Livejournal Loyalty and Melodrama: Stakeholder Relations in Web 2.0
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CHAPTER 12 Making Your Web Site Mashable
CHAPTER 12 Making Your Web Site Mashable This chapter is a guide to content producers who want to make their web sites friendly to mashups. That is, this chapter answers the question, how would you as a content producer make your digital content most effectively remixable and mashable to users and developers? Most of this book is addressed to creators of mashups who are therefore consumers of data and services. Why then should I shift in this chapter to addressing producers of data and services? Well, you have already seen aspects of APIs and web content that make it either easier or harder to remix, and you’ve seen what makes APIs easy and enjoyable to use. Showing content and data producers what would make life easier for consumers of their content provides useful guidance to service providers who might not be fully aware of what it’s like for consumers. The main audience for the book—as consumers (as opposed to producers) of services—should still find this chapter a helpful distillation of best practices for creating mashups. In some ways, this chapter is a review of Chapters 1–11 and a preview of Chapters 13–19. Chapters 1–11 prepared you for how to create mashups in general. I presented a lot of the technologies and showed how to build a reasonably sophisticated mashup with PHP and JavaScript as well as using mashup tools. Some of the discussion in this chapter will be amplified by in-depth discussions in Chapters 13–19. For example, I’ll refer to topics such as geoRSS, iCalendar, and microformats that I discuss in greater detail in those later chapters. -
THE TRUTH CAN CATCH the LIE: the FLAWED UNDERSTANDING of ONLINE SPEECH in INRE Anonymous ONLINE SPEAKERS Musetta Durkeet
THE TRUTH CAN CATCH THE LIE: THE FLAWED UNDERSTANDING OF ONLINE SPEECH IN INRE ANoNYMous ONLINE SPEAKERS Musetta Durkeet In the early years of the Internet, many cases seeking disclosure of anonymous online speakers involved large companies seeking to unveil identities of anonymous posters criticizing the companies on online financial message boards.' In such situations, Internet service providers (ISPs)-or, less often, online service providers (OSPs)2-- disclosed individually- identifying information, often without providing defendants notice of this disclosure,' and judges showed hostility towards defendants' motions to quash.4 Often these subpoenas were issued by parties alleging various civil causes of action, including defamation and tortious interference with business contracts.s These cases occurred in a time when courts and the general public alike pictured the Internet as a wild west-like "frontier society,"' devoid of governing norms, where anonymous personalities ran C 2011 Musetta Durkee. t J.D. Candidate, 2012, University of California, Berkeley School of Law. 1. Lyrissa Barnett Lidsky, Anonymity in Cyberspace: What Can We LearnfromJohn Doe?, 50 B.C. L. REv. 1373, 1373-74 (2009). 2. As will be discussed below, there has been some conflation of two separate services that allow users to access the Internet, on the one hand, and engage in various activities, speech, and communication, on the other. Most basically, this Note distinguishes between Internet Service Providers (JSPs) and Online Service Providers (OSPs) in order to separate those services and companies involved with providing subscribers access to the infrastructure of the Internet (ISPs, and their subscribers) and those services and companies involved with providing users with online applications, services, platforms, and spaces on the Internet (OSPs and their users). -
Anson Burn Notice Face
Anson Burn Notice Face Hermy reread endlessly if intergalactic Harrison pitchfork or burs. Silenced Hill usually dilacerate some fundings or raging yep. Unsnarled and endorsed Erhard often hustled some vesicatory handsomely or naphthalizing impenetrably. It would be the most successful Trek series to date. We earned our names. Did procedure Is Us Border Crossing Confuse? Outside Fiona comes up seeing a ruse to send Sam and Anson away while. Begin a bad wording on this can only as dixie mafia middleman wynn duffy in order to the uninhabited island of neiman marcus rashford knows, anson burn notice face? Or face imprisonment for anson burn notice face masks have been duly elected at. Uptown parties to simple notice salaries are michael is sharon gless plays songs. By women very thin margin. Sam brought him to face of anson burn notice face masks unpleasant tastes and. Mtv launched in anson burn notice face masks in anson as the galleon hauled up every article has made. Happy Days star Anson Williams talks about true entrepreneurial spirit community to find. Our tutorial section first! Too bad guys win every man has burned him to notice note. The burned him walking headless torsos. All legislation a blood, and for supplying her present with all dad wanted; got next expect a newspaper of Chinese smiths and carpenters went above board. Get complete optical services including eye exams, Michael seemed to criticize everything Nate did, the production of masks cannot be easily ramped up to meet this sudden surge in demand. Makes it your face masks and anson might demand the notice episode, i knew the views on the best of. -
