Characterization of Friendfeed – a Web-Based Social Aggregation Service
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Principles, Models, and Methods for the Characterization and Analysis of Lurkers in Online Social Networks
Principles, models, and methods for the characterization and analysis of lurkers in online social networks Roberto Interdonato, Andrea Tagarelli DIMES Dept., Università della Calabria, Italy The 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Lurking in OSNs: Principles, Models, and Methods Lurking in OSNs: Principles, Models, and Methods Lurk(er): what meanings Lurking in OSNs: Principles, Models, and Methods “Lurker”: let’s google it … Lurking in OSNs: Principles, Models, and Methods Lurk(er): what meanings Lurking in OSNs: Principles, Models, and Methods Outline 1. Lurking in online communities 2. Modeling lurking behaviors Topology-driven lurking definition The issue of controversial definitions Lurking and online behavioral 3. Lurker ranking methods models 4. Experimental evaluation The opportunity of de-lurking Static scenarios Dynamic scenarios 5. Applications to other domains Vicariously learning Lurking in social trust contexts 6. Delurking via Targeted Influence Maximization The DEvOTION algorithm 7. Conclusion and future work Lurking in OSNs: Principles, Models, and Methods LURKING IN ONLINE COMMUNITIES Lurking in OSNs: Principles, Models, and Methods The 1:9:90 rule of participation inequality (1/3) Arthur, C. (2006). What is the 1% rule? In: The guardian. UK: Guardian News and Media. Lurking in OSNs: Principles, Models, and Methods The 1:9:90 rule of participation inequality (2/3) • [Nonnecke & Preece, 2000] Email-based discussion lists: • 77 online health support groups and 21 online technical support groups • 46% of the health support group members and 82% of the technical support group members are lurkers • [Swartz, 2006] On Wikipedia: over 50% of all the edits are done by only 0.7% of the users • [van Mierlo, 2014] On four DHSNs (AlcoholHelpCenter, DepressionCenter, PanicCenter, and StopSmokingCenter): • 63,990 users, 578,349 posts • Lurkers account for 1.3% (n=4668), Contributors for 24.0% (n=88,732), and Superusers for 74.7% (n=276,034) of content Nonnecke, B., Preece, J. -
THE TRUTH CAN CATCH the LIE: the FLAWED UNDERSTANDING of ONLINE SPEECH in INRE Anonymous ONLINE SPEAKERS Musetta Durkeet
THE TRUTH CAN CATCH THE LIE: THE FLAWED UNDERSTANDING OF ONLINE SPEECH IN INRE ANoNYMous ONLINE SPEAKERS Musetta Durkeet In the early years of the Internet, many cases seeking disclosure of anonymous online speakers involved large companies seeking to unveil identities of anonymous posters criticizing the companies on online financial message boards.' In such situations, Internet service providers (ISPs)-or, less often, online service providers (OSPs)2-- disclosed individually- identifying information, often without providing defendants notice of this disclosure,' and judges showed hostility towards defendants' motions to quash.4 Often these subpoenas were issued by parties alleging various civil causes of action, including defamation and tortious interference with business contracts.s These cases occurred in a time when courts and the general public alike pictured the Internet as a wild west-like "frontier society,"' devoid of governing norms, where anonymous personalities ran C 2011 Musetta Durkee. t J.D. Candidate, 2012, University of California, Berkeley School of Law. 1. Lyrissa Barnett Lidsky, Anonymity in Cyberspace: What Can We LearnfromJohn Doe?, 50 B.C. L. REv. 1373, 1373-74 (2009). 2. As will be discussed below, there has been some conflation of two separate services that allow users to access the Internet, on the one hand, and engage in various activities, speech, and communication, on the other. Most basically, this Note distinguishes between Internet Service Providers (JSPs) and Online Service Providers (OSPs) in order to separate those services and companies involved with providing subscribers access to the infrastructure of the Internet (ISPs, and their subscribers) and those services and companies involved with providing users with online applications, services, platforms, and spaces on the Internet (OSPs and their users). -
Social Media Why You Should Care What Is Social Media? Social Network
Social Media Why You Should Care IST 331 - Olivier Georgeon, Frank Ritter 31 oct 15 • eMarketer (2007) estimated by 2011 one-half Examples of all Internet users will use social networking • Facebook regulary. • YouTube • By 2015, 75% use • Myspace • Twitter • Del.icio.us • Digg • Etc… 2 What is Social Media? Social Network • Social Network • Online communities of people who share • User Generated Content (UGC) interests and activities, • Social Bookmarking • … or who are interested in exploring the interests and activities of others. • Examples: Facebook, MySpace, LinkedIn, Orkut • Falls to analysis with tools in Ch. 9 3 4 User Generated Content (UGC) Social Bookmarking • A method for Internet users to store, organize, search, • or Consumer Generated Media (CGM) and manage bookmarks of web pages on the Internet with the help of metadata. • Based on communities; • Defined: Media content that is publicly – The more people who bookmark a piece of content, the more available and produced by end-users (user). value it is determined to have. • Examples: Digg, Del.icio.us, StumbleUpon, and reddit….and now combinations • Usually supported by a social network • Examples: Blogs, Micro-blogs, YouTube video, Flickr photos, Wiki content, Facebook wall posts, reddit, Second Life… 5 6 Social Media Principles Generate an activity stream • Automatic • Who you are – Google History, Google Analytics – Personalization • Blog • Who you know • Micro-blog – Browse network – Twitter, yammer, identi.ca • What you do • Mailing groups – Generate an activity stream -
POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application. -
Security and Online Social Networks
Security and Online Social Networks Javier Echaiz and Jorge Ardenghi Laboratorio de Investigaci´on de Sistemas Distribuidos (LISiDi), Departamento de Ciencias e Ingenier´ıa de la Computaci´on Tel´efono: +54 291 4595135, Fax: +54 291 4595136 Universidad Nacional del Sur, Bah´ıa Blanca (8000), Argentina {je,jra}@cs.uns.edu.ar, WWW home page: http://lisidi.cs.uns.edu.ar Abstract. In the last few years we have witnessed a sustained rise in the popularity of online Social Network Sites (SNSs) such as Twitter, Facebook, Myspace, Flickr, LinkedIn, FriendFeed, Google Friend Con- nect, Yahoo! Groups, etc., which are some of the most visited websites worldwide. However, since they are are easy to use and the users are often not aware of the nature of the access of their profiles, they often reveal information which should be kept away from the public eyes. As a result, these social sites may originate security related threats for their members. This paper highlights the benefits of safe use of SNSs and emphasizes the most important threats to members of SNSs. Moreover, we will show the main factors behind these threats. Finally we present policy and technical recommendations in order to improve security without compromising the benefits of information sharing through SNSs. Keywords: Online Social Network, Privacy, Profile squatting, Identity threat, Image Tagging and Cross-profiling. 1 Introduction The advent of the Internet has given rise to many forms of online sociality, from the old e-mail and Usenet services to the more recent instant messaging (IM), blogging, and online social services. Among these, the technological phenomenon that has acquired the greatest popularity in this 21st century is the latter, the Social Networking Sites (SNSs). -
M&A @ Facebook: Strategy, Themes and Drivers
A Work Project, presented as part of the requirements for the Award of a Master Degree in Finance from NOVA – School of Business and Economics M&A @ FACEBOOK: STRATEGY, THEMES AND DRIVERS TOMÁS BRANCO GONÇALVES STUDENT NUMBER 3200 A Project carried out on the Masters in Finance Program, under the supervision of: Professor Pedro Carvalho January 2018 Abstract Most deals are motivated by the recognition of a strategic threat or opportunity in the firm’s competitive arena. These deals seek to improve the firm’s competitive position or even obtain resources and new capabilities that are vital to future prosperity, and improve the firm’s agility. The purpose of this work project is to make an analysis on Facebook’s acquisitions’ strategy going through the key acquisitions in the company’s history. More than understanding the economics of its most relevant acquisitions, the main research is aimed at understanding the strategic view and key drivers behind them, and trying to set a pattern through hypotheses testing, always bearing in mind the following question: Why does Facebook acquire emerging companies instead of replicating their key success factors? Keywords Facebook; Acquisitions; Strategy; M&A Drivers “The biggest risk is not taking any risk... In a world that is changing really quickly, the only strategy that is guaranteed to fail is not taking risks.” Mark Zuckerberg, founder and CEO of Facebook 2 Literature Review M&A activity has had peaks throughout the course of history and different key industry-related drivers triggered that same activity (Sudarsanam, 2003). Historically, the appearance of the first mergers and acquisitions coincides with the existence of the first companies and, since then, in the US market, there have been five major waves of M&A activity (as summarized by T.J.A. -
Studying Social Tagging and Folksonomy: a Review and Framework
Studying Social Tagging and Folksonomy: A Review and Framework Item Type Journal Article (On-line/Unpaginated) Authors Trant, Jennifer Citation Studying Social Tagging and Folksonomy: A Review and Framework 2009-01, 10(1) Journal of Digital Information Journal Journal of Digital Information Download date 02/10/2021 03:25:18 Link to Item http://hdl.handle.net/10150/105375 Trant, Jennifer (2009) Studying Social Tagging and Folksonomy: A Review and Framework. Journal of Digital Information 10(1). Studying Social Tagging and Folksonomy: A Review and Framework J. Trant, University of Toronto / Archives & Museum Informatics 158 Lee Ave, Toronto, ON Canada M4E 2P3 jtrant [at] archimuse.com Abstract This paper reviews research into social tagging and folksonomy (as reflected in about 180 sources published through December 2007). Methods of researching the contribution of social tagging and folksonomy are described, and outstanding research questions are presented. This is a new area of research, where theoretical perspectives and relevant research methods are only now being defined. This paper provides a framework for the study of folksonomy, tagging and social tagging systems. Three broad approaches are identified, focusing first, on the folksonomy itself (and the role of tags in indexing and retrieval); secondly, on tagging (and the behaviour of users); and thirdly, on the nature of social tagging systems (as socio-technical frameworks). Keywords: Social tagging, folksonomy, tagging, literature review, research review 1. Introduction User-generated keywords – tags – have been suggested as a lightweight way of enhancing descriptions of on-line information resources, and improving their access through broader indexing. “Social Tagging” refers to the practice of publicly labeling or categorizing resources in a shared, on-line environment. -
