Online Identifiers in Everyday Life

Total Page:16

File Type:pdf, Size:1020Kb

Online Identifiers in Everyday Life © 2010 by Benjamin M. Gross. All rights reserved. ONLINE IDENTIFIERS IN EVERYDAY LIFE BY BENJAMIN M. GROSS DISSERTATION Submied in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2010 Urbana, Illinois Doctoral Commiee: Associate Professor Michael Twidale, Chair Professor Geof Bowker, University of Pisburgh Professor Chip Bruce Associate Professor Ann Bishop Abstract Identifiers are an essential component of online communication. Email addresses and instant messenger usernames are two of the most common online identi- fiers. is dissertation focuses on the ways that social, technical and policy fac- tors affect individual’s behavior with online identifiers. Research for this dissertation was completed in two parts, an interview-based study drawn from two populations and an examination of the infrastructure for managing identifiers in two large consumer services. e exploratory study ex- amines how individuals use online identifiers to segment and integrate aspects of their lives. e first population is drawn from employees of a financial ser- vice firm with substantial constraints on communication in the workplace. e second population is drawn from a design firm with minimal constraints on com- munication. e two populations provide the opportunity to explore the social, technical, and policy issues that arise from diverse communication needs, uses, strategies, and technologies. e examination of systems focuses on the infras- tructure that Google and Yahoo! provide for individuals to manage their iden- tifiers across multiple services, and the risks and benefits of employing single sign-on systems. is research contributes to our understanding of the ways that identifiers shape online self-representation and communication. Specifically,interview data high- light the ways in which individuals’ preferences for the creation and manage- ment of identifiers conflict with external factors. ese conflicts lead to frustra- tion, arbitrary decisions, and complicated management issues. is thesis con- cludes with recommendations for system designers and policy implementers. ii Acknowledgements I am grateful to the many individuals that helped to shape my research in both large and small ways. I would like to single out the following individuals for their intellectual and logistical contributions to my research. I would first like to thank my current commiee members Michael Twidale, Geof Bowker, Chip Bruce, and Ann Bishop for their phenomenal support and advice in guiding me through the PhD process and for their criticism that greatly im- proved my work. My former advisors and commiee members Leigh Estabrook, Les Gasser, Bruce Schatz, and Susan Leigh Star all made significant contribu- tions to my work. I would also like to thank Christena Nippert-Eng at the Illinois Institute of Technology for her unwavering encouragement and numerous intel- lectual contributions. In the Graduate School of Library and Information Science, Dean John Unsworth, Rae-Anne Montague, Linda Smith and the administrative staff Dorlene Clark, Sally Eakin, Kathy Painter, and Valerie Youngen made it possible to navigate through the university bureaucracy. I am fortunate to have many friends and colleagues with whom I could discuss my work. Alan Braverman, Michael Buckland, Elizabeth Churchill, Rachna Dhamija, Nicolas Ducheneaut, Steve Griffin, Susan Harum, Sarah Horton, David Jeske, Nalini Kotamraju, Peter Merholz, Dan Pape, Warren Sack, Paul Sas, Jeff Ubois, and Bill Woodcock all made significant contributions to my PhD. I would like to say a special thank you to Michal Weber for her advice, encouragement, and nudges pointing me towards graduation. ank you to my family for patiently seeing me through the whole process. iii Table of Contents List of Tables ................................. vii List of Figures . viii Chapter 1 Introduction .......................... 1 1.1 Purpose of is Study ........................ 1 1.2 Background of the Problem ..................... 2 1.3 Identity and Identifiers ....................... 2 1.4 Identifiers and Namespaces ..................... 3 1.5 Email Addresses and Instant Messenger IDs ............ 3 1.6 Social Network Service Identifiers ................. 4 1.7 Scope of the Study .......................... 5 1.8 Research Questions .......................... 6 Chapter 2 Literature Review ....................... 7 2.1 Role and Identity ........................... 7 2.2 Controlling Access .......................... 9 2.3 Reducing Cognitive Overhead .................... 10 2.4 Rhythms, Time, and Place ...................... 11 2.5 Email Standards ........................... 12 2.6 Accounts, Security and Phishing .................. 13 2.7 Surveys of Online Communication ................. 16 2.8 Overview of Modern Online Identifiers ............... 17 2.8.1 From ARPANET to NSFNET to the internet ........ 