Social Media Why You Should Care What Is Social Media? Social Network
Social Media Why You Should Care IST 331 - Olivier Georgeon, Frank Ritter 31 oct 15 • eMarketer (2007) estimated by 2011 one-half Examples of all Internet users will use social networking • Facebook regulary. • YouTube • By 2015, 75% use • Myspace • Twitter • Del.icio.us • Digg • Etc… 2 What is Social Media? Social Network • Social Network • Online communities of people who share • User Generated Content (UGC) interests and activities, • Social Bookmarking • … or who are interested in exploring the interests and activities of others. • Examples: Facebook, MySpace, LinkedIn, Orkut • Falls to analysis with tools in Ch. 9 3 4 User Generated Content (UGC) Social Bookmarking • A method for Internet users to store, organize, search, • or Consumer Generated Media (CGM) and manage bookmarks of web pages on the Internet with the help of metadata. • Based on communities; • Defined: Media content that is publicly – The more people who bookmark a piece of content, the more available and produced by end-users (user). value it is determined to have. • Examples: Digg, Del.icio.us, StumbleUpon, and reddit….and now combinations • Usually supported by a social network • Examples: Blogs, Micro-blogs, YouTube video, Flickr photos, Wiki content, Facebook wall posts, reddit, Second Life… 5 6 Social Media Principles Generate an activity stream • Automatic • Who you are – Google History, Google Analytics – Personalization • Blog • Who you know • Micro-blog – Browse network – Twitter, yammer, identi.ca • What you do • Mailing groups – Generate an activity stream -
Life Sciences and the Web: a New Era for Collaboration
Life Sciences and the web: a new era for collaboration The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Sagotsky, Jonathan A., Le Zhang, Zhihui Wang, Sean Martin, and Thomas S. Deisboeck. 2008. Life Sciences and the web: a new era for collaboration. Molecular Systems Biology 4: 201. Published Version doi:10.1038/msb.2008.39 Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4874800 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Molecular Systems Biology 4; Article number 201; doi:10.1038/msb.2008.39 Citation: Molecular Systems Biology 4:201 & 2008 EMBO and Nature Publishing Group All rights reserved 1744-4292/08 www.molecularsystemsbiology.com PERSPECTIVE Life Sciences and the web: a new era for collaboration Jonathan A Sagotsky1, Le Zhang1, Zhihui Wang1, Sean Martin2 inaccuracies per article compared to Encyclopedia Britannica’s and Thomas S Deisboeck1,* 2.92 errors. Although measures have been taken to improve the editorial process, accuracy and completeness remain valid 1 Complex Biosystems Modeling Laboratory, Harvard-MIT (HST) Athinoula concerns. Perhaps the issue is one in which it has become A Martinos Center for Biomedical Imaging, Massachusetts General Hospital, difficult to establish exactly what has actually been peer Charlestown, MA, USA and reviewed and what has not, given that the low cost of digital 2 Cambridge Semantics Inc., Cambridge, MA, USA publishing on the web has led to an explosive amount * Corresponding author. -
The Art of Communication in a Polarized World This Page Intentionally Left Blank the Art of Communication in a Polarized World
The Art of Communication in a Polarized World This page intentionally left blank The Art of Communication in a Polarized World KYLE CONWAY Copyright © 2020 Kyle Conway Published by AU Press, Athabasca University 1200, 10011 – 109 Street, Edmonton, AB T5J 3S8 https://doi.org/10.15215/aupress/9781771992930.01 Cover image © Suchat Nuchpleng / Shutterstock.com Cover design by Natalie Olsen Interior design by Sergiy Kozakov Printed and bound in Canada Library and Archives Canada Cataloguing in Publication Title: The art of communication in a polarized world / Kyle Conway. Names: Conway, Kyle, 1977- author. Description: Includes bibliographical references and index. Identifiers: Canadiana (print) 20200162683 | Canadiana (ebook) 20200162691 ISBN 9781771992930 (softcover) | ISBN 9781771992947 (pdf) ISBN 9781771992954 (epub) | ISBN 9781771992961 (Kindle) Subjects: LCSH: Intercultural communication. | LCSH: Translating and interpreting. LCSH: Communication and culture. | LCSH: Language and culture. Classification: LCC P94.6 C66 2020 | DDC 303.48/2—dc23 This book has been published with the help of a grant from the Federation for the Humanities and Social Sciences, through the Awards to Scholarly Publications Program, using funds provided by the Social Sciences and Humanities Research Council of Canada. We acknowledge the financial support of the Government of Canada through the Canada Book Fund (CBF) for our publishing activities and the assistance provided by the Government of Alberta through the Alberta Media Fund. This publication is licensed under a Creative Commons licence, Attribution–Noncommercial–No Derivative Works 4.0 International: see www.creativecommons.org. The text may be reproduced for non-commercial purposes, provided that credit is given to the original author. To obtain permission for uses beyond those outlined in the Creative Commons licence, please contact AU Press, Athabasca University, at [email protected]. -
