Curating the Social Graph, Or What Your Friends Say About
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Creating & Connecting: Research and Guidelines on Online Social
CREATING & CONNECTING//Research and Guidelines on Online Social — and Educational — Networking NATIONAL SCHOOL BOARDS ASSOCIATION CONTENTS Creating & Connecting//The Positives . Page 1 Online social networking Creating & Connecting//The Gaps . Page 4 is now so deeply embedded in the lifestyles of tweens and teens that Creating & Connecting//Expectations it rivals television for their atten- and Interests . Page 7 tion, according to a new study Striking a Balance//Guidance and Recommendations from Grunwald Associates LLC for School Board Members . Page 8 conducted in cooperation with the National School Boards Association. Nine- to 17-year-olds report spending almost as much time About the Study using social networking services This study was made possible with generous support and Web sites as they spend from Microsoft, News Corporation and Verizon. watching television. Among teens, The study was comprised of three surveys: an that amounts to about 9 hours a online survey of 1,277 nine- to 17-year-old students, an online survey of 1,039 parents and telephone inter- week on social networking activi- views with 250 school district leaders who make deci- ties, compared to about 10 hours sions on Internet policy. Grunwald Associates LLC, an a week watching TV. independent research and consulting firm that has conducted highly respected surveys on educator and Students are hardly passive family technology use since 1995, formulated and couch potatoes online. Beyond directed the study. Hypothesis Group managed the basic communications, many stu- field research. Tom de Boor and Li Kramer Halpern of dents engage in highly creative Grunwald Associates LLC provided guidance through- out the study and led the analysis. -
Social Networks for Main Street
Ulster County Main Streets: A Regional Approach Ulster County Planning Department, 244 Fair Street, Kingston NY 12401 Why do we take a regional approach to Main Streets? There are many different approaches to supporting these centers in our local economy. The goal of the Ulster County Main Streets approach is to develop a program that is based on our region‘s specific needs and support appropriate responses and strategies that are built and sustained from within our communities. It is also founded upon the idea that communities are stronger when they work together, share knowledge, leverage their resources, and think regionally to support their ―competitive advantage.‖ What is the Main Streets Strategic Toolbox? Any successful planning effort requires solid information as a basis for decision-making. The Toolbox includes resources to help your community create a strong, sustainable strategy for Main Street revitalization. For a full list of topics in the toolbox, please contact our staff at 845-340-3338 or visit our website at www.ulstercountyny.gov/planning. Social Networks for Main Street The web has become more than a warehouse of information. Social networking (or ―Web 2.0‖) is an interactive information-sharing platform that allows internet users add content and interact with others. Businesses are using Web 2.0 to increase customer loyalty and market visibility. This offers tremendous potential for Main Street businesses. Consumers are online. For them, this is ―word of mouth‖ via the web. Some examples: Main Street Webpage: “Come see and shop New Paltz Main Street.” Consumer on Facebook: “Have you been to New Paltz?” Response: “Yeah, great!”“ Twitter Tweet: Just got back from New Paltz. -
Digital Platform As a Double-Edged Sword: How to Interpret Cultural Flows in the Platform Era
International Journal of Communication 11(2017), 3880–3898 1932–8036/20170005 Digital Platform as a Double-Edged Sword: How to Interpret Cultural Flows in the Platform Era DAL YONG JIN Simon Fraser University, Canada This article critically examines the main characteristics of cultural flows in the era of digital platforms. By focusing on the increasing role of digital platforms during the Korean Wave (referring to the rapid growth of local popular culture and its global penetration starting in the late 1990s), it first analyzes whether digital platforms as new outlets for popular culture have changed traditional notions of cultural flows—the forms of the export and import of popular culture mainly from Western countries to non-Western countries. Second, it maps out whether platform-driven cultural flows have resolved existing global imbalances in cultural flows. Third, it analyzes whether digital platforms themselves have intensified disparities between Western and non- Western countries. In