18 2.8.2 Electronic Mail ........................ 20 2.8.3 UUCP and USENET ...................... 21 2.8.4 BITNET ............................ 23 2.8.5 Social Networks ....................... 23 2.8.6 Massively Multiplayer Online Games and Virtual Worlds . 26 2.8.7 Instant Messaging and Presence .............. 29 2.8.8 Twier ............................ 30 Chapter 3 Methods ............................. 32 3.1 Overview of Methods ........................ 32 3.2 Analytical Frameworks and Contributions ............. 33 3.3 Populations .............................. 34 3.4 Sampling and Contact Process .................... 34 3.5 Financial Service Professionals ................... 34 3.6 Design Professionals ......................... 35 3.7 Analysis of Production Services ................... 35 3.8 Methodological Limitations ..................... 36 iv Chapter 4 Findings from Interviews ................... 37 4.1 Demographics of Populations .................... 37 4.2 Overview of Influences ........................ 37 4.3 Social and Personal Influences on Identifiers ............ 40 4.3.1 Managing Presentation of Self ............... 40 4.3.2 Personal Branding ...................... 47 4.3.3 Integration .......................... 49 4.4 Technical and Infrastructure Influences on Identifiers ...... 51 4.4.1 Namespace Saturation .................... 53 4.4.2 Address Books and Identity ................. 54 4.4.3 Addressing and Identity ................... 55 4.4.4 Email Headers and eir Implications ........... 58 4.4.5 Confusion En Masse: Blind Carbon Copy (BCC) ...... 61 4.4.6 Retrieval and Organization in Email Collections ...... 64 4.5 Policy and Regulatory Influences on Identifiers .......... 65 4.6 Security Considerations ....................... 66 4.6.1 Technical Implementations of Policy ............ 68 4.6.2 Identity and Access Control ................. 71 4.6.3 Compliance Systems, Tradeoffs and Risk .......... 73 Chapter 5 Common Systems for Managing Identifiers . 75 5.1 Google Accounts and Google Namespaces ............. 76 5.1.1 Google Accounts Without Gmail .............. 77 5.1.2 Google Accounts With Gmail ................ 77 5.1.3 Google Apps Accounts .................... 79 5.1.4 Google Groups ........................ 82 5.1.5 Other Google Services .................... 83 5.2 Yahoo! Accounts ........................... 89 5.3 Single Sign-On: Benefits and Risks ................. 94 5.4 OpenID Authentication ....................... 95 5.5 OAuth and Delegated Authorization ................ 96 5.6 Future Developments for OpenID and OAuth ............ 98 Chapter 6 Discussion . 100 6.1 Design Implications ......................... 100 6.2 Address Books Mediate Identity ................... 100 6.3 Phone Numbers as Identifiers .................... 104 6.4 Mitigating problems with BCCs and Reply to All .......... 109 6.5 Web-Based Sign-Ins ......................... 110 6.6 Compliance Systems and Workarounds ............... 113 6.7 Namespace Speculation ....................... 115 6.8 Namespace Collisions ........................ 116 6.9 Automatic Configuration ...................... 117 Chapter 7 Conclusions and Future Work . 121 7.1 Conclusions .............................. 121 7.1.1 Social Factors ......................... 122 7.1.2 Technical Factors ....................... 123 7.1.3 Policy Factors ......................... 124 7.1.4 Lifecycle of Identifiers .................... 126 7.2 Future Work ............................. 127 7.2.1 Improving Web-based Sign Ins ............... 127 7.2.2 Identifier Lifecycle and Namespace Valuation ....... 128 References .................................. 130 v Appendix A Interview Guide . 143 A.1 Basic Demographic Information ................... 143 A.2 General Questions .......................... 143 A.3 Your First Email Address and Instant Messenger Username ... 144 A.4 Uses of Identifiers .......................... 145 A.5 Addressing, Address Books and Buddy Lists ............ 145 A.6 Regulation .............................. 147 A.7 Access Control ............................ 148 A.8 Search and Organization ....................... 148 Appendix B Description of Interview Codes . 149 B.1 Access Control ............................ 149 B.2 Additional Communication Channels ................ 149 B.3 Addressing and Address Books ................... 149 B.4 Affiliation, Status and Prestige ................... 150 B.5 Cognitive Overload .......................... 150 B.6 Communication Channel Selection ................. 150 B.7 Control Aention and Availability ................. 151 B.8 Desiring an Identifier
Recommended publications
  • Raketu to Add Mobility to Web-Based Voip | Infoworld | News | 2007-06-15 | by John Bl