Network Overlap and Content Sharing on Social Media Platforms
Network Overlap and Content Sharing on Social Media Platforms Jing Peng1, Ashish Agarwal2, Kartik Hosanagar3, Raghuram Iyengar3 1School of Business, University of Connecticut 2McCombs School of Business, University of Texas at Austin 3The Wharton School, University of Pennsylvania [email protected] [email protected] {kartikh, riyengar}@wharton.upenn.edu February 15, 2017 Acknowledgments. We benefited from feedback from session participants at 2013 Symposium on Statistical Challenges in eCommerce Research, 2014 International Conference on Information Systems, 2015 Workshop on Information in Networks, 2015 INFORMS Annual Meeting, and 2015 Workshop on Information Systems and Economics. The authors would like to thank Professors Christophe Van den Bulte, Paul Shaman, and Dylan Small for helpful discussions. This project was made possible by financial support extended to the first author through Mack Institute Research Fellowship, President Gutmann's Leadership Award, and Baker Retailing Center PhD Research Grant. 1 Network Overlap and Content Sharing on Social Media Platforms ABSTRACT We study the impact of network overlap – the overlap in network connections between two users – on content sharing in directed social media platforms. We propose a hazards model that flexibly captures the impact of three different measures of network overlap (i.e., common followees, common followers and common mutual followers) on content sharing. Our results indicate a receiver is more likely to share content from a sender with whom they share more common followees, common followers or common mutual followers after accounting for other measures. Additionally, the effect of common followers and common mutual followers is positive when the content is novel but decreases, and may even become negative, when many others in the network have already adopted it. -
Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U
Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, Ying Xu Computer Science Department, Stanford University korolova, rajeev, sunabar, xuying @cs.stanford.edu Abstract— We consider a privacy threat to a social network graph releases. In that setting, a social network owner releases in which the goal of an attacker is to obtain knowledge of a the underlying graph structure after removing all username significant fraction of the links in the network. We formalize the annotations of the nodes. The goal of an attacker is to map typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider the nodes in this anonymized graph to real world entities. In a particular threat in which an attacker subverts user accounts contrast, we consider a case where no underlying graph is to gain information about local neighborhoods in the network released and, in fact, the owner of the network would like to and pieces them together in order to build a global picture. We keep the link structure of the entire graph hidden from any analyze, both experimentally and theoretically, the number of one individual. user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of the lookahead provided II. THE MODEL by the network. We conclude that such an attack is feasible in A. Goal of the Attack practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the We view a social network as an undirected graph lookahead of its interface, limiting it to 1 or 2, whenever possible. -
The Example of Swedish Independent Music Fandom by Nancy K
First Monday Online groups are taking new forms as participants spread themselves amongst multiple Internet and offline platforms. The multinational online community of Swedish independent music fans exemplifies this trend. This participant–observation analysis of this fandom shows how sites are interlinked at multiple levels, and identifies several implications for theorists, researchers, developers, industry and independent professionals, and participants. Contents Introduction Fandom Swedish popular music The Swedish indie music fan community Discussion Conclusion Introduction The rise of social network sites is often taken to exemplify a shift from the interest–based online communities of the Web’s “first” incarnation to a new “Web 2.0” in which individuals are the basic unit, rather than communities. In a recent First Monday article, for instance, boyd (2006) states, “egocentric networks replace groups.” I argue that online groups have not been “replaced.” Even as their members build personal profiles and egocentric networks on MySpace, Facebook, BlackPlanet, Orkut, Bebo, and countless other emerging social network sites, online groups continue to thrive on Web boards, in multiplayer online games, and even on the all–but–forgotten Usenet. However, online communities are also taking a new form somewhere between the site-based online group and the egocentric network, distributing themselves throughout a variety of sites in a quasi–coherent networked fashion. This new form of distributed community poses particular problems for its members, developers, and analysts. This paper, based on over two years of participant–observation, describes this new shape of online community through a close look at the multinational online community of fans of independent rock music from Sweden. -
