OCLC Acquires Ezproxy

Total Page:16

File Type:pdf, Size:1020Kb

OCLC Acquires Ezproxy Smart Libraries Newsletter American Library Association NON PROFIT 50 East Huron Street US POSTAGE Chicago, IL 60611-2795 USA PAID PERMIT 3020 A LA TechSource BIRMINGHAM, AL www.techsource.ala.org March 2008 OCLC Acquires EZproxy Smart Libraries Newsletter Smart Libraries Newsletter delivers hard data and innovative insights about the world of library technology, every month. Contributing Editor Marshall Breeding TO SUBSCRIBE 615-343-6094 [email protected] To reserve your subscription, contact the Customer Service Center at 800-545-2433, press 5 for assistance, or visit www.techsource.ala.org. Interim Editor Tom Peters The 2008 subscription price is just $85 US. 816-228-6406 [email protected] Production and design by Kimberly Saar Richardson, Administrative Assistant American Library Association Production Services. Judy Foley Smart Libraries Newsletter is published monthly by ALA TechSource, 800-545-2433, ext. 4272 a unit of the publishing division of the American Library Association. 312-280-4272 [email protected] Copyright American Library Association 2008. All rights reserved. Newsletter TM A LA TechSource www.techsource.ala.org Formerly Library Systems Newsletter™ 50 East Huron Street, Chicago, Illinois 60611-2795, USA OCLC Acquires EZproxy In a move that continues its ongoing drive to accumulate a broad set of library IN THIS ISSUE automation components, OCLC has acquired EZproxy from Useful Utilities, a one-person company based in Peoria, Arizona, a suburb of Phoenix. The acquisi- tion of this product gives OCLC control of an important piece of the infrastruc- OCLC Acquires EZproxy ture that connects individual libraries to the content and services on the Web. PAGE 1 This issue of Smart Libraries Newsletter describes what the EZproxy software NewGenLib: An Open Source ILS for Libraries does and why it is important, provides some information on the business acquisi- in the Developing World tion, and offers some background and perspective. PAGE 3 So, You Want to Use RFID in Your Library PAGE 4 March 2008 XXVIII Volume Number 3 An Essential Tool to Access Electronic Content Proxy servers like EZproxy facilitate access to Web-based information. A typical Innovative SUSHI a la ARL PAGE 5 academic library spends a significant portion of its collections budget on subscrip- tions to electronic content with the intent to provide access to that content to its Live Online Homework Help from Tutorvista.com users. Libraries generally need to enable access to their patrons not only when in PAGE 6 the library but also from off-site locations. EZproxy was developed specifically to Something Wikia This Way Comes help libraries deliver access to subscribed electronic content to off-site patrons. PAGE 7 EZproxy was developed specifically to help libraries deliver access to subscribed electronic content to off-site patrons. When a publisher licenses its content to a library, it needs some mechanism ISSN 1541-8820 to ensure that only the users of its subscribers gain access to the product and not the general public. Most publishers rely on IP address to regulate access, requiring that a library provide a list of the IP address ranges used within the organization it serves. This provides a convenient mechanism for on-campus or in-library access, but fails to accommodate off-site users. In order to serve off-site users, various types of proxy servers can function as an intermediary between a user and a remote service, effectively delivering to them a library IP address so that they can use these restricted resources. The key challenge lies in implementing a secure authentication system that ensures that access continues to be restricted to individuals associated with Receive Smart Libraries via e-mail the organization with the minimum of inconvenience for library users. Subscribers that would like an e-mailed ver- sion of the newsletter each month should for- Authentication ward one e-mail address and all of the mailing label information printed on page 8 of the A crucial component of EZproxy involves authentication—the ability to deter- newsletter to [email protected]. Type “e-mail my mine whether an individual is associated with the institution and has the right Smart Libraries” into the subject line. In addi- to access a given resource. Providing access to on-site users can easily be accom- tion to your monthly printed newsletter, you plished by virtue of their IP address of their computer. The library must use some will receive an electronic copy via e-mail (to one address per paid subscription) at no extra1 Continued on next page charge each month. A LA TechSource www.techsource.ala.org alternate authentication mechanism to Integrating EZproxy into Integration with eLearning allow access to off-site patrons. Most academic institutions maintain Library Content Delivery Environments some type of authentication service for In order to make access seamless to its True to the academic library orienta- its user community. Practically all col- users, the library can implement a few tion of