Connected: Social Networking

Page 1

CONNECTED: SOCIAL NETWORKING



CONNECTED: SOCIAL NETWORKING


Copyright No part of this book may be reproduced in any form without written permission of the copyright owner. All images and illustrations in this book have been reproduced with the knowledge and prior consent of the designer’s concern, an no responsibility is accepted by producer, publisher, or printer for any infringement of copyright. Every effort has been made to ensure that the credits accurately comply with the information supplied. Book Design copyright Š 2011 by Amber Tu for course GR_330_OL2, Typography 4, taught by Jeremy Stout in Summer 2011 at the Academy of Art University, CA. All rights reserved.


Dedicated to Social Network Users


TABLE OF CONTENTS 1

History of Social Networking

2

Define Social Networking

3

Web Security and Privacy

4

Technology vs Communication

5

The Future of Networking


>> Chapter One Opener 01 - 02,

>> Start of Social Networking 03 - 06, >> BBS, AOL and CompuServe: Infant Years

07 - 08, >> Internet Boom: Networking’s Adolescence 09 - 10, >> LinkedIn, MySpace and Facebook 11 - 12, >> Profits from User Generated Content 13 - 14

>> Chapter Two Opener 15 - 16,

>> A Global phenomenom 17 - 20, >> types of social networks 21 - 24, >> Advantages

of social networks 25 - 26, >> Disdvantages of social networks 27 - 28, >> facebook addiction disorder 29 - 30

>> Chapter Three Opener 31 - 32,

>> Identity Theft in Social Networks 33 - 34, >> Anonymity in the Digital Era 35 - 36,

>> Privacy Settings in Facebook 37 - 38, >> Which Networking Sites Are Secure 39 - 40

>> Chapter Four Opener 41 - 42,

>> Technology Dependency 43 - 44, >> Computer Meditated Communication 45 - 46,

>> Netspeak Internet Jargon 47 - 50, >> Impacts on Interpersonal Social Skills 51 - 52

>> Chapter Five Opener 53 - 54,

>> Future of Web and Social Networks 55 - 56, >> The Next Big Social Network:

Gowalla 57 - 58, >> Future Trends of Mobile Networking 59 - 60, >> A Transparent Society 61 - 62, >> Glossary 63 - 64


Ch_1 One of Five Chapters

***** 01

Connected

History of Social Networking

>> START OF SOCIAL NETWORKing 03 - 06 >> BBS, AOL and CompuServe: Infant Years 07 - 08 >> Internet Boom: Networking’s Adolescence 09 - 10 >> LinkedIn, MySpace and Facebook 11 - 12 >> Profits from User Generated Content 13 - 14


Ch_1 One of Five Chapters

***** 02 History of Social Networking

Connected


Ch_1 One of Five Chapters

***** 03

Connected

History of Social Networking

Start of Social Networks Being connected to the world has never been easy and accessible than it is today. After the Internet made it possible to contact people around the globe with a click of a button, Social Networking exploded into one of the biggest industries of our time.

The Internet was created in...

1957


Ch_1

***** 04

One of Five Chapters

1971

The first email is sent. The two computers were sitting right next to each other.

1994

Connected

History of Social Networking

One of the web’s first social networking websites, Geocities is founded, the concept was for users to create their own websites and it was categorized by one of the unique six cities.

1978

BBS (Bulletin Board System) exchanged data over

1978

The first copies of web browsers were distributed

phone lines with other users.

through Usenet, an early online bulletin board, the birthplace of flame wars and trolling.

1995

TheGlobe.com gave Internet users the freedom to

1997

AOL Instant Messenger is launched to the public,

personalize their experiences via interacting with others with similar interests and hobbies.

popularizing instant messaging.


Ch_1 One of Five Chapters

1997

***** 05

Connected

History of Social Networking

SixDegrees.com is launched, allowing the step to profile creation and listing friends.

2004

Facebook.com is launched, originally to connect U.S college students, first launched at Harvard College. More than half of the 19,500 students signed up within the first month.

2002

Friendster.com is launched, pioneering the online connection of real world friends. Its user based grows to 3.0 million users in the first three months,

2006

which is around 1 in every 126 internet users who

Twitter.com is created. At the closing of the 2010 Japan vs Denmark world cup soccer game, it was noted that Twitter users published 3,283 tweets per second as a top record.

owned a Friendster account at the time.

2003

Myspace.com is launched at first as a Friendster clone created by an internet marketing firm and the first version was hastily coded in 10 days.

2008

Facebook finally takeover Myspace as the leading networking website. Both social network sites are vastly more popular than Friendster.


Ch_1 One of Five Chapters

***** 06

Connected

History of Social Networking

2010 Social Networks Compared by Users (in Millions)

750

Friendster found its success in Asia, where the site currently finds 90% of its traffic.

460

305 180


Ch_1 One of Five Chapters

***** 07

Connected

History of Social Networking

BBS, AOL and CompuServe: Infant Years It all started with the BBS. Short for Bulletin Board

worldwide computer social networks that managed

Yahoo had just set up shop, Amazon had just begun

System, the online meeting places were effectively

to survive the Internet revolution. There were also

selling books, and the race to have a computer in

produced hunks of code that allowed web users to

other avenues for social network interaction long

every household was on. During 1995, the site that

communicate through a central system where they

before the Internet exploded onto the mainstream.

have been the first to fulfill the modern definition of

could download files or games which several times

Social Networking scene was born.

included pirated software and leave messages to

One option was CompuServe, which was a service

several other users. The system could be accessed

that began life in the 1970’s as a business oriented

over telephone lines via a modem, BBSes were ran

main frame computer communication solution, and

and monitered by hobbyist, those who help nurtured

expanded itself into the public domain during the

the social aspects and interest specific nature of

late 1980’s. CompuServe even allowed its members

their projects, more often than not in the early days

to share files, access news and other events.

of computers, was all technology related. Not only could an internet web user send a message Moreover, long distance call rates usually applied

to their contacts through a newfangled technology

for those who were out of town, so many Bulletin

called the E-mail, users could also join any of the

Boards were locals only affairs that in turn spurred

CompuServe’s discussion forums with thousands

local in person gatherings. And voila, just like that,

of other members on virtually unlimited important

suddenly those who were anti-social had become

subjects of that day. Those forums had proved to

social. The bulletin system was not a joke. Though

be tremendously popular and paved the way for the

the technology of the time restricted the flexibility

modern iterations we have today.

of these systems, the end user’s experience, to text only exchanges of data that went along at a

In several ways, and for many people, AOL was the

glacial speed, BBSes continued to gain popularity

first Internet before the Internet, and its members

throughout the 1980’s and into the 1990’s, when

created their communities, were all arguably the

the Internet truly kicked into gear. Indeed, some

web service’s fascinating, forward thinking features.