    Raketu to add mobility to Web-based VoIP | InfoWorld | News | 2007-06-15 | By John Bl... Page 1 of 4 HOME NEWS TECHNOLOGIES BLOGS/COLUMNS TEST CENTER AUDIO/VIDEO CAREERS IT EXEC-CONNEC Raketu to add mobility to Web-based VoIP New version of the Raketu application will let users make VoIP calls, send text messages, A and chat from cell phone By John Blau, IDG News Service Talkback E-mail Printer Friendly June 15, 2007 A Raketu Communications will add two new mobile phone features to its integrated communications, entertainment, and social networking service in a move to attract consumers on the go. Next week, Raketu will introduce a new domain, www.raketu.mobi, which will allow Free IT resource mobile phone users to more easily navigate the Raketu site and use services such as the company's RakWeb service launched earlier this week, said CEO Greg Learn about the energy Parker in an interview. efficiency in EMC's Pund- IT report on power conservation. By the end of the month, the company intends to launch a new mobile phone version of the Raketu application, which users can install on their phones to make VoIP calls, Sponsored by EMC send text messages, chat, and more, Parker said. Free IT resource Raketu, which is based in New York, is trying to carve out a niche in the highly competitive market for Web-based services by offering an integrated Download the Windows communications, online entertainment, and social networking service that can be Server(R) 2008 Beta: Join the global community. used on both desktop PCs and mobile phones.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Handling Unwanted Email What Are the Main Sources of Junk Email?
    Handling unwanted email Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? · Spam Unsolicited, bulk email Often fraudulent ± penis enlargement, lottery scams, close relatives of African presidents, etc. Low response rate => high volume sent · Viruses, Trojan horses Infected machine sends out mails without the owner 's knowledge · Malicious bounces These are called ªcollateral spamº or ªJoe-jobsº Junk mail is sent with forged MAIL FROM Accepted by some intermediate MTA, but later it bounces Bounces go to innocent third party 1 What are the costs? · Important messages can be accidentally discarded The more junk, the higher the risk · Wasted time Deleting junk Setting up and maintaining ®lters Checking discarded mail for false positives · Wasted bandwidth and disk space Especially for users on modems Viruses and spam attachments can be large · Annoyance, offence, even fraud There are no easy answers! 2 Where can you ®lter? · At the end-user hosts ✓ Each client has full control and customization ✓ Distributes the processing cost ✗ Client must still download each message · On the ISP's mail server ✓ Easier for users ✓ Sometimes can be rejected before receiving the body ✓ Saves disk space on the server ✗ Hard to make ¯exible for users to customize The Joe-job problem · Don't accept a message and then bounce it later If its sender is forged, we are creating a Joe-job · Much better to reject at RCPT TO or DATA stages A real MTA sender will create a bounce Spamware will ignore the rejection · For
    [Show full text]
  • Private Placement Memorandum
    Private Placement Memorandum Global Integration Platform for Consumers and Business Telephony PRIVATE PLACEMENT MEMORANDUM TELCENTRIS, INC. (dba Voxox) Up to $6,000,000 A Private Offering of up to 1,714,285 Shares of Common Stock Telcentris, Inc. (“Telcentris” or the “Company”), a Delaware corporation, is hereby privately offering (“the Offering”) up to One Million Seven Hundred Fourteen Thousand Two Hundred Eighty Five (1,714,285) shares (“the Shares”) of its Common Stock at $3.50 per Share to be sold in minimum units of Fifteen Thousand (15,000) Shares (rounded up to the nearest whole share) (individually a “Unit” and collectively the “Units”) to be sold at Fifty Two Thousand Five Hundred Dollars ($52,500) per Unit (the “Minimum Purchase”) to a limited number of accredited investors (the “Subscribers”). In addition, the Company reserves the right to offer and sell up to an additional 342,857 Shares. (See “PLAN OF DISTRIBUTION” and “DESCRIPTION OF SECURITIES.”) Subscribers may purchase less than the minimum at the sole discretion of Telcentris. (See “USE OF PROCEEDS.”) Offers and sales of the Units will be made only to accredited investors who are deemed acceptable to Telcentris. (See “INVESTOR SUITABILITY STANDARDS.”) Price to Selling Proceeds to Investors1 Commissions2 Company3 -------------------------------------------------------------------------------------------------------------------------------------------- Price Per Share: $ 3.50 $ 0.352 $ 3.153 Minimum Purchase (One Unit or 15,000 Shares) $ 52,500.001 $ 5,250.002 $ 47,250.003 Total Maximum Offering (1,714,285 Shares) $ 6,000,000.001 $ 600,000.002 $5,400,000.003 -------------------------------------------------------------------------------------------------------------------------------------------- Telcentris is an innovator in cloud-based unified communications and VoIP solutions for consumer, business and wholesale markets.
