Semantic Web-Based Social Network Access Control

Total Page:16

File Type:pdf, Size:1020Kb

Semantic Web-Based Social Network Access Control computers & security 30 (2011) 108e115 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Semantic web-based social network access control Barbara Carminati a, Elena Ferrari a, Raymond Heatherly b,*, Murat Kantarcioglu b, Bhavani Thuraisingham b a The University of Insubria, Via Mazzini, 5 Varese, Italy b The University of Texas at Dallas, Computer Science, 800 W. Campbell Road, Richardson, Texas 75080, USA article info abstract Article history: The existence of online social networks that include person specific information creates Received 11 April 2010 interesting opportunities for various applications ranging from marketing to community Received in revised form organization. On the other hand, security and privacy concerns need to be addressed for 16 August 2010 creating such applications. Improving social network access control systems appears as Accepted 27 August 2010 the first step toward addressing the existing security and privacy concerns related to online social networks. To address some of the current limitations, we have created an experi- Keywords: mental social network using synthetic data which we then use to test the efficacy of the Social network semantic reasoning based approaches we have previously suggested. Access control ª 2010 Elsevier Ltd. All rights reserved. Semantic inference Experimentation Implementation 1. Introduction able to decide which personal information are accessible by other members by marking a given item as public, private, or On-line Social Networks (OSNs) are platforms that allow accessible by their direct contacts. In order to give more flex- people to publish details about themselves and to connect to ibility, some online social networks enforce variants of these other members of the network through links. Recently, the settings, but the principle is the same. For instance, besides popularity of OSNs is increasing significantly. For example, the basic settings, Bebo (http://bebo.com), Facebook (http:// Facebook now claims to have more than a hundred million facebook.com), and Multiply (http://multiply.com) support active users.1 The existence of OSNs that include person- the option “selected friends”; Last.fm (http://last.fm) the specific information creates both interesting opportunities option “neighbors” (i.e., the set of users having musical pref- and challenges. For example, social network data could be erences and tastes similar to mine); Facebook, Friendster used for marketing products to the right customers. At the (http://friendster.com), and Orkut (http://www.orkut.com) the same time, security and privacy concerns can prevent such option “friends of friends”; Xing (http://xing.com) the options efforts in practice (Berteau, 2007). Improving the OSN access “contacts of my contacts” (2nd degree contacts), and “3rd” and control systems appears as the first step toward addressing “4th degree contacts”. It is important to note that all these the existing security and privacy concerns related to online approaches have the advantage of being easy to be imple- social networks. However, most of current OSNs implement mented, but they lack flexibility. In fact, the available protec- very basic access control systems, by simply making a user tion settings do not allow users to easily specify their access * Corresponding author. E-mail addresses: [email protected] (B. Carminati), [email protected] (E. Ferrari), [email protected] (R. Heatherly), [email protected] (M. Kantarcioglu), [email protected] (B. Thuraisingham). 1 http://www.facebook.com/press/info.php?Fstatistics. 0167-4048/$ e see front matter ª 2010 Elsevier Ltd. All rights reserved. doi:10.1016/j.cose.2010.08.003 computers & security 30 (2011) 108e115 109 control requirements, in that they are either too restrictive or 7 we discuss and provide the results of experiments using our too loose. Furthermore, existing solutions are platform- implementation of semantic web-based access control for specific and they are hard to be implemented for various social networks. Finally, we conclude the paper in Section 8. different online social networks. To address some of these limitations, we propose an extensible, fine-grained OSN access control model based on 2. Related work semantic web technologies. Our main idea is to encode social network-related information by means of an ontology. In Past research on OSN security has mainly focused on privacy- particular, we suggest to model the following five important preserving techniques to allow statistical analysis on social aspects of OSNs using semantic web ontologies: (1) user’s network data without compromising OSN members’ privacy profiles, (2) relationships among users (e.g., Bob is Alice’s close (see Carminati et al. (2008) for a survey on this topic). In friend), (3) resources (e.g., online photo albums), (4) relation- contrast, access control for OSNs is a relatively new research ships between users and resources (e.g., Bob is the owner of area. As far as we are