EZproxy, work has been done to leges and universities offer an authen- simple changes to integrate EZproxy into use the utility to help integrate library tication service as part of the campus the various systems it uses to point its resources into the Blackboard course network to support access to course- users to its electronic resources. To invoke management system. A Blackboard ware or virtual learning environments, EZproxy, the library will reformulate the building block integrates authentication e-mail systems, and the like. Such an URL for each of its resources to one that mechanisms providing access to library authentication service might be imple- routes access through the proxy server. resources listed in a course without the mented using protocols such as LDAP The links provided through the library’s need for the dual logins that would oth- (Lightweight Directory Access Protocol), online catalog through the 856 field in erwise be needed. CAS (Central Authentication Service), the MARC record as well as any menus, RADIUS (Remote Authentication Dial- link resolvers, finding aids, or other Web EZproxy Background in User Service), Kerberos, or Athens. pages used to provide access to restricted Many campuses are working toward sin- content will prepend the EZproxy URL to EZproxy was created by Chris Zagar, gle sign-on environments where all the the resource’s native location. For exam- a librarian employed by the Maricopa network services available to the com- ple to access the resource located at http:// Community College system in Arizona. munity work through a single centralized tvnews.vanderbilt.edu, all access points The software was initially released in authentication service. Academic libraries would be adjusted to use http://proxy. 1999 and by the time that it was acquired increasingly rely on campus-wide authen- library.vanderbilt.edu/login?url=http:// by OCLC had been purchased by over tication services rather than maintaining tvnews.vanderbilt.edu. With this version 2,400 libraries spanning sixty countries. their own independent service. of the URLs in place, as long as users go While academic libraries comprise the Public libraries, however, usually through the library’s Web site, they will majority of its users, it has also been don’t have the luxury of authentica- be able to access its resources from any sold to many public and special librar- tion services provided by their higher- location. EZproxy will detect whether ies. Zagar maintained a tight focus on the level organization and tend to rely on they are off site and perform authentica- company, developing and supporting a their integrated library system’s patron tion as needed. In most cases prepending single product. This focus has resulted in database as the authority for identifying the EZproxy component of the URL can be a reputation for highly reliable software valid remote users. A key component of accomplished programmatically without with stellar support. The product has the ILS involves a database of registered the need to change each one individually. become the de facto proxy server used in library patrons, which is used for in-per- academic libraries. son circulation transactions as well as Useful Use Statistics The cost of EZproxy has held steady Web-based self-service features. Many of at $495 since its initial release. At this the ILS products provide an API (appli- Given the large financial investments that price, EZproxy ranks as an extremely cation programming interface) to allow libraries make in their collections of sub- inexpensive, but essential, infrastructure it to function as an authentication service scribed content, it is essential to measure component for libraries. Unlike most for other applications. the level of use each product receives. other software products, Useful Utilities EZproxy was specifically designed Content publishers routinely provide offers perpetual free maintenance once for libraries and can take advantage of libraries with usage statistics. EZproxy an institution purchases the product, the authentication services available to also gives the library an additional means which includes the access to new releases both academic and public libraries. In to monitor use counts through its logs. of the software and technical support. addition to the major protocols used Libraries can use standard Web server Sales of EZproxy have generated reve- on campus networks, it can authenti- log analysis tools to create reports that nue of just over $1 million since its ini- cate against library automation systems show the use of each product as mediated tial release. including Millennium from Innovative by the proxy server. These reports can EZproxy is not open source software. Interfaces, Web2 and HIP from Sirsi- be especially helpful in helping libraries Useful Utilities developed EZproxy using Dynix, as well as the SIP protocol (Ses- measure the levels of use by patrons from the traditional closed source licensing sion Initiation Protocol) supported by all off-campus locations versus those in the model, but with extremely liberal terms the major ILS products.