    [Show full text]
  • Instant Messaging Market, 2009-2013 Executive Summary
    THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM 1900 EMBARCADERO ROAD, SUITE 206. • PALO ALTO, CA 94303 TEL. 650 322-8059 • FAX 650 322-8061 Instant Messaging Market, 2009-2013 Editor: Sara Radicati, Ph.D; Principal Analyst: Todd Yamasaki SCOPE This study examines the market for Instant Messaging (IM) solutions from 2009 to 2013. It provides extensive data regarding current installed base, broken out by region, business size, and other variables, including four year forecasts. This report also examines IM solution features, business strategies, plus product strengths and weaknesses. All market numbers, such as market size, forecasts, installed base, and any financial information presented in this study represent worldwide figures, unless otherwise indicated. All pricing numbers are expressed in $USD. METHODOLOGY The information and analysis in this report is based on primary research conducted by The Radicati Group, Inc. It consists of information collected from vendors, and users within global corporations via interviews and surveys. Secondary research sources have also been used, where appropriate, to cross-check the information collected. These include company annual reports and market size information from various market segments of the computer industry. EUROPE: 29E FITZJOHNS AVE • LONDON NW3 5JY • TEL. +44 (0)207 794 4298 • FAX. +44 (0)207 431 9375 e-mail: [email protected] http://www.radicati.com Instant Messaging Market, 2009-2013 – Executive Summary EXECUTIVE SUMMARY EXECUTIVE SUMMARY This study looks at the Instant Messaging market as comprising four different market segments: o Public IM networks – This segment includes free IM services which primarily target consumers, but are also prevalent amongst business users.
    [Show full text]
  • Survey of Instant Messaging Applications Encryption Methods
    Avrupa Bilim ve Teknoloji Dergisi European Journal of Science and Technology Cilt. 2, No. 4, S. 112-117, Haziran 2015 Vol. 2, No. 4, pp. 112-117, June 2015 © Telif hakkı EJOSAT’a aittir Copyright © 2014 EJOSAT Araştırma Makalesi www.ejosat.com ISSN:2148-2683 Research Article Survey of Instant Messaging Applications Encryption Methods Abdullah Talha Kabakus1*, Resul Kara2 1 Abant Izzet Baysal University, IT Center, 14280, Bolu, Turkey 2 Duzce University, Faculty of Engineering, Department of Computer Engineering, 81620, Duzce, Turkey (First received 15 February 2015 and in final form 29 May 2015) Abstract Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, and contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented.
    [Show full text]
  • Guess Who's Texting You? Evaluating the Security of Smartphone
    Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Fruhwirt,¨ Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl SBA Research gGmbH Vienna, Austria (1stletterfirstname)(lastname)@sba-research.org Abstract been the subject of an ample amount of past research. The common advantages of the tools we examined lie in In recent months a new generation of mobile messag- very simple and fast setup routines combined with the possi- ing and VoIP applications for smartphones was introduced. bility to incorporate existing on-device address books. Ad- These services offer free calls and text messages to other ditionally these services offer communication free of charge subscribers, providing an Internet-based alternative to the and thus pose a low entry barrier to potential customers. traditional communication methods managed by cellular However, we find that the very design of most of these mes- network carriers such as SMS, MMS and voice calls. While saging systems thwarts their security measures, leading to user numbers are estimated in the millions, very little atten- issues such as the possibility for communication without tion has so far been paid to the security measures (or lack proper sender authentication. thereof) implemented by these providers. The main contribution of our paper is an evaluation of the In this paper we analyze nine popular mobile messaging security of mobile messaging applications with the afore- and VoIP applications and evaluate their security models mentioned properties and the possibilities of abuse in real- with a focus on authentication mechanisms. We find that a world scenarios.