other words, it interprets whether digital platforms have deepened asymmetrical power relations between a few Western countries (in particular, the United States) and non-Western countries. Keywords: digital platforms, cultural flows, globalization, social media, asymmetrical power relations Cultural flows have been some of the most significant issues in globalization and media studies since the early 20th century. From television programs to films, and from popular music to video games, cultural flows as a form of the export and import of cultural materials have been increasing. Global fans of popular culture used to enjoy films, television programs, and music by either purchasing DVDs and CDs or watching them on traditional media, including television and on the big screen. -
Twitter, Myspace and Facebook Demystified - by Ted Janusz
Twitter, MySpace and Facebook Demystified - by Ted Janusz Q: I hear people talking about Web sites like Twitter, MySpace and Facebook. What are they? And, even more importantly, should I be using them to promote oral implantology? First, you are not alone. A recent survey showed that 70 percent of American adults did not know enough about Twitter to even have an opinion. Tools like Twitter, Facebook and MySpace are components of something else you may have heard people talking about: Web 2.0 , a popular term for Internet applications in which the users are actively engaged in creating and distributing Web content. Web 1.0 probably consisted of the Web sites you saw back in the late 90s, which were nothing more than fancy electronic brochures. Web 1.5 would have been something like Amazon or eBay, sites on which one could buy, sell and leave reviews. What Web 3.0 will look like is anybody's guess! Let's look specifically at the three applications that you mentioned. Tweet, Tweet Twitter - "Twitter is like text messaging, only you can also do it from the Web," says Dan Tynan, the author of the Tynan on Technology blog. "Instead of sending a message to just one person, you can send it to thousands of people at once. You can choose to follow anyone's update (called "tweets") simply by clicking the Follow button on their profile, or vice-versa. The only rule is that each tweet can be no longer than 140 characters." Former CEO of Twitter Jack Dorsey once accepted an award for Twitter by saying, "We'd like to thank you in 140 characters or less. -
GOOGLE+ PRO TIPS Google+ Allows You to Connect with Your Audience in a Plethora of New Ways
GOOGLE+ PRO TIPS Google+ allows you to connect with your audience in a plethora of new ways. It combines features from some of the more popular platforms into one — supporting GIFs like Tumblr and, before Facebook jumped on board, supporting hashtags like Twitter — but Google+ truly shines with Hangouts and Events. As part of our Google Apps for Education agreement, NYU students can easily opt-in to Google+ using their NYU emails, creating a huge potential audience. KEEP YOUR POSTS TIDY While there isn’t a 140-character limit, keep posts brief, sharp, and to the point. Having more space than Twitter doesn’t mean you should post multiple paragraphs; use Twitter’s character limit as a good rule of thumb for how much your followers are used to consuming at a glance. When we have a lot to say, we create a Tumblr post, then share a link to it on Google+. REMOVE LINKS AFTER LINK PREVIEW Sharing a link on Google+ automatically creates a visually appealing link preview, which means you don’t need to keep the link in your text. There may be times when you don’t want a link preview, in which case you can remove the preview but keep the link. Whichever you prefer, don’t keep both. We keep link previews because they are more interactive than a simple text link. OTHER RESOURCES Google+ Training Video USE HASHTAgs — but be sTRATEGIC BY GROVO Hashtags can put you into already-existing conversations and make your Learn More BY GOOGLE posts easier to find by people following specific tags, such as incoming How Google+ Works freshmen following — or constantly searching — the #NYU tag. -
Analysis of Topological Characteristics of Huge Online Social Networking Services Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Young-Ho Eom, Sue Moon, Hawoong Jeong
