CONNECTED: SOCIAL NETWORKING
CONNECTED: SOCIAL NETWORKING
Copyright No part of this book may be reproduced in any form without written permission of the copyright owner. All images and illustrations in this book have been reproduced with the knowledge and prior consent of the designer’s concern, an no responsibility is accepted by producer, publisher, or printer for any infringement of copyright. Every effort has been made to ensure that the credits accurately comply with the information supplied. Book Design copyright Š 2011 by Amber Tu for course GR_330_OL2, Typography 4, taught by Jeremy Stout in Summer 2011 at the Academy of Art University, CA. All rights reserved.
Dedicated to Social Network Users
TABLE OF CONTENTS 1
History of Social Networking
2
Define Social Networking
3
Web Security and Privacy
4
Technology vs Communication
5
The Future of Networking
>> Chapter One Opener 01 - 02,
>> Start of Social Networking 03 - 06, >> BBS, AOL and CompuServe: Infant Years
07 - 08, >> Internet Boom: Networking’s Adolescence 09 - 10, >> LinkedIn, MySpace and Facebook 11 - 12, >> Profits from User Generated Content 13 - 14
>> Chapter Two Opener 15 - 16,
>> A Global phenomenom 17 - 20, >> types of social networks 21 - 24, >> Advantages
of social networks 25 - 26, >> Disdvantages of social networks 27 - 28, >> facebook addiction disorder 29 - 30
>> Chapter Three Opener 31 - 32,
>> Identity Theft in Social Networks 33 - 34, >> Anonymity in the Digital Era 35 - 36,
>> Privacy Settings in Facebook 37 - 38, >> Which Networking Sites Are Secure 39 - 40
>> Chapter Four Opener 41 - 42,
>> Technology Dependency 43 - 44, >> Computer Meditated Communication 45 - 46,
>> Netspeak Internet Jargon 47 - 50, >> Impacts on Interpersonal Social Skills 51 - 52
>> Chapter Five Opener 53 - 54,
>> Future of Web and Social Networks 55 - 56, >> The Next Big Social Network:
Gowalla 57 - 58, >> Future Trends of Mobile Networking 59 - 60, >> A Transparent Society 61 - 62, >> Glossary 63 - 64
Ch_1 One of Five Chapters
***** 01
Connected
History of Social Networking
>> START OF SOCIAL NETWORKing 03 - 06 >> BBS, AOL and CompuServe: Infant Years 07 - 08 >> Internet Boom: Networking’s Adolescence 09 - 10 >> LinkedIn, MySpace and Facebook 11 - 12 >> Profits from User Generated Content 13 - 14
Ch_1 One of Five Chapters
***** 02 History of Social Networking
Connected
Ch_1 One of Five Chapters
***** 03
Connected
History of Social Networking
Start of Social Networks Being connected to the world has never been easy and accessible than it is today. After the Internet made it possible to contact people around the globe with a click of a button, Social Networking exploded into one of the biggest industries of our time.
The Internet was created in...
1957
Ch_1
***** 04
One of Five Chapters
1971
The first email is sent. The two computers were sitting right next to each other.
1994
Connected
History of Social Networking
One of the web’s first social networking websites, Geocities is founded, the concept was for users to create their own websites and it was categorized by one of the unique six cities.
1978
BBS (Bulletin Board System) exchanged data over
1978
The first copies of web browsers were distributed
phone lines with other users.
through Usenet, an early online bulletin board, the birthplace of flame wars and trolling.
1995
TheGlobe.com gave Internet users the freedom to
1997
AOL Instant Messenger is launched to the public,
personalize their experiences via interacting with others with similar interests and hobbies.
popularizing instant messaging.
Ch_1 One of Five Chapters
1997
***** 05
Connected
History of Social Networking
SixDegrees.com is launched, allowing the step to profile creation and listing friends.
2004
Facebook.com is launched, originally to connect U.S college students, first launched at Harvard College. More than half of the 19,500 students signed up within the first month.
2002
Friendster.com is launched, pioneering the online connection of real world friends. Its user based grows to 3.0 million users in the first three months,
2006
which is around 1 in every 126 internet users who
Twitter.com is created. At the closing of the 2010 Japan vs Denmark world cup soccer game, it was noted that Twitter users published 3,283 tweets per second as a top record.
owned a Friendster account at the time.