Recommended publications
  • Building a Scalable Index and a Web Search Engine for Music on the Internet Using Open Source Software
    Department of Information Science and Technology Building a Scalable Index and a Web Search Engine for Music on the Internet using Open Source software André Parreira Ricardo Thesis submitted in partial fulfillment of the requirements for the degree of Master in Computer Science and Business Management Advisor: Professor Carlos Serrão, Assistant Professor, ISCTE-IUL September, 2010 Acknowledgments I should say that I feel grateful for doing a thesis linked to music, an art which I love and esteem so much. Therefore, I would like to take a moment to thank all the persons who made my accomplishment possible and hence this is also part of their deed too. To my family, first for having instigated in me the curiosity to read, to know, to think and go further. And secondly for allowing me to continue my studies, providing the environment and the financial means to make it possible. To my classmate André Guerreiro, I would like to thank the invaluable brainstorming, the patience and the help through our college years. To my friend Isabel Silva, who gave me a precious help in the final revision of this document. Everyone in ADETTI-IUL for the time and the attention they gave me. Especially the people over Caixa Mágica, because I truly value the expertise transmitted, which was useful to my thesis and I am sure will also help me during my professional course. To my teacher and MSc. advisor, Professor Carlos Serrão, for embracing my will to master in this area and for being always available to help me when I needed some advice.
    [Show full text]
  • Wikia Search: La Transparencia Es Un Arma Cargada De Futuro Por Fabrizio Ferraro
    Wikia search: la transparencia es un arma Cargada de futuro Por Fabrizio Ferraro Lo que hace de Wikia Search un proyecto potencialmente innovador no es ni la intervención del Claves factor humano ni la calidad de los resultados de las búsquedas. Su posible ventaja competitiva es la transparencia, que podría convertirlo en el buscador más 1 Wikia Search se basa en el concepto del wiki, un término fiable en cuanto a la neutralidad de sus resultados. que designa a las sedes web que se nutren de los Sin embargo, Wikia Search no ha empezado con buen pie. contenidos que aportan los propios usuarios. El ejemplo “Una de las mayores decepciones que he tenido la de wiki más célebre es desgracia de tener que comentar”, se afirma en la crítica Wikipedia, que Nielsen situaba en noveno lugar en el del influyente blog de tecnología TechCrunch. La mayoría ranking de sedes más de artículos de la prensa y de los blogs reflejan visitadas por los internautas sentimientos parecidos. Es una reacción chocante por estadounidenses a finales de 2007. cuanto han sido estos mismos medios los que han creado más expectativas sobre el nuevo motor de búsqueda “social” llamado a disputarle el trono a Google. El buscador de Wikia 2 Search utiliza tecnología de Las críticas se han ensañado especialmente con los código abierto que, paupérrimos resultados que arroja el nuevo motor de contrariamente a la que utilizan sus rivales, permite a búsqueda en comparación con los que ofrece Google. los propios usuarios aportar Tampoco ha gustado que la tan cacareada intervención mejoras a los algoritmos que humana en la ordenación de los resultados no esté ordenan los resultados del buscador.
    [Show full text]
  • I. Hidden Features of the Major Search Engines
    “When librarians rule the world: the skills and tools we need to thrive in a Web 2.0 world” Presentation by Mary Ellen Bates , www.BatesInfo.com , held on 29 th February 2008, Zentral- und Landesbibliothek Berlin Compiled by Anke Bruns¹ and Susanne Schaper² ¹MPDL, Munich / GWDG, Göttingen, [email protected] ²MPI for terrestrial Microbiology, Marburg, [email protected] As Mary Ellen Bates’ presentation was only available on paper and not on the web, we have put together much of her information in this report, using her own structure and headings. The URLs mentioned were functional on 7 April 2008. Content: “When librarians rule the world: the skills and tools we need to thrive in a Web 2.0 world”................................................................................................................................. 1 I. Hidden features of the major search engines........................................................................ 1 A. Google's secrets ............................................................................................................ 1 B. Yahoo's secrets ............................................................................................................. 2 C. Live.com's Secrets ........................................................................................................ 3 II. Specialized and lesser-known search engines................................................................... 4 III. Creating your own search engine.....................................................................................