Internet services, such as Tom Jennings’s FidoNet

There were no stopping the real Internet, and by

which helped link numerous BBSes together to the

the mid 1990’s, Internet was moving at full speed.


Ch_1 One of Five Chapters

1962 J.C.R Licklider (1915-1990) introduced the Intergalactic Network. His main idea involved a global computer network that allowed people to gain access to information from anywhere in the world. He had become head of the Defense Advanced Research Project Agency, convincing the importance of the Internet.

***** 08 History of Social Networking

Connected


Ch_1 One of Five Chapters

***** 09

Connected

History of Social Networking

The Internet Boom: Social Networking’s Adolescence Although being different from the current social

into a loose association of computer web users and

networking websites in that it asks not, who could

complaints of spam-filled members. SixDegrees

I connect with? but rather, who could I reconnect

folded just after the turn of the millennium. Other

with that was once a schoolmate of mine? The

websites of the era opted solely for niche, especially

networking social site, Classmates.com had proved

for demographic driven markets.

immediately that including the idea of a virtual reunion was going to be a good one.

A product of Community Connect Inc., which itself was founded just one year prior in the New York

Early website users could not create profiles, but

apartment of former investment banker and future

they could locate long lost grade school friends,

Community Connect CEO Ben Sun, AsianAvenue.

menacing school bullies and maybe even that prom

com was launched in 1999 by BlackPlanet.com,

date they just couldn’t forget. It was a hit almost

and in 2000 by the Hispanic-oriented MiGente.

immediately, and still even today the service boasts

com. All three sites have survived to this very day,

some 40 million user accounts. That same level of

with BlackPlanet.com in particular is enjoying its

success can’t be said for SixDegrees.com.

success throughout its long run.

Sporting a name based on this theory somewhat associated with actor Kevin Bacon that no person can be separated by more than six degrees from another, the website sprung up in 1997 and was one of the very first to allow its users to create profiles, invite friends, organize groups and browse at other user’s profiles. The founders worked the six degrees angle hard by encouraging members to bring more people into the fold. Unfortunately, this encouragement ultimately became a bit too pushy for several, and the site slowly de-evolved


Ch_1 One of Five Chapters

***** 10

Connected

History of Social Networking

Launch Year of Major Social Network Sites 1997

1999

2000

2001

2002

Six Degrees.com

LiveJournal.com

LunarStorm.com

Cyworld.com

Fotolog.com

Asian Avenue.com

MGents.com

Ryze.com

Friendster.com Skyblog.com

Black Planet.com

2003

2004

2005

2006

MySpace.com

Orkut.com

YouTube.com

Facebook.com

Couchsurfing.com

Dogster.com

Bebo.com

Windows Live Spaces

Hi5.com

Flickr.com

Yahoo! 360.com

Twitter.com

LinkedIn.com

Mutiply.com

Xanga.com

MyChurch.com

Tribe.net

Catster.com

Ning.com

Last.FM.

Hyves.com


Ch_1 One of Five Chapters

***** 11

Connected

History of Social Networking

Friendster, LinkedIn, MySpace and Facebook In 2002, social networking really hit its stride

In fact, LinkedIn contacts are actually referred to as

during the creation of Friendster.com. Friendster

connections. Today, LinkedIn currently boasts more

used a degree of separation concept all similar to

than 75 million member profiles. More than tripling

that of SixDegrees.com, refined it into a routine

LinkedIn’s figures, according to recent estimates,

and dubbed it the Circle of Friends, where in the

is MySpace, launched in 2003.

pathways connecting people were displayed and promoted the idea that a rich online community

MySpace is no longer residing upon that social

can exist only between persons who truly have

networking throne in several of English speaking

common bonds. And it ensured there were plenty

countries since that honor now belongs to Facebook

of new ways to discover those bonds.

in Canada and UK. MySpace somewhat remains the perennial favorite in the USA. The site does so

An interface that shared the exact traits one

by tempting the key of young adult demographic

would find at any online dating website certainly

with entertainment, music video and a funky, self

didn’t seem to hurt. And, in just a year after its

customize, fun, feature filled environment.

launch, Friendster also boasted more than three million registered users with a ton of investment

It looked and felt hipper than major competitor

interest. Though the service has since seen more

Friendster right from the start, and it conducted a

than its share of technical issues, or questionable

campaign of sorts in the early days to show how

management decisions, and with resulting drops

alienated it is, however, it is now the ubiquitous

in its North American fortunes, however it remains

Facebook that leads the global social networking

a force in Asia. Introduced just one year later in

pack. Like many networking websites, by university

2003, LinkedIn decided to take a more serious,

students who initially peddled their products to

sober approach to the overall social networking

other students, Facebook was launched in 2004 as

phenomenon. Rather than being a mere playground

a Harvard only exercise and remained a campus

for classmates and teenagers, LinkedIn was, and

oriented site for two full years before finally opening

still is, a networking resource for business people

the social neworking site to the public in 2006.

who wants to connect with other professionals.


Ch_1 One of Five Chapters

33% Facebook

67% Other Sites

2009

***** 12

Connected

History of Social Networking

44% Facebook

Facebook grew by 1/3 from 2009 to 2010

57% Other Sites

2010


Ch_1 One of Five Chapters

***** 13

Connected

History of Social Networking

Profits from User Generated Content Social networking led to a proliferation in user

their own domain. It’s clear that social networking

generated content, allowing users to become mini

has led to a proliferation in user generated content,

content producers. Users take photos and videos

thus allowing neworking users to become mini

that they upload to other sites to share with their

content producers. Users take photos and upload to

friends. What hasn’t been clear however, is just

other sites to share with their friends. What hasn’t

how much these sites are making from the content

been clear is just how much these sites are making

users willingly upload. Facebook comes out on top,

from the content users willingly upload.

having made a huge 1.86 billion in 2010. This will come in the form of advertising, as every piece of

Facebook comes out on top, having made a huge

content user create is basically another page on the

1.86 billion in 2010. This will come in the form of

site which leads to more ads being placed, more

advertising, as every piece of content user create is

impressions for the advertiser and more clicks.

another page on the site which leads to more ads being placed, more impressions for the advertiser

All that content users are producing all translates

and more clicks. All that content Faceook users are

directly into the revenue figures for the top five

producing translates directly into revenue figures

social networks. What networkers are relinquishing

for the top five social networks.

through ownership of their own content of course, is the reach users get through the social platforms.

