAL SOFTWARE danah boyd UC Berkeley School of Information, Berkeley, CA, USA [email protected] http://www.zephoria.org/ Social software… It’s a term that is thrown around frequently, rarely defined, completely elusive, and yet totally significant. What on earth does it mean? And should you care? (IMHO) Of course you should care! Social software is all around us now. It is altering the organization of social life. How do you communicate with loved ones? How do you find information? A lot of this hinges on social software. In this opening essay, I want to address the significance of „social software.” I will look at this from a few different angles, building on the attitudes and practices of creators, users, and researchers of social software. My goal is to lay out some possible approaches for thinking about the types of technologies and behaviors that emerge. What I’m offering is not some truth serum (nor even a proper analysis) – it can and should be contested, questioned, and wrestled with. Let’s begin. Social Software First… what constitutes „social software“? Where does this term come from? In 2002, Clay Shirky (re)claimed the term „social software“ to encompass „all uses of software that supported interacting groups, even if the interaction was offline.“1 His choice was intentional. Although other terms existed – groupware, social computing, computer-mediated communication, etc. – he felt that these older terms In: Burg, Thomas N. / Jan Schmidt (Eds.) BlogTalks Reloaded. Social Software - Research & Cases. Norderstedt: Books on Demand. BlogTalk Reloaded were either polluted or a bad fit to address certain new technologies. -
Protection, Not Barriers: Using Social Software Policies to Guide and Safeguard Students and Employees
Georgia State University ScholarWorks @ Georgia State University University Library Faculty Publications Georgia State University Library Fall 2010 Protection, Not Barriers: Using Social Software Policies to Guide and Safeguard Students and Employees Brian K. Kooy Georgia State University, [email protected] Sarah King Steiner Georgia State University, [email protected] Follow this and additional works at: https://scholarworks.gsu.edu/univ_lib_facpub Part of the Library and Information Science Commons Recommended Citation Kooy, B. & Steiner, K. (2010). Protection, not barriers: Using social software policies to guide and safeguard students and employees. Reference & User Services Quarterly, 50(1), 59-71. doi: 10.5860/ rusq.50n1 This Article is brought to you for free and open access by the Georgia State University Library at ScholarWorks @ Georgia State University. It has been accepted for inclusion in University Library Faculty Publications by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. FeAture Protection, not Barriers Using Social Software Policies to Guide and Safeguard Students and Employees Academic librarians have been using social outreach to include online spaces as Brian k. kooy and software and networking sites for public well. One area in which librarians are Sarah k. Steiner services since they appeared on the Inter- providing online outreach is through net. While issues of privacy, identity man- the use of social software and social Brian K. Kooy is Philosophy, Religious agement, and self-disclosure when using networking websites such as Facebook Studies, and Middle East Studies such technologies have been written about, and MySpace. Even most library blogs Librarian and Sarah K. -
The (R)Evolution of Social Media in Software Engineering
The (R)Evolution of Social Media in Software Engineering Margaret-Anne Storey Leif Singer Brendan Cleary University of Victoria University of Victoria University of Victoria Victoria, BC, Canada Victoria, BC, Canada Victoria, BC, Canada [email protected] [email protected] [email protected] Fernando Figueira Filho Alexey Zagalsky Universidade Federal do Rio University of Victoria Grande do Norte, Natal, Brazil Victoria, BC, Canada [email protected] [email protected] ABSTRACT 1. INTRODUCTION Software developers rely on media to communicate, learn, A few years after the term \software engineering" was collaborate, and coordinate with others. Recently, social coined at a 1968 NATO conference [49], Weinberg media has dramatically changed the landscape of software published his acclaimed book on the \Psychology of engineering, challenging some old assumptions about how Computer Programming." [78] Weinberg emphasizes that developers learn and work with one another. We see the although programming is an activity that can be rise of the social programmer who actively participates in performed alone, it relies on extensive social activities as online communities and openly contributes to the creation developers will often have to ask others for help. of a large body of crowdsourced socio-technical content. The need to collaborate and interact with others has In this paper, we examine the past, present, and future only increased over time. Even solitary developers need to roles of social media in software engineering. We provide a interact directly or indirectly with others to learn, to review of research that examines the use of different media understand requirements and to seek feedback on their channels in software engineering from 1968 to the present creations. -
Social Software