aware, the only other proposals of an the photo album), (5) actions (e.g., post a message on some- access control mechanism for online social networks are one’s wall). By constructing such an ontology, we model the works by Kruk et al. (2006), Ali et al. (2007) and Carminati et al. Social Network Knowledge Base (SNKB). The main advantage (2008). The D-FOAF system (Kruk et al., 2006) is primarily for using an ontology for modeling OSN data is that relation- a Friend of a Friend (FOAF) ontology-based distributed identity ships among many different social network concepts can be management system for social networks, where access rights naturally represented using OWL. Furthermore, by using and trust delegation management are provided as additional reasoning, many inferences about such relationships could be services. In D-FOAF, relationships are associated with a trust done automatically. Our access control enforcement mecha- level, which denotes the level of friendship existing between nism is then implemented by exploiting this knowledge. In the users participating in a given relationship. Although the particular, the idea is to define security policies as rules (see work by Kruk et al. (2006) discusses only generic relationships, Section 3), whose antecedents state conditions on SNKB, and corresponding to the ones modeled by the foaf:knows RDF consequents specify the authorized actions. In particular, we property in the FOAF vocabulary (Brickley and Miller, 2007), propose to encode the authorizations implied by security another D-FOAF-related paper (Choi et al., 2006) considers also policies by means of an ontology, obtaining the Security the case of multiple relationship types. As far as access rights Authorization Knowledge Base (SAKB). Thus, security policies are concerned, they denote authorized users in terms of the have to be translated as rules whose antecedents and conse- minimum trust level and maximum length of the paths con- quents are expressed on the ontology. To achieve this goal, we necting the requester to the resource owner. In the work by Ali use the Semantic Web Rule Language (SWRL) (Horrocks et al., et al. (2007), authors adopt a multi-level security approach, 2004). As consequence, the access control policies can be where trust is the only parameter used to determine the enforced by simply querying the authorizations, that is, the security level of both users and resources. In the work by SAKB. The query can be easily directly implemented by the Carminati et al. (2009b), a semi-decentralized discretionary ontology reasoner by means of instance checking operations, access control model and a related enforcement mechanism or can be performed by an SPARQL query, if the ontology is for controlled sharing of information in OSNs is presented. serialized in RDF. In this paper, we focus on how to model The model allows the specification of access rules for online such a fine-grained social network access control system resources, where authorized users are denoted in terms of the using semantic web technologies. We also assume that relationship type, depth, and trust level existing between a centralized reference monitor hosted by the social network nodes in the network. manager will enforce the required policies. Since our proposed Compared to existing approaches, we use semantic web approach depends on extensible ontologies, it could be easily technologies to represent much richer forms of relationships adapted to various online social networks by modifying the among users, resources and actions. For example, we are able ontologies in our SNKB. Furthermore, as we discuss in details to represent access control rules that leverage relationship later in the paper, semantic web tools allow us to define more hierarchies and by using OWL reasoning tools, we can infer fine-grained access control policies than the ones provided by a “close friend” is also a “friend” and anything that is acces- current OSNs. sible by friend could be also accessible by a “close friend”. In The paper is organized as follows. In Section 2, we provide addition, our proposed solution could be easily adapted for a brief discussion of current security and privacy research very different online social networks by modifying the related to online social networks. In Section 3, we introduce underlying SNKB. A further discussion on the differences a high level overview of the security policies we support in our between the proposed framework and the access control framework. In addition to access control policies, we state mechanism in the work by Carminati et al. (2009b) is provided filtering policies that allow a user (or one of her supervisors) to in Section 3. customize the content she accesses. We also introduce Semantic web technologies have been recently used for administration policies, stating who is authorized to specify developing various policy and access control languages for access control and filtering policies. In Section 4, we discuss domains different from OSNs. For example, in the work by how security policies could be enforced. In Section 5, we give Tonti et al.