What users are relinquishing through ownership

Networks invest in building the infrastructure to

of their own content of course, is the reach they

facilitate sharing amongst communities and users

get through the social platforms. Networks invest

create the content that keeps it going, that keeps

in building the infrastructure to facilitate sharing

communities growing and gets people talking. The

and networking users create the content that runs

problem of course is that many people don’t realize

it and keeps the communities growing.

how much direct revenue they’re generating for sites when networkers do this. More people turn towards social networks to distribute their content, away from blogging, where the content is within


Ch_1 One of Five Chapters

***** 14

Connected

History of Social Networking

Estimated Revenue For Each Site (2010) Facebook YouTube MySpace LinkedIn Twitter

45

MILLION

243 MILLION

288 MILLION

945 MILLION

1.860 BILLION


Ch_2 Two of Five Chapters

***** 15

Connected

Define Social Networking

>> A Global phenomenom 17 - 20 >> types of social networks 21 - 24 >> advantages of social networks 25 - 26 >> Disdvantages of social networks 27 - 28 >> facebook addiction disorder 29 - 30


Ch_2 Two of Five Chapters

***** 16 Define Social Networking

Connected


Ch_2 Two of Five Chapters

***** 17

Connected

Define Social Networking

A Global Phenomenon To the average networker, a Social Network is an application that resides within their desktop or browser. It consists of a login page, an account, a profile, and games. There are a very sophisticated hardware and software that must constantly run in order to enable these applications to function properly. Several program apps, such as Twitter’s messaging-client, are installed programs on the user’s computer, called client-based applications. In the world of computer interactions, there are two different types of that we refer to, a client and a server. User’s computers are the clients and the computers that deliver application to the users are the servers. The servers collect information from all users of application. Based on the user preferences and social connections within the application, the server will share the information with other client end users. The application server will receive and store photos, for instance, and then based on the permission granted by a networker who uploaded, grant access to several other users.

Social Networking is an experience of exploration. To wander into this digital realm, is to embark on a journey leading to the unknown. There are countless, possible routes explorers can take, paths that lead to discoveries, streams that flow with consciousness and crossroads where others await. It’s the experience that counts. And the destination, is the surprise...


Ch_2

***** 18

Connected

Define Social Networking

Two of Five Chapters

Countries with the Highest Numbers of Internet Users (In Millions)

26.2

239.9

CANADA

51.4

43.6

RUSSIA UK

USA

420.0

cHINA

20.3

AFRICA

29.7

PHILIPPINES

75.9

Brazil

AUSTRALIA

30.6


Ch_2 Two of Five Chapters

***** 19

Connected

Define Social Networking

How many Networks do You Belong to?

Delicious

Foursquare

Corotflot

Ember App

Hyves

Identi.ca

Twitter

Mixx

W3

Blip

Smugmug

Photobucket

Slash Dot

YouTube

Scribd

Github

Soundcloud

Twitter

Gdgt

Gowalla

Reddit

Facebook

Retweet

SlideShare


Ch_2

***** 20

Two of Five Chapters

Connected

Define Social Networking

Yahoo Buzz

Bebo

Apple

MobileMe

Feedburner

Behance

Share This

Google Buzz

Viddler

WordPress

Vimeo

Last.fm

Friendster

Bing

RSS

Squidoo

Xing

Tumblr

Gowalla

Blogger

Google Talk

Design Float

WordPress

Deviant Art

With the innovations of web based technologies, social media can be found everywhere on the web, changing the way human interacts. Therefore, the demands for social media icons are raised within the web comm unity especially for web designers who create commercial sites or themes.


Ch_2 Two of Five Chapters

***** 21

Connected

Define Social Networking

Types of Social Networks Hobbies: One of the most popular reasons many people use the Internet is to conduct research on their favorite projects or topics of interest related to personal hobbies. In most cases, when people find a website merely based on their favorite hobby, they also discover a community of people from around the world who share the same passion.

Professional Networks: These networks can help the user by enhancing their careers or industry. If they happen to be a field technician for a mobile phone company, they might even consider getting involved in their firm’s online community.

Information Communities: Are made up of people seeking answers to problems. An example is, when the user is looking for the best investment products to build for retirement, the user will perform a web research beforehand and then discover unlimited blogs, websites and even forums filled with people who are looking for the same kind of information.


Ch_2 Two of Five Chapters

Goal: Socializing

Online Communities

Goal: Career and business opportunities

Business Networks

Linked in Social Networkers communicate with other users using applications like blogs, chats and messages.

Goal: Soulmate

Online Matchmaking

***** 22

Connected

Define Social Networking

Goal: Get back in touch

Alumni Networks


Ch_2 Two of Five Chapters

***** 23

Connected

Define Social Networking

What is Social Networking? Social networking has gained immense popularity.

Networking applications can provide an amount of

With the current community spending a significant

medium for businesses to interact with their past

time at the workplace rather than the outside world, social networkers fullfill their basic needs for social interaction through computer mediated language. Those who participate in this are called nodes and the relationship of these key actors are ties.

or current and prospective employee and within the customers to advertise their product. This particular advertising medium has proved to be more effective than the word of mouth influence. Together with this, social networking sites also allow us to identity and connect with our present and past friends who we may have lost contact with. Networking sites

A social networking site comprises of nodes which are all tied by specific interdependencies, values, ideas, financial exchanges, friendships, kinships, conflicts and trade. The ties can be of any order, it can vary from the ties of a family holds among its family members or the trade ties between two organizations or perhaps between countries. There are three known types of social networks being, primary, secondary and tertiary. Social Network are open in nature and primarily used by the younger generation to search for friends and relationships, which in a way are informal in nature.

have often been used to promote blogs, or to post updates. It is because of its capacity to make life exciting has caught the attention of people.


Ch_2 Two of Five Chapters

Primary - includes friend circles, family members and relatives. Secondary - has a broader base and includes classmates, schoolmates and colleagues. Tertiary - has the widest range of contacts and includes strangers.

Tertiary

SECONDARY

PRIMARY

***** 24 Define Social Networking

Connected


Ch_2 Two of Five Chapters

***** 25

Connected

Define Social Networking

Advantages of Social Networking Needs to Connect: To connect is the most basic

Viral Nature: Social networks are viral in nature as

human need because socialing plays a vital part.

much affect is not required to build it.