social software Everyone’s an Author: Wikis and Blogs Wikis and blogs are two kinds of social software that are centered on authorship. Wikis allow some groups of people (ranging from a limited set of members to anyone with access to the web) to edit the web pages that make up a website. They also provide ways to discuss the pages as a separate process from altering them, and ways to compare different versions of the page over time. Wikis are especially useful for collaborative writing and knowledge sharing, with Wikipedia (www.wikipedia. org) being one of the best known examples. For local examples of wikis, check out http://wiki.williams.edu (an official college wiki) and http://wso.williams.edu/wiki/ index.php/Main_Page (a student run wiki about all things Williams). A number of Blackboard courses also use wikis as a framework for student collaboration. With wikis, the content organization is arbitrary (but usually topical and hierarchical) and it’s owned by the entire community; every member of the community has as much right to alter the content as any other member (though practically speaking there’s usually a core group of the most active members which act as moderators). Blogs are a way for one or more authors to publish things organized primarily by time, and for the readers and author to discuss what’s posted. People read and write blogs for a variety of reasons, ranging from keeping in touch with far flung friends, to learning and talking about particular subjects, to keeping up on the cutting edge of news. -
Uncovering Social Network Sybils in the Wild
Uncovering Social Network Sybils in the Wild ZHI YANG, Peking University 2 CHRISTO WILSON, University of California, Santa Barbara XIAO WANG, Peking University TINGTING GAO,RenrenInc. BEN Y. ZHAO, University of California, Santa Barbara YAFEI DAI, Peking University Sybil accounts are fake identities created to unfairly increase the power or resources of a single malicious user. Researchers have long known about the existence of Sybil accounts in online communities such as file-sharing systems, but they have not been able to perform large-scale measurements to detect them or measure their activities. In this article, we describe our efforts to detect, characterize, and understand Sybil account activity in the Renren Online Social Network (OSN). We use ground truth provided by Renren Inc. to build measurement-based Sybil detectors and deploy them on Renren to detect more than 100,000 Sybil accounts. Using our full dataset of 650,000 Sybils, we examine several aspects of Sybil behavior. First, we study their link creation behavior and find that contrary to prior conjecture, Sybils in OSNs do not form tight-knit communities. Next, we examine the fine-grained behaviors of Sybils on Renren using clickstream data. Third, we investigate behind-the-scenes collusion between large groups of Sybils. Our results reveal that Sybils with no explicit social ties still act in concert to launch attacks. Finally, we investigate enhanced techniques to identify stealthy Sybils. In summary, our study advances the understanding of Sybil behavior on OSNs and shows that Sybils can effectively avoid existing community-based Sybil detectors. We hope that our results will foster new research on Sybil detection that is based on novel types of Sybil features. -
Svms for the Blogosphere: Blog Identification and Splog Detection
SVMs for the Blogosphere: Blog Identification and Splog Detection Pranam Kolari∗, Tim Finin and Anupam Joshi University of Maryland, Baltimore County Baltimore MD {kolari1, finin, joshi}@umbc.edu Abstract Most blog search engines identify blogs and index con- tent based on update pings received from ping servers1 or Weblogs, or blogs have become an important new way directly from blogs, or through crawling blog directories to publish information, engage in discussions and form communities. The increasing popularity of blogs has and blog hosting services. To increase their coverage, blog given rise to search and analysis engines focusing on the search engines continue to crawl the Web to discover, iden- “blogosphere”. A key requirement of such systems is to tify and index blogs. This enables staying ahead of compe- identify blogs as they crawl the Web. While this ensures tition in a domain where “size does matter”. Even if a web that only blogs are indexed, blog search engines are also crawl is inessential for blog search engines, it is still pos- often overwhelmed by spam blogs (splogs). Splogs not sible that processed update pings are from non-blogs. This only incur computational overheads but also reduce user requires that the source of the pings need to be verified as a satisfaction. In this paper we first describe experimental blog prior to indexing content.2 results of blog identification using Support Vector Ma- In the first part of this paper we address blog identifica- chines (SVM). We compare results of using different feature sets and introduce new features for blog iden- tion by experimenting with different feature sets. -
By Nilesh Bansal a Thesis Submitted in Conformity with the Requirements
ONLINE ANALYSIS OF HIGH-VOLUME SOCIAL TEXT STEAMS by Nilesh Bansal A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto ⃝c Copyright 2013 by Nilesh Bansal Abstract Online Analysis of High-Volume Social Text Steams Nilesh Bansal Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2013 Social media is one of the most disruptive developments of the past decade. The impact of this information revolution has been fundamental on our society. Information dissemination has never been cheaper and users are increasingly connected with each other. The line between content producers and consumers is blurred, leaving us with abundance of data produced in real-time by users around the world on multitude of topics. In this thesis we study techniques to aid an analyst in uncovering insights from this new media form which is modeled as a high volume