Recommended publications
  • Topline Questionnaire
    12 PEW RESEARCH CENTER Topline questionnaire January 2021 Core Trends Survey Topline Abt Associates for Pew Research Center Sample: n=1,502 U.S. adults ages 18 and older nationwide, including 1,202 cellphone interviews Interviewing dates: January 25, 2021 – February 8, 2021 Margin of error: ± 2.9 percentage points for results based on Total [n=1,502] NOTE: ALL NUMBERS ARE PERCENTAGES UNLESS OTHERWISE NOTED. ROWS/COLUMNS MAY NOT TOTAL 100% DUE TO ROUNDING. PERCENTAGES LESS THAN 0.5% ARE REPLACED BY AN ASTERISK (*). IF NO ONE ANSWERED THE QUESTION, THE CELL CONTAINS ZERO (0). A DOUBLE HYPHEN (--) INDICATES THAT THE RESPONSE OPTION WAS NOT PRESENT IN THAT SURVEY. OTHER QUESTIONS ON THIS SURVEY HAVE BEEN PREVIOUSLY RELEASED OR HELD FOR FUTURE RELEASE. SNSINT2 Do you ever use social media sites like Facebook, Twitter or Instagram? CURRENT 72 Yes 28 No 0 (VOL.) Don’t know 0 (VOL.) Refused www.pewresearch.org 13 PEW RESEARCH CENTER Trend based on internet users3 [N=1,413] (VOL.) DON’T YES NO KNOW (VOL.) REFUSED Current 77 23 0 0 February 2019 78 22 0 0 January 2018 77 23 * 0 November 2016 77 23 * * May 2016 74 26 0 * November 2015 74 26 * * July 2015 76 23 * 0 September 2013 74 26 * 0 May 2013 72 28 0 * December 2012 67 33 * * August 2012 69 31 0 * February 2012 66 34 * 0 August 2011 64 35 * 0 May 2011 65 35 * 0 January 2011 61 39 0 0 December 2010 62 38 * 0 November 2010 61 39 * * September 2010 62 38 * 0 May 2010 61 39 0 0 January 2010 57 43 * 0 December 2009 56 44 0 * September 2009 47 52 * * April 2009 46 54 * * December 2008 35 65 * 0 November
    [Show full text]
  • LOEX of the West 2006 Program Descriptions
    Information Literacy for a Lifetime June 8 – 10, 2006 (Fairmont Orchid, Hawaii) 2006 LOEX-of-the-West, Program Descriptions Schedule At-a-Glance Thursday, June 8th 7:00 AM – Pre-Conference Continental Breakfast 8:00 AM 8:00 AM– Effective Teaching Techniques Making IL Relevant: Noon for One Shot Instruction Sessions Using Emerging Technologies in the Classroom 7:00 PM– Opening Reception 8:00 PM 8:00 PM– Big Island Talk Story (Hawaiiana Program) 9:00 PM Schedule At-a-Glance Friday, June 9th 6:00 AM– Continental Breakfast 7:00 AM 7:00 AM– Opening General Session - Creating Spaces for Alternative Ways of Knowing & Testing 8:00 AM Information Literacy and Global Citizenship: Making Podcasts and Promoting Lifelong A Checklist of Footholds and the Connection Screencasts: Opening Learning within the 8:15 AM– Information Foundations: Setting Between Lifelong Academic Library Constraints of the 9:00 AM Competencies for Freshmen on the Road Learning and Instruction to Global One-Shot: The Social College Students to Lifelong Learning Information Literacy Learners Sciences Perspective in the Global Studies Classroom Puffins, Popcorn, and Multimedia Library Retreat and Advance: Googlization of Parker Posey: Using Teaming Up: Faculty, Instruction for Multi- Extracting IL Information and User Interactive Librarians and 9:15 AM– Literate Net-Gens: Outcomes from Upper Preferences: Technology to Teach Technologists 10:00 AM Podcasts & Cable Level Curricula (or a Implications for Information Literacy Creating an Integrated Commercials at Prelude to Injecting
    [Show full text]
  • Social Media Reputation Management
    SOCIAL MEDIA REPUTATION MANAGEMENT If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if you are not using these sites, it is important to manage your digital footprint and identify any false or misleading information about you online. In this booklet you will find our top 10 tips for protecting your reputation online. We also provide practical guides for setting up Facebook, Twitter, Instagram and mobile devices to help you ensure your information is safe online. Contents Top 10 tips for protecting your reputation online ... 2 Managing your Facebook account ................ 5 Make sure your profile is set to private 5 Only accept friend requests from people you know and trust and learn to block offensive users 8 Report fake profiles 9 Delete unused accounts 10 Managing your Twitter account .................. 12 Make sure your profile is set to private 12 Only accept friend requests from people you know and trust and learn to block offensive users 12 Report fake profiles 13 Delete unused accounts 15 Managing your LinkedIn account ................ 16 Make sure your profile is set to private 16 Limiting who can view your activity feed and connections 16 Limiting certain people from communicating with you 17 Protecting your account information 17 Delete your account 17 Managing your Instagram account ............... 18 Make sure your profile is set to private 18 Only accept friend requests from people you know and trust and learn to block offensive users 19 Report fake profiles 19 Managing your Snapchat account ...............