Social networks helps people to socialize both in their interest group and with diverse people. This is

Connections: One person is friends with another

why social networks are so successful as they are

who have other friends. There is a lot of potential

a platform for the people with similar interest to

in such a situation. By using a social networking

interact without the restriction of boundaries.

website, a networker can get connected with these people to form a web full of connections. As long as

Needs to Share: It is a basic need to share either a

one gives as well as receives, connections work and

user’s opinion or expertise. Social networking sites

become valuable in the long run.

helps social networkers with their knowledge and expertise and is also very helpful for those who need that knowledge for various purposes. Identity: Social networking redefines the identity of a person in a social context manner, someone who belongs to a particular interest group which is a part of a social network represents a character of the person’s personality and then this becomes an integral part of the identity. Low Costs: It is usually cheap to use online social networking websites since most of them are usually free of charge. While personal use is rather simple and for anyone, its functions are underestimated.


Ch_2

***** 26

Connected

Define Social Networking

Two of Five Chapters

How Social Networks Work

1 Create and publicize your profile

4 Build your connection list

2 Manage your profile information

5 Join groups and accept invitations

3 Browse the connection graph

6 Communicate with your connections via messages, emails, blogs and chat


Ch_2 Two of Five Chapters

***** 27

Connected

Define Social Networking

Disadvantages of Social Networking Time Consuming: At many times social networking turns out to be time-consuming while not giving much in return and comes out less efficient. Not Always Productive: Social networking is used in order to gain knowledge and expertise but many times it becomes a platform for entertainent or fun and loses its original productivity. Target for Marketers: The networkers who belong to a social network create their social groups with similar type of needs and interests, it becomes a marketer’s easy choice or target. Undesirable Interactions: In social networking there are undesirable or social interactions which makes it boring and create fatigue. If one is interested in business social networking then different levels of social interaction might help. Lack of Anonymity: Sharing a full name, location, address, age, gender and other types of information maybe be an issue and put the user at risk.


Ch_2

***** 28

Connected

Define Social Networking

Two of Five Chapters

12 11 10 9 8 7 6 5 4 3 2 1

% 1

0

5

15

20

25

Data abuse pr data forwarding or lack of data protecting that state,

30

35

40

45

50

6

Stalking, harassment, becoming a crime victim (3%)

companies, or individuals (52%) companies, or individuals (52%)

7

Commercial selling of personal data (5%)

2

8

Data and identity thief (2%)

Private affairs become public and result in a lack of privacy (10%)

3

55

Personal profile data and images are accessed by employer, and resulting job related disadvantages as losing a (9%) job. (9%) resultin job related disadvantages such such as losing a job.

9

Defacing of profiles and data integrity (3%)

10

Internet addiction, increase of stress and health damages (1%)

4

11

Unrealistic, competition and exaggeration of self-representation (2%)

12

Friends can get a negative impression of me (1%)

5

Recieving advertisments or spam (5%)

Lack or loss of personal contacts, superficial communication improverishment of social relations. (7%) improverishment of social relations. (7%)


Ch_2 Two of Five Chapters

***** 29

Connected

Define Social Networking

Facebook Addiction Disorder Is there a thing as too much Facebook? Several experts

Facebook can show two faces to its community. The first

are say yes, since many people are spending an extreme

one is a fun, happy, pleasant, beautiful world that millions

amount of time on this site. Psychologists are exploring

of people around the world visit. It is especially appealing

ramifications Facebook has on the lives of people. The

to be in this type of fun, loving atmosphere when their real

amount of time spent is considered an addiction.

day-to-day lives are not well. People posting on Facebook present only the best of their lives and some have take

Doctors have named the social networking obsession as

liberties with describing how wonderful their lives are.

Facebook Addiction Disorder. Psychologist Dr. Michael Fence described the condition as a situation in which a

The second face of the social network is compulsive and

person’s Facebook usage time overtakes and interferes

voyeuristic in nature. Everyone wants to talk with you and

with daily activities such as sleeping, waking up, getting

send you gifts on Facebook. This website makes you feel

dressed, and is overly harmful to physical social activities.

very popular having hundreds of “friends” listed on your

Dr. Elias Aboujaoude, the director of Stanford’s Impulse

page. Everyone is interested and has a comment to make

Control Disorders Clinic, did a study and he noted that a

regarding what you are doing and saying. People who are

person’s drive to compulsively use the internet is similar to

on Facebook excessively each day may want to stop and

that of other impulse control disorders.

think about the amount of time that they are spending with “friends” that they will probably never meet in person.

It was characterized by the repetitive and irresistible urge

They should consider how that time could be better spent

to perform a pleasurable act that will lead to personal and

doing activities with their families and friends in person

professional problems and become otherwise intrusive in

rather than in front of a computer. Facebook, if used in

one’s life. While Facebook Addiction Disorder is not yet an

moderation, is an exciting site to visit to keep in contact

actual medical diagnosis, there are currently many studies

with old friends, family and to make new friends.

taking place and many therapists are noting a rise in their clients who are hooked to the point of social dysfunction.


Ch_2 Two of Five Chapters

175,000,000 USERS Log Into Facebook Per Day

***** 30 Define Social Networking

Connected


Ch_3 Three of Five Chapters

***** 31

Connected

Web Security and Privacy

>> Identity ThEFT IN SOCIAL NETWORKS 33 - 34 >> Anonymity in the Digital Era 35 - 36 >> PRIVACY SETtINGS IN FACEBOOK 37 - 38 >> Which Networking Sites Are Secure 39 - 40


Ch_3 Three of Five Chapters

***** 32 Web Security and Privacy

Connected


Ch_3 Three of Five Chapters

***** 33

Connected

Web Security and Privacy

Identity Theft in Social Networks What exactly is social networking identity theft? It is a form of cybers quatting using social media sites. If you have ever attempted to join a social networking website or tried to apply for an email and discovered that both your first or last name were already taken, may or may not have been social networking identity theft. In several cases, multiple individuals simply share the exact same name, but sometimes a cybersquatter wants to control your e-persona for various reasons. Either someone out there shares your exact name and happened to register first, or else somebody took your name so that you cannot have it, or wants to sell it back to you, or wants to pose as you in order to disrupt your life. The most damaging happens when an imposer wants to pose as you in order to disrupt your life. This disruption can take on several forms. They may harass and stalk you, or even to harass and stalk people that you know. They may steal your social media identity for financial gain. Thieves can use email accounts and other social medias to extract funds from others or open accounts.