    [Show full text]
  • Search Engines and Power: a Politics of Online (Mis-) Information
    5/2/2020 Search Engines and Power: A Politics of Online (Mis-) Information Webology, Volume 5, Number 2, June, 2008 Table of Titles & Subject Authors Home Contents Index Index Search Engines and Power: A Politics of Online (Mis-) Information Elad Segev Research Institute for Law, Politics and Justice, Keele University, UK Email: e.segev (at) keele.ac.uk Received March 18, 2008; Accepted June 25, 2008 Abstract Media and communications have always been employed by dominant actors and played a crucial role in framing our knowledge and constructing certain orders. This paper examines the politics of search engines, suggesting that they increasingly become "authoritative" and popular information agents used by individuals, groups and governments to attain their position and shape the information order. Following the short evolution of search engines from small companies to global media corporations that commodify online information and control advertising spaces, this study brings attention to some of their important political, social, cultural and economic implications. This is indicated through their expanding operation and control over private and public informational spaces as well as through the structural bias of the information they attempt to organize. In particular, it is indicated that search engines are highly biased toward commercial and popular US- based content, supporting US-centric priorities and agendas. Consequently, it is suggested that together with their important role in "organizing the world's information" search engines
    [Show full text]
  • The Commodification of Search
    San Jose State University SJSU ScholarWorks Master's Theses Master's Theses and Graduate Research 2008 The commodification of search Hsiao-Yin Chen San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_theses Recommended Citation Chen, Hsiao-Yin, "The commodification of search" (2008). Master's Theses. 3593. DOI: https://doi.org/10.31979/etd.wnaq-h6sz https://scholarworks.sjsu.edu/etd_theses/3593 This Thesis is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Theses by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. THE COMMODIFICATION OF SEARCH A Thesis Presented to The School of Journalism and Mass Communications San Jose State University In Partial Fulfillment of the Requirement for the Degree Master of Science by Hsiao-Yin Chen December 2008 UMI Number: 1463396 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. ® UMI UMI Microform 1463396 Copyright 2009 by ProQuest LLC. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 E.
    [Show full text]
  • I. Hidden Features of the Major Search Engines
    “When librarians rule the world: the skills and tools we need to thrive in a Web 2.0 world” Presentation by Mary Ellen Bates, Bates Information Services , www.BatesInfo.com , held on 29 th February 2008, Zentral- und Landesbibliothek Berlin Compiled by Anke Bruns¹ and Susanne Schaper² ¹MPDL, Munich / GWDG, Göttingen, [email protected] ²MPI for terrestrial Microbiology, Marburg, [email protected] As Mary Ellen Bates’ presentation was only available on paper and not on the web, we have put together much of her information in this report, using her own structure and headings. The URLs mentioned were functional on 7 April 2008. Content: “When librarians rule the world: the skills and tools we need to thrive in a Web 2.0 world”................................................................................................................................. 1 I. Hidden features of the major search engines........................................................................ 1 A. Google's secrets ............................................................................................................ 1 B. Yahoo's secrets ............................................................................................................. 2 C. Live.com's Secrets ........................................................................................................ 3 II. Specialized and lesser-known search engines................................................................... 4 III. Creating your own search engine.....................................................................................
    [Show full text]
  • Linguistic and Cultural Diversity in Cyberspace
    Ministry of Culture of the Russian Federation Federal Agency for Press and Mass Communications of the Russian Federation Government of the Republic of Sakha (Yakutia) Commission of the Russian Federation for UNESCO Russian Committee of the UNESCO Information for All Programme Ammosov North-Eastern Federal University Interregional Library Cooperation Centre Linguistic and Cultural Diversity in Cyberspace Proceedings of the 3nd International Conference (Yakutsk, Russian Federation, 30 June – 3 July 2014) Moscow 2015 Financial support for this publication is provided by the Government of the Republic of Sakha (Yakutia) and the Government of Khanty-Mansiysk Autonomous Okrug-Ugra Compilers: Evgeny Kuzmin, Anastasia Parshakova, Daria Ignatova Translators: Tatiana Butkova and Elena Malyavskaya English text edited by Anastasia Parshakova Editorial board: Evgeny Kuzmin, Sergey Bakeykin, Tatiana Murovana, Anastasia Parshakova, Nadezhda Zaikova Linguistic and Cultural Diversity in Cyberspace. Proceedings of the 3rd International Conference (Yakutsk, Russian Federation, 30 June – 3 July, 2014). – Moscow: Interregional Library Cooperation Centre, 2015. – 408 p. The book includes communications by the participants of the 3rd International Conference on Linguistic and Cultural Diversity in Cyberspace (Yakutsk, Russian Federation, 30 June – 3 July, 2014), where various aspects of topical political, philosophical and technological challenges of preserving multilingualism in the world and developing it in cyberspace were discussed. The authors share national vision and experience of supporting and promoting linguistic and cultural diversity, express their views on the role of education and ICTs in these processes. The authors are responsible for the choice and presentation of facts and for the opinions expressed, which are not necessarily those of the compilers. ISBN 978-5-91515-063-0 © Interregional Library Cooperation Centre, 2015 2 Contents Preface ...............................................................................................................................
