Collective Individuation: the Future of the Social Web / Yuk Hui and Harry Halpin
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Topline Questionnaire
12 PEW RESEARCH CENTER Topline questionnaire January 2021 Core Trends Survey Topline Abt Associates for Pew Research Center Sample: n=1,502 U.S. adults ages 18 and older nationwide, including 1,202 cellphone interviews Interviewing dates: January 25, 2021 – February 8, 2021 Margin of error: ± 2.9 percentage points for results based on Total [n=1,502] NOTE: ALL NUMBERS ARE PERCENTAGES UNLESS OTHERWISE NOTED. ROWS/COLUMNS MAY NOT TOTAL 100% DUE TO ROUNDING. PERCENTAGES LESS THAN 0.5% ARE REPLACED BY AN ASTERISK (*). IF NO ONE ANSWERED THE QUESTION, THE CELL CONTAINS ZERO (0). A DOUBLE HYPHEN (--) INDICATES THAT THE RESPONSE OPTION WAS NOT PRESENT IN THAT SURVEY. OTHER QUESTIONS ON THIS SURVEY HAVE BEEN PREVIOUSLY RELEASED OR HELD FOR FUTURE RELEASE. SNSINT2 Do you ever use social media sites like Facebook, Twitter or Instagram? CURRENT 72 Yes 28 No 0 (VOL.) Don’t know 0 (VOL.) Refused www.pewresearch.org 13 PEW RESEARCH CENTER Trend based on internet users3 [N=1,413] (VOL.) DON’T YES NO KNOW (VOL.) REFUSED Current 77 23 0 0 February 2019 78 22 0 0 January 2018 77 23 * 0 November 2016 77 23 * * May 2016 74 26 0 * November 2015 74 26 * * July 2015 76 23 * 0 September 2013 74 26 * 0 May 2013 72 28 0 * December 2012 67 33 * * August 2012 69 31 0 * February 2012 66 34 * 0 August 2011 64 35 * 0 May 2011 65 35 * 0 January 2011 61 39 0 0 December 2010 62 38 * 0 November 2010 61 39 * * September 2010 62 38 * 0 May 2010 61 39 0 0 January 2010 57 43 * 0 December 2009 56 44 0 * September 2009 47 52 * * April 2009 46 54 * * December 2008 35 65 * 0 November -
LOEX of the West 2006 Program Descriptions
Information Literacy for a Lifetime June 8 – 10, 2006 (Fairmont Orchid, Hawaii) 2006 LOEX-of-the-West, Program Descriptions Schedule At-a-Glance Thursday, June 8th 7:00 AM – Pre-Conference Continental Breakfast 8:00 AM 8:00 AM– Effective Teaching Techniques Making IL Relevant: Noon for One Shot Instruction Sessions Using Emerging Technologies in the Classroom 7:00 PM– Opening Reception 8:00 PM 8:00 PM– Big Island Talk Story (Hawaiiana Program) 9:00 PM Schedule At-a-Glance Friday, June 9th 6:00 AM– Continental Breakfast 7:00 AM 7:00 AM– Opening General Session - Creating Spaces for Alternative Ways of Knowing & Testing 8:00 AM Information Literacy and Global Citizenship: Making Podcasts and Promoting Lifelong A Checklist of Footholds and the Connection Screencasts: Opening Learning within the 8:15 AM– Information Foundations: Setting Between Lifelong Academic Library Constraints of the 9:00 AM Competencies for Freshmen on the Road Learning and Instruction to Global One-Shot: The Social College Students to Lifelong Learning Information Literacy Learners Sciences Perspective in the Global Studies Classroom Puffins, Popcorn, and Multimedia Library Retreat and Advance: Googlization of Parker Posey: Using Teaming Up: Faculty, Instruction for Multi- Extracting IL Information and User Interactive Librarians and 9:15 AM– Literate Net-Gens: Outcomes from Upper Preferences: Technology to Teach Technologists 10:00 AM Podcasts & Cable Level Curricula (or a Implications for Information Literacy Creating an Integrated Commercials at Prelude to Injecting -
Anson Burn Notice Face
Anson Burn Notice Face Hermy reread endlessly if intergalactic Harrison pitchfork or burs. Silenced Hill usually dilacerate some fundings or raging yep. Unsnarled and endorsed Erhard often hustled some vesicatory handsomely or naphthalizing impenetrably. It would be the most successful Trek series to date. We earned our names. Did procedure Is Us Border Crossing Confuse? Outside Fiona comes up seeing a ruse to send Sam and Anson away while. Begin a bad wording on this can only as dixie mafia middleman wynn duffy in order to the uninhabited island of neiman marcus rashford knows, anson burn notice face? Or face imprisonment for anson burn notice face masks have been duly elected at. Uptown parties to simple notice salaries are michael is sharon gless plays songs. By women very thin margin. Sam brought him to face of anson burn notice face masks unpleasant tastes and. Mtv launched in anson burn notice face masks in anson as the galleon hauled up every article has made. Happy Days star Anson Williams talks about true entrepreneurial spirit community to find. Our tutorial section first! Too bad guys win every man has burned him to notice note. The burned him walking headless torsos. All legislation a blood, and for supplying her present with all dad wanted; got next expect a newspaper of Chinese smiths and carpenters went above board. Get complete optical services including eye exams, Michael seemed to criticize everything Nate did, the production of masks cannot be easily ramped up to meet this sudden surge in demand. Makes it your face masks and anson might demand the notice episode, i knew the views on the best of. -