    [Show full text]
  • Case No COMP/M.6281 - MICROSOFT/ SKYPE
    EN Case No COMP/M.6281 - MICROSOFT/ SKYPE Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date: 07/10/2011 In electronic form on the EUR-Lex website under document number 32011M6281 Office for Publications of the European Union L-2985 Luxembourg EUROPEAN COMMISSION Brussels, 07/10/2011 C(2011)7279 In the published version of this decision, some information has been omitted pursuant to Article MERGER PROCEDURE 17(2) of Council Regulation (EC) No 139/2004 concerning non-disclosure of business secrets and other confidential information. The omissions are shown thus […]. Where possible the information omitted has been replaced by ranges of figures or a general description. PUBLIC VERSION To the notifying party: Dear Sir/Madam, Subject: Case No COMP/M.6281 - Microsoft/ Skype Commission decision pursuant to Article 6(1)(b) of Council Regulation No 139/20041 1. On 02.09.2011, the European Commission received notification of a proposed concentration pursuant to Article 4 of the Merger Regulation by which the undertaking Microsoft Corporation, USA (hereinafter "Microsoft"), acquires within the meaning of Article 3(1)(b) of the Merger Regulation control of the whole of the undertaking Skype Global S.a.r.l, Luxembourg (hereinafter "Skype"), by way of purchase of shares2. Microsoft and Skype are designated hereinafter as "parties to the notified operation" or "the parties". I. THE PARTIES 2. Microsoft is active in the design, development and supply of computer software and the supply of related services. The transaction concerns Microsoft's communication services, in particular the services offered under the brands "Windows Live Messenger" (hereinafter "WLM") for consumers and "Lync" for enterprises.
    [Show full text]
  • Eszter Babarczy: Community Based Trust on the Internet
    PTE BTK Nyelvtudományi Doktori Iskola Kommunikáció Doktori Program Babarczy Eszter: Community Based Trust on the Internet Doktori értekezés Témavezető: Horányi Özséb egyetemi tanár 2011. 1 Community-based trust on the internet Tartalom Introduction .................................................................................................................................................. 3 II. A very brief history of the internet ........................................................................................................... 9 Early Days ............................................................................................................................................... 11 Mainstream internet .............................................................................................................................. 12 The internet of social software .............................................................................................................. 15 III Early trust related problems and solutions ............................................................................................ 20 Trading .................................................................................................................................................... 20 Risks of and trust in content ....................................................................................................................... 22 UGC and its discontents: Wikipedia ......................................................................................................
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Glossary Updated – July 2014
    Glossary Updated – July 2014 Ad Blocker - A software utility which can be either a browser add-on or integrated within a browser which prevents advertisements from being displayed or third party content from being served. Examples include Adblock Plus and Noscript. Leading browsers offer limited controls to block third party content including Microsoft Internet Explorer 9 and Mozilla Firefox. Address Specification (also known as: email address spec or addr-spec) - Addresses occur in several message header fields to indicate senders and recipients of messages. An address may either be an individual mailbox, or a group of mailboxes. [RFC 2822] Ad Exchange - Ad exchanges facilitate auction-based, real-time buying and serving of ads. Ad exchanges operate by serving as intermediaries between ad networks, publishers, and advertisers. Ad exchanges provide a sales channel to publishers and ad networks, as well as aggregated inventory to advertisers. Ad exchanges’ business models and practices may include features that are similar to those offered by ad networks. Ad Impression (or impressions) -Total number of times an ad (or malvertisement) is served on one or more sites. A single malvertising creative may be served to multiple users as a result of a single incident with upwards to 100,000 or more impressions, depending on the site(s) the malvertising is served on and the frequency of rotation of the ad on the site(s) and the life of the campaign. Ad Network - An ad network is a company that works with a group of Web sites and sells advertising space on their behalf. Ad networks provide an outsourced sales capability for publishers and a means to aggregate inventory and audiences from numerous sources in a single buying opportunity for media buyers.
    [Show full text]