    [Show full text]
  • The Researching and Teaching Communication Series
    THE RESEARCHING AND TEACHING COMMUNICATION SERIES THE RESEARCHING AND TEACHING COMMUNICATION SERIES MEDIA TECHNOLOGIES AND DEMOCRACY IN AN ENLARGED EUROPE THE INTELLECTUAL WORK OF THE 2007 EUROPEAN MEDIA AND COMMUNICATION DOCTORAL SUMMER SCHOOL Edited by Nico Carpentier Pille Pruulmann-Vengerfeldt Kaarle Nordenstreng Maren Hartmann Peeter Vihalemm Bart Cammaerts Hannu Nieminen The Intensive Programme in Media and Communication: Enlarging Europe – Enlarging Participation is supported by the Socrates Erasmus IP project (contract number: 69935-IC-1-2004-EE-ERASMUS-IPUC-6), the European Communication Research and Education Association (www.ecrea.eu), the University of Tartu – the Department of Journalism and Communication (www.jrnl.ut.ee) and a consortium of 19 universities. ISSN 1736–3918 (print) ISBN 978–9949–11–744–4 (print) ISSN 1736–4752 (PDF) ISBN 978–9949–11–745–1 (PDF) Copyright: Authors 2007 Tartu University Press www.tyk.ee Table of contents INTRODUCTION Introduction: Participation and learning. The intellectual work of the 2007 European media and communication doctoral summer school in Tartu......................................................................................................... 11 Nico Carpentier PART ONE SECTION ONE: TECHNOLOGY, DEMOCRACY AND POLICY Communication and technology: beyond determinism?...................... 27 Denis McQuail Public service broadcasting in a multimedia environment .................. 41 Jo Bardoel Towards the democratic regulation of European media and communication ..........................................................................................
    [Show full text]
  • Introduction to Web 2.0 Technologies
    Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information.
    [Show full text]
  • The Example of Swedish Independent Music Fandom by Nancy K
    First Monday Online groups are taking new forms as participants spread themselves amongst multiple Internet and offline platforms. The multinational online community of Swedish independent music fans exemplifies this trend. This participant–observation analysis of this fandom shows how sites are interlinked at multiple levels, and identifies several implications for theorists, researchers, developers, industry and independent professionals, and participants. Contents Introduction Fandom Swedish popular music The Swedish indie music fan community Discussion Conclusion Introduction The rise of social network sites is often taken to exemplify a shift from the interest–based online communities of the Web’s “first” incarnation to a new “Web 2.0” in which individuals are the basic unit, rather than communities. In a recent First Monday article, for instance, boyd (2006) states, “egocentric networks replace groups.” I argue that online groups have not been “replaced.” Even as their members build personal profiles and egocentric networks on MySpace, Facebook, BlackPlanet, Orkut, Bebo, and countless other emerging social network sites, online groups continue to thrive on Web boards, in multiplayer online games, and even on the all–but–forgotten Usenet. However, online communities are also taking a new form somewhere between the site-based online group and the egocentric network, distributing themselves throughout a variety of sites in a quasi–coherent networked fashion. This new form of distributed community poses particular problems for its members, developers, and analysts. This paper, based on over two years of participant–observation, describes this new shape of online community through a close look at the multinational online community of fans of independent rock music from Sweden.
    [Show full text]
  • Twitter – a Personal Perspective
    Twitter – a personal perspective Catriona Fisher Customer Services Manager University of Glasgow Library Email: catriona.fisher@glasgow. ac.uk twitter: @catrionafisher I joined Twitter in March 2009, but like most people I spent the first few months wondering what on earth this strange new world was all about. As a devoted user of Multiply, then Bebo and later Facebook, I was no stranger to social net- working, but Twitter was quite obviously some- thing different. I quickly realised the following: • you need your tweets to be public • the best way to get followers is to follow other people • hashtags are a must if you want your voice to be heard amongst the millions of tweets. I started out tweeting solely about work and had intended to have two accounts, one for work and a personal account (as I do with Facebook), but I quickly realised that many professionals on Twit- ter were tweeting about their work lives and their personal lives from the same account. This takes a bit of getting used to, but is very much the norm on Twitter. I now tweet from my own account @catrionafisher and also on behalf of the University of Glasgow Library @uofglibrary, along with a group of staff from Library Services. We’ve found Twitter to be a really powerful way of reaching out to students and other library users and it is now one of our primary channels of communication when we need to share informa- tion quickly. For example, we are using it to keep students up to date with any disruption during the work to re-clad the library building.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • Looks at Marathon Station Possibilities County
    Single copy $1.00 Vol. 113 No. 3 • Thursday, January 9, 2014 • Silver Lake, MN 55381 Council reorganizes; looks at Marathon Station possibilities By Alyssa Schauer sary liaison: Councilor John- departmental employees so Staff Writer son. that he or she can update the At its first meeting of the • Community development Council as to the workings of year, the Silver Lake City and planning commission liai- the assigned area and report on Council discussed Mayor son: Councilor Eric Nelson. the departments budget Bruce Bebo’s liaison appoint- • Assistant to all liaisons: throughout the year.” ments and other annual ap- Mayor Bebo. Bebo also noted the plan- pointments for 2014. The regular meeting dates ning commission liaison is to The following appointments and times also were set and meet with Gary Kosek, direc- were recommended and ap- regular Council meetings will tor of pool operations and proved by the Council: be the third Monday of every summer recreation, as part of • Official city depositories: month at 6:30 p.m. Meetings the community development First Community Bank of Sil- scheduled on federal holidays portion of liaison duties. ver Lake and Minnesota Mu- will be held Tuesday. Venier also noted that the li- nicipal Money Market Fund. Quarterly meetings were aison acts as a “leader” or • Official newspaper: Silver scheduled for April 7, July 7 “guide” for the planning com- Lake Leader. and Oct. 6. mission. • City attorney: Gavin, Members of the City Coun- “The commission has been Olson & Winters, LTD. cil are appointed to the eco- missing that leader in the past • Acting mayor: Councilor nomic development authority, year.