Ch_3 Three of Five Chapters

44% of networkers said if they

discovered a social media provider did not adequately protect privacy or security, they would continue to use the social network site.

50% of social networkers aren’t

very confident and even sure that their networking website of contact list of friends only includes people they know and can trust.

***** 34

Connected

Web Security and Privacy

60% of social networkers users

are either not confident or unsure of their website’s provider’s ability to protect their identity.


Ch_3 Three of Five Chapters

***** 35

Connected

Web Security and Privacy

Anonymity in the Digital Era There is excessive trust in the social networking

manage. It is imperative to spend a few minutes

world today. People have entirely dropped their

and lock down your profiles so they can’t be seen

sense of cynicism when logged onto their sites.

by everyone in the world.

Apparently, the users see no reason to distrust. Generally, your list of friends are people who you

It is not unusual for an identity hackers to friend

know, like and trust. In the digital world, your

a potential victim especially when the thief poses

guard is as down as it will ever be. You can be

as somebody the target may know, or someone

in the safety of your own home or office, hanging

who is within the target’s social circle. Once the

with people from all over, in big cities and never

thief has been accepted as a friend, he or she is

feel that you have to watch your back.

in the target’s inner circle and gains a great deal of insight into the target’s daily life.

It is reported that one third of social networkers have at least three pieces of information posted on their pages that could lead to identity theft. Names, addresses, birth dates, mothers’ maiden names, kids’ names, pets’ names and also phone numbers are among the various types of data that could help a thief piece together your identity. Almost 80% of those polled are concerned about privacy issues on social networking, yet almost 60% are unaware of what their privacy settings are and who could visit their data. One third of social networkers admitted that they actually use the same password for all their social networking accounts. Almost all social networks have privacy settings that networking users never venture to


Ch_3 Three of Five Chapters

There is an excessive amount of trust in the networking world.

***** 36 Web Security and Privacy

Connected


Ch_3 Three of Five Chapters

***** 37

Connected

Web Security and Privacy

Privacy Settings in Facebook Facebook is distinctive among several other social

basic information and personal information. The

networking services sites in two ways pertinent

default privacy settings for a new user is that the

to personal privacy. Users are required to identify

entirety of this information is viewable by anyone

their accounts authentically through their system.

in their network. Their profile is also viewable by

According to its usage, Facebook networkers may

anyone who is friends with the user on Facebook.

not impersonate any person or entities, or falsely

While anyone who is not connected to that user

state and misrepresent yourself, your age or your

via network or friendship cannot view the user’s

affiliation with anyone else. Such bold statement

profile, by default they can still locate them using

means that the information users provide on their

a global search function as well as view a version

profiles is particularly very sensitive.

of the user’s profile consisting only of their display photo, name, and network affiliation.

Secondly, Facebook is organized around a system of networks that correspond to physical locations and

Facebook.com has always provided the options for

institutions. The site maintains countless college,

managing the precise level of access to particular

high schools, regional, and work networks across

groups of people and to particular sections of one’s

the globe. Membership in such networks, while not

profile, two settings are of particular interest. It is

required, is recommended by Facebook and allows

considered a profile to be private if either the user

the general location of users to be recognized.

has decided to change their default settings so that their profile is no longer accessible by others.

Networks determine the default level of ‘‘public’’ exposure afforded a new profile. When a new user is registered on Facebook, the user is provided with a blank profile template consisting of a number of pre-determined response categories. This include


Ch_3 Three of Five Chapters

***** 38 Web Security and Privacy

Connected


Ch_3 Three of Five Chapters

***** 39

Connected

Web Security and Privacy

Which Networking Sites are Secure? Excellent Good Fair Poor


Ch_3

***** 40

Three of Five Chapters

Connected

Web Security and Privacy

Facebook

Myspace

Bebo

Facebook has now allowed 13 year-old networkers

Myspace values privacy and in fact, it gives the

Bebo.com is the only networking site that defaults

to create their own profiles on the site, personalized

user complete control over their profile’s privacy

user’s profile to private. Setting must be manually

privacy settings give Facebook the name of one of

settings. The user can also limit who can access

changed to be public. The user can limit the ages

the most secure social networking websites on the

their page or block individual members. The user

of people they want contacting them by setting a

Internet. Facebook continues to make advances in

can also have the ability to report spam messages

minimum and maximum age. There is also a nifty

the customization of user profile settings, sharing

and account misuse. Myspace will remove profiles

link of a video on the user’s profile explaining the

photos and protecting the user’s information.

that lied about age to obtain membership.

safety concerns and privacy settings.

Twitter

Friendster

LinkedIn

Twitter must now establish the comprehensive

Friendster’s privacy settings allow your friends to

New security features LinkedIn provides includes

informational security program that is reasonably

view your full profile while a limited profile is still

the ability to view your profile as others will see it,

designed to protect the privacy, confidentiality and

accessible to other Friendster members. One plus

and make changes. Security setting are present,

integrity of non-public consumer information. This

to this social networking website is a direct link

however, identity hackers still hijack a new user’s

website has the best track record when it comes to

at the bottom of profile pages and a report abuse

LinkedIn profie by capturing cookies created and

caring about their user’s security.

button on group and profile pages.

then stored on their computers.


Ch_4 Four of Five Chapters

***** 41

Connected

Technology vs Communication

>> Technology Dependency 43 - 44 >> Computer Meditated Communication 45 - 46 >> Netspeak Internet Jargon 47 - 50 >> Impacts on Interpersonal Social Skills 51 - 52


Ch_4 Four of Five Chapters

***** 42 Technology vs Communication

Connected


Ch_4 Four of Five Chapters

***** 43

Connected

Technology vs Communication

Technology Dependency Technology could be traced all the way back from evolution of mankind. The early humans invented the usage of stone weapons which were essentially fractured rocks that would be used like a modern day axe. The discovery of fire, clothing and shelter were major technological advancements. Invention of the wheel later catapulted the advancements in transport and energy. The discovery of iron and the steel was a major revolution as well. This is the greatest creation of mankind’s and has been around since the beginning of time, from the stone wheel to the Internet and social networking sites. Many people think technology is encompassed in the computer and the Internet. However, the truth is that people uses technology in one way or another on a daily basis. Technology has become the foundation of people’s existence. In simple words, technology has become the lifeline of the individual user. In the current era of technology and information driven processes, it is easy to witness how interpersonal communication has become entwined with social networking sites.