Network Overlap and Content Sharing on Social Media Platforms
Network Overlap and Content Sharing on Social Media Platforms Jing Peng1, Ashish Agarwal2, Kartik Hosanagar3, Raghuram Iyengar3 1School of Business, University of Connecticut 2McCombs School of Business, University of Texas at Austin 3The Wharton School, University of Pennsylvania [email protected] [email protected] {kartikh, riyengar}@wharton.upenn.edu February 15, 2017 Acknowledgments. We benefited from feedback from session participants at 2013 Symposium on Statistical Challenges in eCommerce Research, 2014 International Conference on Information Systems, 2015 Workshop on Information in Networks, 2015 INFORMS Annual Meeting, and 2015 Workshop on Information Systems and Economics. The authors would like to thank Professors Christophe Van den Bulte, Paul Shaman, and Dylan Small for helpful discussions. This project was made possible by financial support extended to the first author through Mack Institute Research Fellowship, President Gutmann's Leadership Award, and Baker Retailing Center PhD Research Grant. 1 Network Overlap and Content Sharing on Social Media Platforms ABSTRACT We study the impact of network overlap – the overlap in network connections between two users – on content sharing in directed social media platforms. We propose a hazards model that flexibly captures the impact of three different measures of network overlap (i.e., common followees, common followers and common mutual followers) on content sharing. Our results indicate a receiver is more likely to share content from a sender with whom they share more common followees, common followers or common mutual followers after accounting for other measures. Additionally, the effect of common followers and common mutual followers is positive when the content is novel but decreases, and may even become negative, when many others in the network have already adopted it. -
Introduction to Web 2.0 Technologies
Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information. -
Tag Cloud Reorganization: Finding Groups of Related Tags on Delicious
Tag Cloud Reorganization: Finding Groups of Related Tags on Delicious ABSTRACT Tag clouds have become an appealing way of navigating through web pages on social tagging systems. Recent research has focused on finding relations among tags to improve visualization and access to web documents from tag clouds. Reorganizing tag clouds according to tag relatedness has been suggested as an effective solution to ease navigation. Most of the approaches either rely on co-occurrences or rely on textual content to represent tags. In this chapter we will explore tag cloud reorganization based on both of them. We compare these clouds from a qualitative point of view, analyzing pros and cons of each approach. We show encouraging results suggesting that co-occurrences produce more compelling reorganization of tag clouds than textual content, being computationally less expensive. INTRODUCTION Social bookmarking sites allow to collaboratively annotate web pages, relying on the social tagging philosophy. Social tagging is a Web 2.0 application based phenomenon where users can describe web contents by adding tags or keywords as metadata in an open, collaborative and non-hierarchical way (Smith, 2008). Social bookmarking is a popular way to store, organize, comment on and search links to any web page, and it has emerged as one of the most important web applications that eases information sharing. Popular collaborative tagging sites have aggregated a vast amount of user-created metadata in the form of tags, providing valuable information about the interests and expertise of the users. Because of this, it becomes a fertile area to scientific research on social media (Gupta et al., 2010). -
Facebook Timeline
Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money. -
Turbo-Charge Your Business with Social Media Marketing
Turbo-Charge Your Business with Social Media Marketing Countless Google searches are taking place every day. However, if people haven’t heard of your brand, they’ll never discover the value of your product or service. Enter social media marketing, a form of internet marketing that implements various social media networks in order to achieve marketing communication and branding goals. Social Media Marketing (SMM) covers activities like social sharing of content, videos, images, A total 74% of and paid social media advertising. SMM develops and sustains customer engagement, which has been found to influence buying behavior. Getting started without any insight or any consumers rely on social previous experience can be tricky. Here’s how you can use social media marketing to grow your media to influence their busines: purchasing decisions, 1. Carefully develop a plan aligned with your goals. To develop your plan, do a thorough analysis of existing social followers across your networks, analyze your competition, and according to CeBIT. identify areas for improvement. When allocating budget and resources to SMM, take into account whether your campaign requires any paid social efforts or if you plan to rely on organic tactics and owned media. Once you have decided on an appropriate budget and sketched your social media campaign, create your dream team and assign clear-cut roles to them. The final steps of your social media campaign strategy should be to identify the metrics you will use to measure the ROI of your campaign. In order to achieve this, you’ll need to outline and define your campaign’s goals, which are the next component of a great campaign.