    [Show full text]
  • Super Searching Seminar: How to Get More out of Web Research
    Super Searching Seminar: How to get more out of web research Sponsored by: NOLUG 14 April 2008 Mary Ellen Bates Bates Information Services Colorado, USA BatesInfo.com Super Searching Seminar: How to get more out of web research NOLUG Seminar Mary Ellen Bates 14 April 2008 What we'll cover • Using the New Web for Research • Advanced and Hidden Features of the Big Three Search Engines • Building and Using Customised Search Engines www.BatesInfo.com 2 Using the New Web for Research www.BatesInfo.com 3 1 WikiIndex.com • Index of largest wikis • Designed as a wiki • Scroll down to the bottom of the page and use the hierarchical directory • About 3,800 wikis www.BatesInfo.com 4 Wikia.com • Developed by Jimmy Wales' group • Start at www.wikia.com/wiki/Category: Wikia_categories and drill down www.BatesInfo.com 5 Wikia.com • See also the new open source Wikia search engine o alpha.search.wikia.com o "We are aware that the quality of the search results is low.." www.BatesInfo.com 6 2 Technorati • Comprehensive blog search engine • Can search for o blogs about X o blog posts tagged with X o blog posts that mention X o videos tagged with X www.BatesInfo.com 7 Technorati • Results page shows "mentions per day" • Filter by "authority"! www.BatesInfo.com 8 Technorati • Blog Directory of "claimed" blogs o technorati.com/blogs • Use technorati.com/search for advanced search • Use to analyse not only the "buzz" but what kind of buzz www.BatesInfo.com 9 3 Google Blog Search • Searches anything with a feed • Indexes only feed content • Use the advanced
    [Show full text]
  • Search Is Power
    CHAPTER 4 NEEDLES IN THE HAYSTACK 145 dominant advertising engine. Among the items and services for which Google will not accept advertisements are fake designer goods, child pornography (some adult material is permitted in the U.S., but not if the models might be underage), term paper writing services, illegal drugs and some legal herbal substances, drug paraphernalia, fireworks, online gambling, miracle cures, political attack ads (although political advertising is allowed in general), prostitution, traffic radar jammers, guns, and brass knuckles. The list paints a striking portrait of what Joe and Mary Ordinary want to see, should see, or will tolerate seeing—and perhaps also how Google prudentially restrains the use of its powerfully liberating product for illegal activities. Search Is Power At every step of the search process, individuals and institutions are working hard to control what we see and what we find—not to do us ill, but to help us. Helpful as search engines are, they don’t have panels of neutral experts deciding what is true or false, or what is important or irrelevant. Instead, there are powerful economic and social motivations to present information that is to our liking. And because the inner workings of the search engines are not visible, those controlling what we see are themselves subject to few controls. Algorithmic Does Not Mean Unbiased Because search engines compute relevance and ranking, because they are +algorithmic” in their choices, we often assume that they, unlike human researchers, are immune to bias. But bias can be coded into a computer pro- gram, introduced by small changes in the weights of the various factors that go into the ranking recipe or the spidering selection algorithm.
    [Show full text]
  • Final Diss Manuscript
    HACKERS, CYBORGS, AND WIKIPEDIANS: THE POLITICAL ECONOMY AND CULTURAL HISTORY OF WIKIPEDIA Andrew Famiglietti A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2011 Committee: Victoria Smith Ekstrand, Advisor Nancy C. Patterson Graduate Faculty Representative Radhika Gajjala Donald McQuarie David Parry i ABSTRACT Victoria Smith Ekstrand, Advisor This dissertation explores the political economy and cultural history of Wikipedia, the free encyclopedia. It demonstrates how Wikipedia, an influential and popular site of knowledge production and distribution, was influenced by its heritage from the hacker communities of the late twentieth century. More specifically, Wikipedia was shaped by an ideal I call, “the cyborg individual,” which held that the production of knowledge was best entrusted to a widely distributed network of individual human subjects and individually owned computers. I trace how this ideal emerged from hacker culture in response to anxieties hackers experienced due to their intimate relationships with machines. I go on to demonstrate how this ideal influenced how Wikipedia was understood both those involved in the early history of the site, and those writing about it. In particular, legal scholar Yochai Benkler seems to base his understanding of Wikipedia and its strengths on the cyborg individual ideal. Having established this, I then move on to show how the cyborg individual ideal misunderstands Wikipedia’s actual method of production. Most importantly, it overlooks the importance of how the boundaries drawn around communities and shared technological resources shape Wikipedia’s content. I then proceed to begin the process of building what I believe is a better way of understanding Wikipedia, by tracing how communities and shared resources shape the production of recent Wikipedia articles.