Ch_4 Four of Five Chapters

***** 44

Connected

Technology vs Communication

The Never Ending Cycle of Technology DVD player

Wireless Router

Laptop

Clothes Dryer

Stereo

Freezer

Standard TV

Air Conditioner

Cooking Range

Ceiling Fan

Door Bell

Water Heater


Ch_4 Four of Five Chapters

***** 45

Connected

Technology vs Communication

Computer Meditated Language While people participate together in virtual online

Computer Mediated Communication is defined as

communication they assess how much they feel

any communicative transaction that occurs through

that they are present in a physical setting. Social presence theory states that CMC creates a sense of intimacy or we are together feeling through an emoticon system. C MC is the best choice to resolve uncertainty in a virtual communication. There are misconceptions that CMC as a method of computer communication lacks the ability to convey one’s emotions, feelings and expressions in the same way face to face communication can. During a person to person talk, one heavily rely on non-verbal signals to complement. To add this diminution to the computer meditated language, typography cues using the keyboard are used to convey a variety of expressions and emotions.

the usage of two or more networking computers. This term have been used traditionally regarding to communications that occur through computer mediated formats such as instant text messages, e-mails and chat rooms. CMC has also been applied to other forms of text based interactions.


Ch_4

***** 46

Four of Five Chapters

Connected

Technology vs Communication

Common Text Emoticons

O:) Angelic

:’(

:-V

:[

Crying

Shouting

:D

;)

:(

>:[

:-S

:<

:-&

:-6

:O

:-\

Laughing

Discontent

:) Happy

Winking

Incoherent

Exhausted

Sad

Depressed

Surprised

Really Down

:# Sealed

Tonguetied

Undecided


Ch_4 Four of Five Chapters

***** 47

Connected

Technology vs Communication

Netspeak Internet Jargon Internet and social networking media continue to

This has very interesting implications for linguists

play a role in overhauling on the English language.

and for those who are studying the evolution of

Slang jargons have gained more popularity among

Internet based communication. Regional dialect

English speakers and network users. In this year,

have been existing for centuries, but text-based

several web related words had been added into

dialects seem to be something new. If Twitter is

Oxford Dictionaries included OMG, LOL, TTYL, WTH

influencing the language, this will affect the use of

and several others. Beginning the month of June

the restricted space of 140-characters.

2011, more vocabularies that were influenced by social networking were added into the dictionary. The newest study revealed that regional slang is alive and as well, on Twitter.com. Certain dialects have distinctive slang, for example, the Southern “y’all” which researchers have shown is used on Twitter as well as in everyday conversation. Spoken slang such as Pittsburgh’s yinz and the Southern’s y’all have moved from spoken word to tweets. Perhaps more interesting is the fact that regions are now developing their own Twitter based (i.e. not spoken but only typed) dialects. “Koo” is a Northern Californian Twitter dialect, for instance, while “Coo” is very specific to Southern California. The commonly used LOL is taken by Washington DC’ers. Researchers say that the different dialects appearing on Twitter are influenced by both the 140-character mlimit as well as regional dialects.


Ch_4 Four of Five Chapters

KOO

Northern Californian Dialect

COO

Southern Californian Dialect

Regions are developing their own Twitter-based (not spoken but only typed) dialects. “Koo” is a Northern Californian Twitter dialect, for instance, while “Coo” is specific to Southern California.

***** 48 Technology vs Communication

Connected


Ch_4 Four of Five Chapters

***** 49

Connected

Technology vs Communication

Twitter Jargon

PLZ

CYA

IMHO

BTW

G2G

BTW

ASAP

L8R

LMK

OMW

KK Okay

Thanks

NE1

SUP

W/E

HTH

Please

Got To Go

Let Me Know

Anyone

See You Again

By The Way

On My Way

What’s Up

In my Honest Opinion

As Soon As Possible

Whatever

By The Way

Later

TNX

Hope That Helps


Ch_4 Four of Five Chapters

***** 50

Connected

Technology vs Communication

OMG

TC Take Care

Talk To You Later

TTYL

LOL

SRY

WTH

SRSLY

NP

WB

IDK

NTH

NMD

JK

UR

LMAO

RUOK

Oh My God

Sorry

Welcome Back

Just Kidding

What The Hell

I Don’t Know

Your

Seriously

Nothing

Laugh my Ass Off

Laugh Out Loud

No Problem

Nevermind

Are You Okay


Ch_4 Four of Five Chapters

***** 51

Connected

Technology vs Communication

Impacts on Interpersonal Social Skills With this development of technology over time,

Interpersonal communication is very diminishing in

communication has become one aspect which has

many ways. Networking’s impact on interpersonal

been evolved immensely. Communicating today is

communication is multi-faceted, and should be

very different than what we used to do in earlier

tempered with the benefits of technology. Now

days. And it is going to be even more different in all

the question is why interpersonal or even human

the days to come. Among communication mediums

communication is this significant. The simplest

or interpersonal communication is the one which

answer is because we are all human and when we

has been influenced directly with the application of

interact with each other in person; it is way more

technology on our current life.

effective than doing non face-to-face methods.

Human communication simply refers to the act of exchanging messages between two or even more persons. More precisely, it could be said human communication is the face to face communication, like two or more people talking, interacting. Human communication is also an essential part of daily interaction. Benefits of communication are obvious as they enhance aspects of our social lives. Social Networking has influence on interpersonal communication and this also changes the rules social interaction. People fear losing one critical element in communication, the human element. Technologies such as Social Networks often offers quick communication, and making it fairly easy with a large group of people.


Ch_4 Four of Five Chapters

***** 52

Connected

Technology vs Communication

Effectiveness of Communication

Most Effective Communication

Video Conference

Face to Face

2

1

Least Effective Communication

Telephone

3

Written Notes

4


Ch_5 Five of Five Chapters

***** 53

Connected

The Future of Networking

>> FUTURE OF Web And SOCIAL NETWORKS 55 - 56 >> THe Next big Social network: Gowalla 57 - 58 >> Future TRENDS OF MOBILE NETWORKING 59 - 60 >> A TRANSPARENT SOCIETY 61 - 62 >> Glossary 63 - 64


Ch_5 Five of Five Chapters

***** 54 The Future of Networking

Connected


Ch_5 Five of Five Chapters

***** 55

Connected

The Future of Networking

Future of Web and Social Networks According to a recent study, 47 percent of adults

personal photos. “It changed things,” he said. “It

own a social network site. Few technologies have

was one simple thing. Now you have this new way

grown as fast and had such an immediate impact on

to look at your life.” Facebook hosts more than 15

our culture, communication and even commerce.

billion photos now. Recordon noted how Facebook

This panel assessed the near future and considered

and other social networks are influencing politics

the next 53 percent, or what happens when social

as well. “It has a large impact on elections all over

networking may become ubiquitous. This examined

the world,” he said. “The key point there is that

some of the challenges faced by individuals and

the human neocortex might exist so we can track

organizations as networking tools expands.

who’s my friend and whos not.