    [Show full text]
  • Social Networking Service
    Social networking service A social networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web based and provide means for users to interact over the internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those which contain category places (such as former school year or classmates), means to connect with friends (usually with self-description pages) and a recommendation system linked to trust. Popular methods now combine many of these, with Facebook and Twitter widely used worldwide, Nexopia (mostly in Canada); Bebo, VKontakte, Hi5, Hyves (mostly in The Netherlands), Draugiem.lv (mostly in Latvia), StudiVZ (mostly in Germany), iWiW (mostly in Hungary), Tuenti (mostly in Spain), Nasza-Klasa (mostly in Poland), Decayenne, Tagged, XING, Badoo and Skyrock in parts of Europe; Orkut and Hi5 in South America and Central America; and Friendster, Mixi, Multiply, Orkut, Wretch, renren and Cyworld in Asia and the Pacific Islands and Twitter, Facebook, LinkedIn and Orkut in India.
    [Show full text]
  • Public Youth Radio in Europe
    Public Youth Radio in Europe Executive summary June 2008 European Broadcasting Union Strategic Information Service (SIS) L’Ancienne-Route 17A CH-1218 Grand-Saconnex Switzerland Phone +41 (0) 22 717 21 11 Fax +41 (0)22 747 40 00 www.ebu.ch/en/sis European Broadcasting Union l Strategic Information Service Public Youth Radio in Europe Executive summary June 2008 Public Youth Radio in Europe 1 Executive summary Introduction The aim of this report is primarily to give an overview of EBU Members youth radio services, but also to describe the new media landscape, in which Members operate, by looking at sociological and economical trends important to the youth radio business; radio consumption trends, the digital music industry, Internet youth usage and new radio platforms. A quantitative analysis have been based on an internal EBU survey and covers channel formatting, programming output, targeting and distribution strategies of their youth channels. It is also looking at the competitive youth radio climate, the offer of interactive services and successful initiatives, platform consumption and key media changes effecting radio. In-depth case studies have been carried out in addition to the survey analysis to give a more detailed description of Members’ activities. Overview The media consumption among young people in Europe is shifting. Sociological trends and new technologies are increasing users’ flexibility and the way they consume media. The market is becoming more and more fragmented and radio content is no longer limited to traditional transmission means. The Internet boom has lead to fast pacing globalization of websites, and the new media landscape is becoming more personalized and diversified.
    [Show full text]
  • Downloading, Streaming and Digital Lending
    Music in the Digital Age: Downloading, Streaming and Digital Lending James Mason, University of Toronto Jared Wiercinski, Concordia University Introduction The ways in which we listen to music, and the places we look to find it, have changed radically in the last thirty years. In 1980, Philips and Sony proposed the Red Book standard for Compact Discs (CDs),1 with a little help from Beethoven.2 Although it was not the first storage medium for digital audio, the introduction of the CD signaled that the world of digital music was about to go mainstream. The technology behind communications devices such as telephones, radios, and personal computers continued to evolve, and before long, the foundation for the Internet was firmly in place. This multifaceted and complex "global system of interconnected computer networks"3 was about to revolutionize the distribution of sound recordings. As Leiner says, "The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location."4 Only fifteen years after the introduction of the Red Book, music was being distributed over the Internet. RealNetworks' RealAudio Player, for example, was released in April 1995, and was one of the first media players capable of streaming media over the Internet.5 Now, recorded music is more accessible than ever before. We enjoy unprecedented access to music through a variety of means, including both web access and via mobile devices such as smartphones, the iPod touch 1 British Broadcasting Corporation (BBC) News, “How the CD Was Developed,” http://news.bbc.co.uk/2/hi/technology/6950933.stm (accessed March 16, 2010).
    [Show full text]