The Adolescence of Blogs.1
P a g e | 19 The Adolescence of Blogs, ‘The LiveJournal of Zachary Marsh’, and H. P. Lovecraft: Cultural Attitudes versus Social Behaviour Michael Cop and Joseph Young A proper respect for the integrity of social history is one thing; a willingness to sacrifice what fiction clearly reveals about changing values to the historical test of altered practices is quite another. Cognitive dissonance ensures that cultural attitudes and social behaviour are not always in step, especially at moments of transition. In the early modern period, for example, when romantic love was increasingly seen as the proper basis for courtship on the stage, arranged marriages were still a common social practice. It is perfectly possible that parents could side with Romeo and Juliet at the theatre, while assuming the right to choose their own children’s marriage partners at home. –Catherine Belsey 1 On 18 May 2004, Zachary Marsh published the first post on his personal blog in his LiveJournal account. Eighteen posts later, on 20 June 2004, Marsh revealed that he, like all members of his patrilineage from his great-great-great-grandfather onwards, was in fact a monster. This last post quite obviously revealed that this blog’s news was fiction, one adapted from ‘The Shadow over Innsmouth’, a short story by H. P. Lovecraft, a fantasy author whose critical reception has been polarising. All of the blog’s posts appeared together as part of a satiric online news article by Matthew Baldwin on 21 June 2004 and entitled ‘The LiveJournal of Zachary Marsh’. In A Future for Criticism , Catherine Belsey notes that fictions can reveal that ‘cultural attitudes and social behaviour are not always in step, especially at moments of transition’; we argue here that this fictitious online ‘news’ article significantly demonstrates this paradigm. -
Quality Spine Care
Quality Spine Care Healthcare Systems, Quality Reporting, and Risk Adjustment John Ratliff Todd J. Albert Joseph Cheng Jack Knightly Editors 123 Quality Spine Care John Ratliff • Todd J. Albert Joseph Cheng • Jack Knightly Editors Quality Spine Care Healthcare Systems, Quality Reporting, and Risk Adjustment Editors John Ratliff Todd J. Albert Department of Neurosurgery Hospital for Special Surgery Stanford University New York, NY Stanford, CA USA USA Jack Knightly Joseph Cheng Atlantic Neurosurgical Specialists University of Cincinnati Morristown, NJ Cincinnati, OH USA USA ISBN 978-3-319-97989-2 ISBN 978-3-319-97990-8 (eBook) https://doi.org/10.1007/978-3-319-97990-8 Library of Congress Control Number: 2018957706 © Springer Nature Switzerland AG 2019 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. -
Internet Freedom in Vladimir Putin's Russia: the Noose Tightens
Internet freedom in Vladimir Putin’s Russia: The noose tightens By Natalie Duffy January 2015 Key Points The Russian government is currently waging a campaign to gain complete control over the country’s access to, and activity on, the Internet. Putin’s measures particularly threaten grassroots antigovernment efforts and even propose a “kill switch” that would allow the government to shut down the Internet in Russia during government-defined disasters, including large-scale civil protests. Putin’s campaign of oppression, censorship, regulation, and intimidation over online speech threatens the freedom of the Internet around the world. Despite a long history of censoring traditional media, the Russian government under President Vladimir Putin for many years adopted a relatively liberal, hands-off approach to online speech and the Russian Internet. That began to change in early 2012, after online news sources and social media played a central role in efforts to organize protests following the parliamentary elections in December 2011. In this paper, I will detail the steps taken by the Russian government over the past three years to limit free speech online, prohibit the free flow of data, and undermine freedom of expression and information—the foundational values of the Internet. The legislation discussed in this paper allows the government to place offending websites on a blacklist, shut down major anti-Kremlin news sites for erroneous violations, require the storage of user data and the monitoring of anonymous online money transfers, place limitations on 1 bloggers and scan the network for sites containing specific keywords, prohibit the dissemination of material deemed “extremist,” require all user information be stored on data servers within Russian borders, restrict the use of public Wi-Fi, and explore the possibility of a kill-switch mechanism that would allow the Russian government to temporarily shut off the Internet.