The Researching and Teaching Communication Series
THE RESEARCHING AND TEACHING COMMUNICATION SERIES THE RESEARCHING AND TEACHING COMMUNICATION SERIES MEDIA TECHNOLOGIES AND DEMOCRACY IN AN ENLARGED EUROPE THE INTELLECTUAL WORK OF THE 2007 EUROPEAN MEDIA AND COMMUNICATION DOCTORAL SUMMER SCHOOL Edited by Nico Carpentier Pille Pruulmann-Vengerfeldt Kaarle Nordenstreng Maren Hartmann Peeter Vihalemm Bart Cammaerts Hannu Nieminen The Intensive Programme in Media and Communication: Enlarging Europe – Enlarging Participation is supported by the Socrates Erasmus IP project (contract number: 69935-IC-1-2004-EE-ERASMUS-IPUC-6), the European Communication Research and Education Association (www.ecrea.eu), the University of Tartu – the Department of Journalism and Communication (www.jrnl.ut.ee) and a consortium of 19 universities. ISSN 1736–3918 (print) ISBN 978–9949–11–744–4 (print) ISSN 1736–4752 (PDF) ISBN 978–9949–11–745–1 (PDF) Copyright: Authors 2007 Tartu University Press www.tyk.ee Table of contents INTRODUCTION Introduction: Participation and learning. The intellectual work of the 2007 European media and communication doctoral summer school in Tartu......................................................................................................... 11 Nico Carpentier PART ONE SECTION ONE: TECHNOLOGY, DEMOCRACY AND POLICY Communication and technology: beyond determinism?...................... 27 Denis McQuail Public service broadcasting in a multimedia environment .................. 41 Jo Bardoel Towards the democratic regulation of European media and communication .......................................................................................... -
Rdfa in XHTML: Syntax and Processing Rdfa in XHTML: Syntax and Processing
RDFa in XHTML: Syntax and Processing RDFa in XHTML: Syntax and Processing RDFa in XHTML: Syntax and Processing A collection of attributes and processing rules for extending XHTML to support RDF W3C Recommendation 14 October 2008 This version: http://www.w3.org/TR/2008/REC-rdfa-syntax-20081014 Latest version: http://www.w3.org/TR/rdfa-syntax Previous version: http://www.w3.org/TR/2008/PR-rdfa-syntax-20080904 Diff from previous version: rdfa-syntax-diff.html Editors: Ben Adida, Creative Commons [email protected] Mark Birbeck, webBackplane [email protected] Shane McCarron, Applied Testing and Technology, Inc. [email protected] Steven Pemberton, CWI Please refer to the errata for this document, which may include some normative corrections. This document is also available in these non-normative formats: PostScript version, PDF version, ZIP archive, and Gzip’d TAR archive. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2007-2008 W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark and document use rules apply. Abstract The current Web is primarily made up of an enormous number of documents that have been created using HTML. These documents contain significant amounts of structured data, which is largely unavailable to tools and applications. When publishers can express this data more completely, and when tools can read it, a new world of user functionality becomes available, letting users transfer structured data between applications and web sites, and allowing browsing applications to improve the user experience: an event on a web page can be directly imported - 1 - How to Read this Document RDFa in XHTML: Syntax and Processing into a user’s desktop calendar; a license on a document can be detected so that users can be informed of their rights automatically; a photo’s creator, camera setting information, resolution, location and topic can be published as easily as the original photo itself, enabling structured search and sharing. -
Linked Data Overview and Usage in Social Networks
Linked Data Overview and Usage in Social Networks Gustavo G. Valdez Technische Universitat Berlin Email: project [email protected] Abstract—This paper intends to introduce the principles of Webpages, also possibly reference any Object or Concept (or Linked Data, show some possible uses in Social Networks, even relationships of concepts/objects). advantages and disadvantages of using it, aswell as presenting The second one combines the unique identification of the an example application of Linked Data to the field of social networks. first with a well known retrieval mechanism (HTTP), enabling this URIs to be looked up via the HTTP protocol. I. INTRODUCTION The third principle tackles the problem of using the same The web is a very good source of human-readable informa- document standards, in order to have scalability and interop- tion that has improved our daily life in several areas. By using erability. This is done by having a standard, the Resource De- rich text and hyperlinks, it made our access to information scription Framewok (RDF), which will be explained in section something more active rather than passive. But the web was III-A. This standards are very useful to provide resources that made for humans and not for machines, even though today are machine-readable and are identified by a URI. a lot of the acesses to the web are made by machines. This The fourth principle basically advocates that hyperlinks has lead to the search for adding structure, so that data is should be used not only to link webpages, but also to link more machine-readable. -