Users need a new cultural toolkit to deal with the

That kind of reciprocal social status management

realities ahead as more people spend more time in

is at the heart of social groups. It’s a core human

social networks. Now there are serious implications

feature. We have all this cognitive capacity, but

to moving your sociality from a medium like this,

that cognitive capacity is a secondary artifact to

talking face-to-face in person, which has laws of

the fact that we need to keep track of our social

physics, that we have a cultural toolkit for. It is

environment very exclusively. What the Internet

usually considered as, space confines who can see

has done is make social networks and all of the

you and time makes your speech ephemeral.

sociality that goes into everyday life visible.

On the internet sene, space collapses and it’s not

It is predicted that in the future people will not

considered ephemeral. It is there and we do not

simply build their identity into a place like Facebook,

yet have the cultural toolkit to deal with socializing

but instead they would also be able to maintain a

like this in such environment. The unpredictability

personally homebase similar to a blog as their own

of the social Internet were discussed by panelists.

identity. Two hottest technologies online, Twitter

You never know how people will adopt and adapt a

and Facebook, are the fastest and integrating real

tool when it is offered to them. Dave Recordon of

time delivery of activity streams. At the moment,

Facebook offered that nobody would have guessed

Ambiance, Automation and Emergence are three

that people would go overboard by sharing all their

forms of value emerging from the Real Time Web.


Ch_5 Five of Five Chapters

***** 56

Connected

The Future of Networking

The Real Time Web Ambiance: The Internet is made up of web pages

Real-time is a set of technologies and practices that

linked together, but hovering around many of those

enable web users to receive information as soon as

pages are now social media signals like blog posts,

it is published by its authors, rather than requiring

bookmarks, tweets and other URL links that refer

them or their software check a source periodically

to a page but aren’t visible when you’re looking at it. Most of us use Google to find pages about things we’re looking for, but Google prioritizes historical inbound links and the text on pages.

for updates. This is fundamentally different from real-time computing since there is no knowing when, or really if, a response will be received. The information types transmitted this way are often short messages, status updates, news alerts, or links to longer documents. The content is often soft

Automation: We probably should have started out with this, but what’s the most obviously valuable example of value in real-time information delivery in recent internet history? Blackberry and the push email. We tend to assume that the real time web is something we’ll be looking at constantly, because it’s constantly bringing new information. The real time web could very well just do its thing and notify us, in real time, of important events. Emergence: One of the things that will be good to automate is the emergence of topics. Tweetmeme, a groundbreaking new service, other than Twitter, has already been talked about enough to have more than 220k results appear in a Google search.

in that meaning it is based on the social web.


Ch_5 Five of Five Chapters

***** 57

Connected

The Future of Networking

The Next Big Social Network: Gowalla Twitter is currently labeled as a microblogging

dedicated applications available on Google Android,

the geographical position of the mobile device and

service site with an estimate of 114 million users,

iPhone, Palm Web OS and BlackBerry. Checkins can

can be used in a variety of contexts, few examples

which is, despite of its huge user base, only a tiny

be pushed through Notifications to iPhones, and by

are health, object search, social entertainment,

part of the web blog trend currently sweeping the

linking accounts, to Twitter and Facebook. Users

work and also personal life.

internet, and only seems to get bigger each day.

will create “Trips”, which links up to 20 related

However, due to the ever expanding domain that

spots, falling into categories such as Nature Hikes

is the internet despite Twitter and Facebook both

or Pub Crawls. Spots and Trips can be “featured” by

only being a few years old, neither are considered

Gowalla, and with this comes a special status and

news or remarkable anymore.

icon, along with being highlighted on the website.

The hype they once had a few years back is now

Featured spots tend to be local landmarks such as

since long gone. So what the trendsetters of today

Buckingham Palace in London, while featured Trips

are asking themselves is: Who will be the next

are chosen for being unique and exciting. Checking

Twitter or Facebook? What will be the next hype

in, users may receive virtual “Items” as a bonus

which will take the internet and its users by storm?

and these can be swapped or dropped at Spots.

Some people claim that the next social networking

Users become “Founders” of a spot by dropping an

trend to rampage the ‘internets’ will be all location

item there. Items form a key feature within the

based social networking.

game and each user has a vault into which they can place items they want to keep.

Meet Gowalla, a location based social networking service which won the Mobile category interactive

Upon first glance location based services, such as

award in the 2010 South by Southwest festival

Gowalla might seem like a interactive version of

in Austin, Texas US. Gowalla is a primarily mobile

a scavenger hunt, but there is so much more. A

web application that allows users to check in to

location-based service is either an information or

locations that they visit using their mobile device.

entertainment services, all made accessible with

This is achieved either through the usage of the

mobile devices utilizing the ability to make use of


Ch_5 Five of Five Chapters

***** 58 The Future of Networking

Gowalla can include services to identify a location

Gowalla is a mobile web application that allows users

of a person or even objects, such as discovering

to check in to locations that they visit through their

the nearest cash machine or whereabouts of a

mobile devices. This step could be achieved either

friend or employees. It could also include parcel

by the usage of dedicated applications available on

tracking and vehicle tracking services. It can also include mobile commerce when taking the form of coupons or advertising directed at customers. This application will also include personalized weather services and location-based games for entertainment. The possibilities for Gowalla and its relatives are endless and many believes that this kind of service will be the next thing to hit the internet. But all is not well in the kingdom of location based networking. Many people have been quick to point out some of the shortcomings that might stop the likes of Gowalla in its tracks, and hinder its prophecy of domination on the software mobile device market right now. What is certain is that this app has potential and that it’s something new and worth the time being updated on. Promoters of location based network suggests that once technology and user base has reached a certain level then services like Gowalla has the same potential to explode and become the next big hit in the universe of Networking, question is if it has what it takes to be the next big hit.

the Android, iPhone, Palm and BlackBerry. There is currently no way of checking in through the standard website, only through mobile devices.