1 Analysis of Topological Characteristics of Huge Online Social Networking Services Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Young-Ho Eom, Sue Moon, Hawoong Jeong Abstract— Social networking services are a fast-growing busi- the statistics severely and it is imperative to use large data sets ness in the Internet. However, it is unknown if online relationships in network structure analysis. and their growth patterns are the same as in real-life social It is only very recently that we have seen research results networks. In this paper, we compare the structures of three online social networking services: Cyworld, MySpace, and orkut, from large networks. Novel network structures from human each with more than 10 million users, respectively. We have societies and communication systems have been unveiled; just access to complete data of Cyworld’s ilchon (friend) relationships to name a few are the Internet and WWW [3] and the patents, and analyze its degree distribution, clustering property, degree Autonomous Systems (AS), and affiliation networks [4]. Even correlation, and evolution over time. We also use Cyworld data in the short history of the Internet, SNSs are a fairly new to evaluate the validity of snowball sampling method, which we use to crawl and obtain partial network topologies of MySpace phenomenon and their network structures are not yet studied and orkut. Cyworld, the oldest of the three, demonstrates a carefully. The social networks of SNSs are believed to reflect changing scaling behavior over time in degree distribution. The the real-life social relationships of people more accurately than latest Cyworld data’s degree distribution exhibits a multi-scaling any other online networks. -
Effectiveness of Dismantling Strategies on Moderated Vs. Unmoderated
www.nature.com/scientificreports OPEN Efectiveness of dismantling strategies on moderated vs. unmoderated online social platforms Oriol Artime1*, Valeria d’Andrea1, Riccardo Gallotti1, Pier Luigi Sacco2,3,4 & Manlio De Domenico 1 Online social networks are the perfect test bed to better understand large-scale human behavior in interacting contexts. Although they are broadly used and studied, little is known about how their terms of service and posting rules afect the way users interact and information spreads. Acknowledging the relation between network connectivity and functionality, we compare the robustness of two diferent online social platforms, Twitter and Gab, with respect to banning, or dismantling, strategies based on the recursive censor of users characterized by social prominence (degree) or intensity of infammatory content (sentiment). We fnd that the moderated (Twitter) vs. unmoderated (Gab) character of the network is not a discriminating factor for intervention efectiveness. We fnd, however, that more complex strategies based upon the combination of topological and content features may be efective for network dismantling. Our results provide useful indications to design better strategies for countervailing the production and dissemination of anti- social content in online social platforms. Online social networks provide a rich laboratory for the analysis of large-scale social interaction and of their social efects1–4. Tey facilitate the inclusive engagement of new actors by removing most barriers to participate in content-sharing platforms characteristic of the pre-digital era5. For this reason, they can be regarded as a social arena for public debate and opinion formation, with potentially positive efects on individual and collective empowerment6. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
The Impact of Data Access Regimes on Artificial Intelligence and Machine Learning
A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Martens, Bertin Working Paper The impact of data access regimes on artificial intelligence and machine learning JRC Digital Economy Working Paper, No. 2018-09 Provided in Cooperation with: Joint Research Centre (JRC), European Commission Suggested Citation: Martens, Bertin (2018) : The impact of data access regimes on artificial intelligence and machine learning, JRC Digital Economy Working Paper, No. 2018-09, European Commission, Joint Research Centre (JRC), Seville This Version is available at: http://hdl.handle.net/10419/202237 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu JRC Digital Economy Working Paper 2018-09 The impact of data access regimes on artificial intelligence and machine learning Bertin Martens December 2018 This publication is a Working Paper by the Joint Research Centre, the European Commission’s in-house science service. -
A Survey of Adversarial Learning on Graph