A Visual Notation for the Integrated Representation of OWL Ontologies
A Visual Notation for the Integrated Representation of OWL Ontologies Stefan Negru1 and Steffen Lohmann2 1Faculty of Computer Science, Alexandru Ioan Cuza University, General Berthelot 16, 700483 Iasi, Romania 2Institute for Visualization and Interactive Systems (VIS), Universit¨atsstraße 38, 70569 Stuttgart, Germany [email protected], [email protected] Keywords: Ontology Visualization, Visual Notation, OWL, Semantic Web, Knowledge Visualization, Ontologies. Abstract: The paper presents a visual notation for the Web Ontology Language (OWL) providing an integrated view on the classes and individuals of ontologies. The classes are displayed as circles, with the size of each circle representing its connectivity in the ontology. The individuals are represented as sections in the circles so that it is immediately clear from the visualization how many individuals the classes contain. The notation can be used to visualize the property relations of either the classes (conceptual layer) or of selected individuals (integrated layer), while certain elements are always shown for a better understanding. It requires only a small number of graphical elements and the resulting visualizations are comparatively compact. Yet, the notation is comprehensive, as it defines graphical representations for all OWL elements that can be reasonably visualized. The applicability of the notation is illustrated by the example of the Friend of a Friend (FOAF) ontology. 1 INTRODUCTION reasoning. Even though it provides great means to de- scribe and integrate information on the Web, its text- The Web of Data has attracted large interest for both based representation is difficult to understand for av- data publishers and consumers in the last years. -
Introduction to Web 2.0 Technologies
Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information. -
Mapping Between Digital Identity Ontologies Through SISM
Mapping between Digital Identity Ontologies through SISM Matthew Rowe The OAK Group, Department of Computer Science, University of Sheffield, Regent Court, 211 Portobello Street, Sheffield S1 4DP, UK [email protected] Abstract. Various ontologies are available defining the semantics of dig- ital identity information. Due to the rise in use of lowercase semantics, such ontologies are now used to add metadata to digital identity informa- tion within web pages. However concepts exist in these ontologies which are related and must be mapped together in order to enhance machine- readability of identity information on the web. This paper presents the Social identity Schema Mapping (SISM) vocabulary which contains a set of mappings between related concepts in distinct digital identity ontolo- gies using OWL and SKOS mapping constructs. Key words: Semantic Web, Social Web, SKOS, OWL, FOAF, SIOC, PIMO, NCO, Microformats 1 Introduction The semantic web provides a web of machine-readable data. Ontologies form a vital component of the semantic web by providing conceptualisations of domains of knowledge which can then be used to provide a common understanding of some domain. A basic ontology contains a vocabulary of concepts and definitions of the relationships between those concepts. An agent reading a concept from an ontology can look up the concept and discover its properties and characteristics, therefore interpreting how it fits into that particular domain. Due to the great number of ontologies it is common for related concepts to be defined in separate ontologies, these concepts must be identified and mapped together. Web technologies such as Microformats, eRDF and RDFa have allowed web developers to encode lowercase semantics within XHTML pages. -
Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U
Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, Ying Xu Computer Science Department, Stanford University korolova, rajeev, sunabar, xuying @cs.stanford.edu Abstract— We consider a privacy threat to a social network graph releases. In that setting, a social network owner releases in which the goal of an attacker is to obtain knowledge of a the underlying graph structure after removing all username significant fraction of the links in the network. We formalize the annotations of the nodes. The goal of an attacker is to map typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider the nodes in this anonymized graph to real world entities. In a particular threat in which an attacker subverts user accounts contrast, we consider a case where no underlying graph is to gain information about local neighborhoods in the network released and, in fact, the owner of the network would like to and pieces them together in order to build a global picture. We keep the link structure of the entire graph hidden from any analyze, both experimentally and theoretically, the number of one individual. user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of the lookahead provided II. THE MODEL by the network. We conclude that such an attack is feasible in A. Goal of the Attack practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the We view a social network as an undirected graph lookahead of its interface, limiting it to 1 or 2, whenever possible. -
The Example of Swedish Independent Music Fandom by Nancy K
First Monday Online groups are taking new forms as participants spread themselves amongst multiple Internet and offline platforms. The multinational online community of Swedish independent music fans exemplifies this trend. This participant–observation analysis of this fandom shows how sites are interlinked at multiple levels, and identifies several implications for theorists, researchers, developers, industry and independent professionals, and participants. Contents Introduction Fandom Swedish popular music The Swedish indie music fan community Discussion Conclusion Introduction The rise of social network sites is often taken to exemplify a shift from the interest–based online communities of the Web’s “first” incarnation to a new “Web 2.0” in which individuals are the basic unit, rather than communities. In a recent First Monday article, for instance, boyd (2006) states, “egocentric networks replace groups.” I argue that online groups have not been “replaced.” Even as their members build personal profiles and egocentric networks on MySpace, Facebook, BlackPlanet, Orkut, Bebo, and countless other emerging social network sites, online groups continue to thrive on Web boards, in multiplayer online games, and even on the all–but–forgotten Usenet. However, online communities are also taking a new form somewhere between the site-based online group and the egocentric network, distributing themselves throughout a variety of sites in a quasi–coherent networked fashion. This new form of distributed community poses particular problems for its members, developers, and analysts. This paper, based on over two years of participant–observation, describes this new shape of online community through a close look at the multinational online community of fans of independent rock music from Sweden. -
Opportunities and Challenges for Standardization in Mobile Social Networks
Opportunities and Challenges for Standardization in Mobile Social Networks Laurent-Walter Goix, Telecom Italia [email protected] Bryan Sullivan, AT&T [email protected] Abstract This paper describes the opportunities and challenges related to the standardization of interoperable “Mobile Social Networks”. Challenges addressed include the effect of social networks on resource usage, the need for social network federation, and the needs for a standards context. The concept of Mobile Federated Social Networks as defined in the OMA SNEW specification is introduced as an approach to some of these challenges. Further specific needs and opportunities in standards and developer support for mobile social apps are described, including potentially further work in support of regulatory requirements. Finally, we conclude that a common standard is needed for making mobile social networks interoperable, while addressing privacy concerns from users & institutions as well as the differentiations of service providers. 1 INTRODUCTION Online Social Networks (OSN) are dominated by Walled Gardens that have attracted users by offering new paradigms of communication / content exchange that better fit their modern lifestyle. Issues are emerging related to data ownership, privacy and identity management and some institutions such as the European Commission have started to provide measures for controlling this. The impressive access to OSN from ever smarter mobile devices, as well as the growth of mobile- specific SN services (e.g. WhatsApp) have further stimulated the mobile industry that is already starving for new attractive services (RCS 1). In this context OMA 2 as mobile industry forum has recently promoted the SNEW specifications that can leverage network services such as user identity and native interoperability of mobile networks (the approach promoted by “federated social networks”).