    [Show full text]
  • Information Seeking Support Systems an Invitational Workshop Sponsored by the National Science Foundation
    Information Seeking Support Systems An invitational workshop sponsored by the National Science Foundation June 26-27, 2008 Chapel Hill, NC USA http://ils.unc.edu/ISSS/ Organizers: Gary Marchionini, UNC-Chapel Hill, USA Co-Chair Ryen White, Microsoft, USA Co-Chair Nick Belkin, Rutgers University, USA Gene Golovchinsky, FxPAL, USA Diane Kelly, UNC-Chapel Hill, USA Peter Pirolli, Xerox PARC, USA mc schraefel, U. Southhampton, UK Report: May 2009 NSF Workshop on Information Seeking Support Systems 1 http://ils.unc.edu/ISSS/ NSF Workshop Report on Information Seeking Support Systems Participants James Allan, Univ. of Massachusetts Bill Kules, Catholic Univ. of America Peter Anick, Yahoo Michael Levi, U.S. Bureau of Labor Statistics Anne Aula, Google Gary Marchionini, UNC Nick Belkin, Rutgers Univ. David Millen, IBM Peter Brusilovsky, Univ. of Pittsburgh Jan Pedersen, Yahoo Robert Capra, UNC Peter Pirolli, PARC Ed Chi, PARC Edie Rasmussen, Univ. of British Columbia Susan Dumais, Microsoft Dan Rose, A9 Efthimis Efthimiadis, Univ. of Washington Dan Russell, Google Gary Geisler, Univ. of Texas m.c. Schraefel, Univ. of Southampton Gene Golovchinsky, FxPAL Ben Shneiderman, Univ. of Maryland Steve Griffin, NSF Elaine Toms, Dalhousie Brad Hemminger, UNC Daniel Tunkelang, Endeca Diane Kelly, UNC Ryen White, Microsoft Acknowledgements This workshop was supported by a grant from the National Science Foundation (#115-0836616) The workshop organizers greatly appreciate… Maria Zemankova, our National Science Foundation Program Manager, and Steve Griffin who participated in the workshop Rachael Clemens, for administering and coordinating logistics the workshop The School of Information and Library Science and UNC Chapel Hill for hosting the workshop and providing meeting rooms.
    [Show full text]
  • Mass Collaboration Systems on the World-Wide Web
    Mass Collaboration Systems on the World-Wide Web AnHai Doan1, Raghu Ramakrishnan2, Alon Y. Halevy3 1University of Wisconsin, 2Yahoo! Research, 3Google Inc. The Age-Old Practice of Mass Collaboration is Transforming the Web and Giving Rise to a New Field Mass collaboration systems enlist a multitude of hu- cludes for example the ESP game [33], where users im- mans to help solve a wide variety of problems. Over the plicitly collaborate to label images as a side effect while past decade, numerous such systems have appeared on playing the game. ESP clearly benefits from a mass the World-Wide Web. Prime examples include Wikipedia, of users. More importantly, it faces the same human- Linux, Yahoo! Answers, Amazon’s Mechanical Turk, centric challenges of Wikipedia and Linux, such as how and much effort is being directed at developing many to recruit and evaluate users, and to combine their con- more. tributions. Given this, it seems unsatisfactory to con- As is typical for an emerging area, this effort has ap- sider only explicit collaborations; we ought to allow im- peared under many names, including peer production, plicit ones as well. user-powered systems, user-generated content, collabo- The definition also excludes, for example, an Ama- rative systems, community systems, social systems, so- zon’s Mechanical Turk-based system that enlists users cial search, social media, collective intelligence, wiki- to find a missing boat in thousands of satellite im- nomics, crowd wisdom, smart mobs, crowd-sourcing, ages [20]. Here, users do not build any artifact, ar- and human computation. The topic has been discussed guably nothing is long lasting, and no community ex- extensively in books, popular press, and academia (e.g., ists either (just users coming together for this particular [31, 32, 25, 2, 36, 17, 3, 7]).
    [Show full text]