Connected


Ch_5 Five of Five Chapters

***** 59

Connected

The Future of Networking

Future Trends of Mobile Networking The explosive growth of mobile devices further

It is very possible that the next generation mobile

enhanced the global interpersonal communication.

devices can store large volume of data and can

As mobile phones today become more powerful,

establish high speed internet connections on web.

technology experts are seeing significant shifts on

These technology updates will pave the way for

how people will acutally use their devices in the

full integration of web services, social networking,

future. So here are some of the most important

mobile communication and traditional media. These

evolving trends on mobile social networking and

new features are now present in most high end

communication. Predictions of the mobile network

mobile devices. Next step is the popularization of

is that as the next generation of devices will

the technology so it can be enjoyed by all users.

democratize the utilization of mobile email. The potential benefits of Mobile Broadband are Today, only high end mobile phone users can

far more than just bandwidth. In the future, it

effectively utilize mobile emails. But now with more

will be possible for everyone to access, and share

carriers offering highly integrated devices, more and

information and engage in social gaming activities

more people will be able to enjoy fast and reliable

in a mobile networked world through any terminal,

mobile email and mobile social networking.

at any time, from any location.

Although services on demand are now already

Despite the industry’s expectations, the evolution

integrated on mobile devices, the scope and quality

of MobileBroad band is influenced by irregular

of available services are fairly limited. Following the

development in four following areas: services and

current increasing sophistication of mobile devices

applications, terminals, the price, and networks.

and continued build up of data transfer capability,

With the convergence of the industry, services

mobile service on the demand can become a high

and applications, terminals, and pricing have, over

point of future mobile networking. Finally, future

recent years, reached optimum conditions and also

mobile devices could become technology appliance

achieved revolutionary breakthroughs.

which can be on all aspects of mobile computing.


Ch_5 Five of Five Chapters

Mobile Social Networking Gains Traction Younger consumers are the most likely to particupate in social networking via mobile - 66% of mobile social networkers are under 35 years of age. Facebook is the most popular social networking site accesssed via a mobile - 92% of mobile social networkers visit Facebook. Twitter sees the most frequent mobile usage, with half of its mobile users visiting the site daily.

MAC / PC Social Networking Users Mobile Social Networking Users

***** 60 The Future of Networking

Connected


Ch_5 Five of Five Chapters

***** 61

Connected

The Future of Networking

A Transparent Society The future of social network has implanted the idea of wearing a gestural interface that augments the physical world with digital information and lets users use natural hand gestures to interact with that information. In other words, having a mirror, pocket projector, camera and a cellphone connected to website on your person, would allow the world around us to become like a computer displaying certain information and also perform several particular tasks on request. Making a viewing box just using your fingers and thumbs, for example, would take a photograph in a sixth sense world. Such developments have been in progress since the beginning of this year. However, these have also been met with serious debates over people’s personal privacy and raised more than just a few concerns. It is still difficult to say or predict if and how when such technology will ever enter society and become a major part of user’s daily lives. Nevertheless, several concept ideas are emerging to give us an idea of what such technology may be like.


Ch_5

***** 62

Five of Five Chapters

Connected

The Future of Networking

Face Recognition: Imagine holding up your phone

Databases and Directories: Discover who lives

Goodbye to Privacy: Privacy is already an issue

or other digital device against a person you’ve just

where and how you are connected; then phone

of concern, now and for our digital future, says

met or passed by. You’d instantly have information

them, e-mail them, add them to your network right

Buckland. We’re still working out the ethical and

returned about that person within seconds, gleaned

then and there. Get other news about the suburb

moral framework. We may even see a backlash

from an automa­tic web, public profile and social

and other socio economic information. You’d be able

from society angry at this intrusion. It may, end

network search. You’d discover common friends,

to hold up your phone in a crowded room and work

up being okay because you will be in control, you

talking points and then have the ability to add

out who is connected to whom. You could instantly

could refuse access to SN or don’t tweet. But there

them to your network. By a semantic scan, you’d

gauge your primary and secondary networks and

will be information about you that you won’t be

discover negative or positive comments on Google

instantly know who you should chat to, what the

able to control too. There’ll be inevitable abuse and

or elsewhere relating to this individual.

conversation are, and what to avoid.

misuse of the information, which will hopefully be manageable in the near future.


Ch_5

***** 63

Five of Five Chapters

Connected

Glossary

Glossary B

Bulletin Board System: Also known as BBS, a computer system running software that allows users to connect and log in to the system using

I

Identity Theft: The fraudulent acquisition and the use of a person’s private identifying information, usually for financial gain.

a terminal program. A user can perform functions such as upload, downloading software and reading bulletins.

Intergalactic Network: The first conception of what eventually become the current Internet. J.C.R. Licklider coined the term in 1963.

C

CompuServe: First online service to offer Internet connectivity, albeit limited access, as early as 1989 when it connected its proprietary e-mail to allow incoming and outgoing messages.

M

Microblogging: A broad-casting medium in the form of blogging. A microblog is different from a traditional blog in that its content is typically smaller in both actual and aggregate file size. Microblogs allow users to exchange elements of content such as short sentences,

Common Text Emoticons: An emoticon is a short sequence of

individual images, or video links.

keyboard letters and symbols, usually emulating a facial expression, that complements a text message.

Mobile Application: Mobile applications, known as an application or called an “app�, is a computer software designed to help the user to

Cybersquatting: Known as domain squatting, is registering, trafficking

perform singular or multiple related specific tasks.

in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.

N H

Networks: In information technology, a network is a series of points or nodes interconnected by communication paths.

Hardware: Hardware is a general term for the physical artifacts of a technology. It also mean the physical components of a computer

Node: A node can be any device connected to a computer network. On

system, in the form of computer hardware.

an IP network, a node is any device with an IP address.


Ch_5 Five of Five Chapters

R

Real-Time Web: The real-time web is a set of technologies and practices that enable social network users to receive information or updates as soon as it is published by its authors.

S

Secondary Network: This network includes the broader base range, as classmates, schoolmates and colleagues. Servers: A server is a software framework that is dedicated to the execution of procedure types such as, programs, routines, scripts or supporting the construction of applications. Socia Media Icons: Every website has one thing in common, presence of Social Media Icons and Buttons. Eye catchy social media icons will surely draw more attention from the website and visitors will feel the urge by clicking on these icons. Software: Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it.

T

Tertiary Network: This network connection contains the widest range

V

Virtual: The term has been defined in philosophy as that which is not

of contacts and including strangers.

real but may display the salient qualities of the real.

***** 64 Glossary

Connected



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.