A Survey of Adversarial Learning on Graph LIANG CHEN, Sun Yat-sen University of China JINTANG LI, Sun Yat-sen University of China JIAYING PENG, Sun Yat-sen University of China TAO XIE, Sun Yat-sen University of China ZENGXU CAO, Hangzhou Dianzi University of China KUN XU, Sun Yat-sen University of China XIANGNAN HE, University of Science and Technology of China ZIBIN ZHENG∗, Sun Yat-sen University of China Deep learning models on graphs have achieved remarkable performance in various graph analysis tasks, e.g., node classication, link prediction and graph clustering. However, they expose uncertainty and unreliability against the well-designed inputs, i.e., adversarial examples. Accordingly, a line of studies have emerged for both aack and defense addressed in dierent graph analysis tasks, leading to the arms race in graph adversarial learning. Despite the booming works, there still lacks a unied problem denition and a comprehensive review. To bridge this gap, we investigate and summarize the existing works on graph adversarial learning tasks systemically. Specically, we survey and unify the existing works w.r.t. aack and defense in graph analysis tasks, and give appropriate denitions and taxonomies at the same time. Besides, we emphasize the importance of related evaluation metrics, investigate and summarize them comprehensively. Hopefully, our works can provide a comprehensive overview and oer insights for the relevant researchers. More details of our works are available at hps://github.com/gitgiter/Graph-Adversarial-Learning. CCS Concepts: •Computing methodologies ! Semi-supervised learning settings; Neural networks; •Security and privacy ! So ware and application security; •Networks ! Network reliability; Additional Key Words and Phrases: adversarial learning, graph neural networks, adversarial aack and defense, adversarial examples, network robustness ACM Reference format: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, and Zibin Zheng. -
Public Displays of Connection
Public displays of connection J Donath and d boyd Participants in social network sites create self-descriptive profiles that include their links to other members, creating a visible network of connections — the ostensible purpose of these sites is to use this network to make friends, dates, and business connections. In this paper we explore the social implications of the public display of one’s social network. Why do people display their social connections in everyday life, and why do they do so in these networking sites? What do people learn about another’s identity through the signal of network display? How does this display facilitate connections, and how does it change the costs and benefits of making and brokering such connections compared to traditional means? The paper includes several design recommendations for future networking sites. 1. Introduction Since then, use of the Internet has greatly expanded and today ‘Orkut [1] is an on-line community that connects people it is much more likely that one’s friends and the people one through a network of trusted friends’ would like to befriend are present in cyberspace. People are accustomed to thinking of the on-line world as a social space. Today, networking sites are suddenly extremely popular. ‘Find the people you need through the people you trust’ — LinkedIn [2]. Social networks — our connections with other people — have many important functions. They are sources of emotional and ‘Access people you want to reach through people you financial support, and of information about jobs, other people, know and trust. Spoke Network helps you cultivate a and the world at large. -
Data Portability and Privacy
SEPTEMBER 2019 CHARTING A WAY FORWARD Data Portability and Privacy Erin Egan VICE PRESIDENT AND CHIEF PRIVACY OFFICER, POLICY CHARTING A WAY FORWARD 1 Table of Contents 03 I. Intro 06 II. The Challenge 09 III. Five Questions About Portability and Responsibility 09 QUESTION 1 What is “data portability”? 13 QUESTION 2 Which data should be portable? 14 QUESTION 3 Whose data should be portable? 15 QUESTION 4 How should we protect privacy while enabling portability? 20 QUESTION 5 After people’s data is transferred, who is responsible if the data is misused or otherwise improperly protected? 24 IV. What’s Next? 25 End Notes CHARTING A WAY FORWARD 2 Data Portability and Privacy 01 There’s growing agreement among policymakers around the world that data portability—the principle that you should be able to take the data you share with one service and move it to another—can help promote competition online and encourage the emergence of new services. Competition and data protection experts agree that, although there are complicated issues involved, portability helps people control their data and can make it easier for them to choose among online service providers. The benefits of data portability to people and markets are clear, which is why our CEO, Mark Zuckerberg, recently called for laws that guarantee portability.1 But to build portability tools people can trust and use effectively, we should develop clear rules about what kinds of data should be portable and who is responsible for protecting that data as it moves to different providers.2 The purpose of this paper is to advance the conversation about what those rules should be.