social text stream. The aim is to develop practical algorithms with focus on the ability to scale, amenability to reliable operation, usability, and ease of implementation. Our work lies at the intersection of building large scale real world systems and developing theoretical foundation to support the same. We identify three key predicates to enable online methods for analysis of social data, namely : • Persistent Chatter Discovery to explore topics discussed over a period of time, • Cross-referencing Media Sources to initiate analysis using a document as the query, and • Contributor Understanding to create aggregate expertise and topic summaries of authors contributing online. The thesis defines each of the predicates in detail and covers proposed techniques, their practical applicability, and detailed experimental results to establish accuracy and scalability for each of the three predicates. -
Social Software: E-Learning Beyond Learning Management Systems
Social software: E-learning beyond learning management systems Christian Dalsgaard [[email protected]] Institute of Information and Media Studies University of Aarhus Helsingforsgade 14, 8200 Aarhus N, Denmark [http://www.imv.au.dk] Introduction Whether focusing on distance education or campus based education, universities all over the world are using learning management systems (LMS) to support and improve learning within their institution. Yet the OECD (2005) report "E-learning in Tertiary Education: Where do we stand?" indicates that universities primarily use LMS for administrative purposes, and that LMS so far have had a limited impact on pedagogy: "ICT has penetrated tertiary education, but has had more impact on administrative services (e.g. admissions, registration, fee payment, purchasing) than on the pedagogic fundamentals of the classroom." (OECD, 2005, p. 15) This article will discuss the use of centralized and integrated LMS and argue that they, within a framework of a social constructivist pedagogy, should play only a minor role within organization of e-learning. It is argued that social software tools can support a social constructivist approach to e- learning by providing students with personal tools and engaging them in social networks. Using social software in this way requires that organization of e-learning moves beyond centralized and integrated LMS and towards a variety of separate tools which are used and managed by the students in relation to their self-governed work. It is argued that social software tools enable a different way of using the web within an educational context. The article discusses how social software can be used to support a social constructivist approach to e-learning, or more specifically, how social software can support self-governed, problem-based and collaborative activities. -
Blogosphere: Research Issues, Tools, and Applications
Blogosphere: Research Issues, Tools, and Applications Nitin Agarwal Huan Liu Computer Science and Engineering Department Arizona State University Tempe, AZ 85287 fNitin.Agarwal.2, [email protected] ABSTRACT ging. Acknowledging this fact, Times has named \You" as the person of the year 2006. This has created a consider- Weblogs, or Blogs, have facilitated people to express their able shift in the way information is assimilated by the indi- thoughts, voice their opinions, and share their experiences viduals. This paradigm shift can be attributed to the low and ideas. Individuals experience a sense of community, a barrier to publication and open standards of content genera- feeling of belonging, a bonding that members matter to one tion services like blogs, wikis, collaborative annotation, etc. another and their niche needs will be met through online These services have allowed the mass to contribute and edit interactions. Its open standards and low barrier to publi- articles publicly. Giving access to the mass to contribute cation have transformed information consumers to produc- or edit has also increased collaboration among the people ers. This has created a plethora of open-source intelligence, unlike previously where there was no collaboration as the or \collective wisdom" that acts as the storehouse of over- access to the content was limited to a chosen few. Increased whelming amounts of knowledge about the members, their collaboration has developed collective wisdom on the Inter- environment and the symbiosis between them. Nonetheless, net. \We the media" [21], is a phenomenon named by Dan vast amounts of this knowledge still remain to be discovered Gillmor: a world in which \the former audience", not a few and exploited in its suitable way. -
Privacy by Design: Does It Matter for Social Networks?
Privacy by Design: Does it matter for Social Networks? Mohammad Badiul Islam 1, 2 , Renato Iannella 1, 3 1 Computer Science Discipline, Faculty of Science and Technology, Queensland University of Technology 2 NICTA (National ICT Australia), Queensland Research Lab, Brisbane, Australia. 3 Semantic Identity, Brisbane, Australia. [email protected] , [email protected] Abstract: Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy inva- sive” areas such as social networks. However, Social Network users seldom know how to protect their own privacy through online mechanisms. What is re- quired is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting users’ personal information. The research has also posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online in- formation systems. Keywords: Privacy by Design, Social Networks, Privacy, Access Control, Mo- bile Social Networks, Distributed Social Networks, Open Source Social Net- works, Diaspora, Clique.