2003
Myspace.com is launched at first as a Friendster clone created by an internet marketing firm and the first version was hastily coded in 10 days.
2008
Facebook finally takeover Myspace as the leading networking website. Both social network sites are vastly more popular than Friendster.
Ch_1 One of Five Chapters
***** 06
Connected
History of Social Networking
2010 Social Networks Compared by Users (in Millions)
750
Friendster found its success in Asia, where the site currently finds 90% of its traffic.
460
305 180
Ch_1 One of Five Chapters
***** 07
Connected
History of Social Networking
BBS, AOL and CompuServe: Infant Years It all started with the BBS. Short for Bulletin Board
worldwide computer social networks that managed
Yahoo had just set up shop, Amazon had just begun
System, the online meeting places were effectively
to survive the Internet revolution. There were also
selling books, and the race to have a computer in
produced hunks of code that allowed web users to
other avenues for social network interaction long
every household was on. During 1995, the site that
communicate through a central system where they
before the Internet exploded onto the mainstream.
have been the first to fulfill the modern definition of
could download files or games which several times
Social Networking scene was born.
included pirated software and leave messages to
One option was CompuServe, which was a service
several other users. The system could be accessed
that began life in the 1970’s as a business oriented
over telephone lines via a modem, BBSes were ran
main frame computer communication solution, and
and monitered by hobbyist, those who help nurtured
expanded itself into the public domain during the
the social aspects and interest specific nature of
late 1980’s. CompuServe even allowed its members
their projects, more often than not in the early days
to share files, access news and other events.
of computers, was all technology related. Not only could an internet web user send a message Moreover, long distance call rates usually applied
to their contacts through a newfangled technology
for those who were out of town, so many Bulletin
called the E-mail, users could also join any of the
Boards were locals only affairs that in turn spurred
CompuServe’s discussion forums with thousands
local in person gatherings. And voila, just like that,
of other members on virtually unlimited important
suddenly those who were anti-social had become
subjects of that day. Those forums had proved to
social. The bulletin system was not a joke. Though
be tremendously popular and paved the way for the
the technology of the time restricted the flexibility
modern iterations we have today.
of these systems, the end user’s experience, to text only exchanges of data that went along at a
In several ways, and for many people, AOL was the
glacial speed, BBSes continued to gain popularity
first Internet before the Internet, and its members
throughout the 1980’s and into the 1990’s, when
created their communities, were all arguably the
the Internet truly kicked into gear. Indeed, some
web service’s fascinating, forward thinking features.
Internet services, such as Tom Jennings’s FidoNet
There were no stopping the real Internet, and by
which helped link numerous BBSes together to the
the mid 1990’s, Internet was moving at full speed.
Ch_1 One of Five Chapters
1962 J.C.R Licklider (1915-1990) introduced the Intergalactic Network. His main idea involved a global computer network that allowed people to gain access to information from anywhere in the world. He had become head of the Defense Advanced Research Project Agency, convincing the importance of the Internet.
***** 08 History of Social Networking
Connected
Ch_1 One of Five Chapters
***** 09
Connected
History of Social Networking
The Internet Boom: Social Networking’s Adolescence Although being different from the current social
into a loose association of computer web users and
networking websites in that it asks not, who could
complaints of spam-filled members. SixDegrees
I connect with? but rather, who could I reconnect
folded just after the turn of the millennium. Other
with that was once a schoolmate of mine? The
websites of the era opted solely for niche, especially
networking social site, Classmates.com had proved
for demographic driven markets.
immediately that including the idea of a virtual reunion was going to be a good one.
A product of Community Connect Inc., which itself was founded just one year prior in the New York
Early website users could not create profiles, but
apartment of former investment banker and future
they could locate long lost grade school friends,
Community Connect CEO Ben Sun, AsianAvenue.
menacing school bullies and maybe even that prom
com was launched in 1999 by BlackPlanet.com,
date they just couldn’t forget. It was a hit almost
and in 2000 by the Hispanic-oriented MiGente.
immediately, and still even today the service boasts
com. All three sites have survived to this very day,
some 40 million user accounts. That same level of
with BlackPlanet.com in particular is enjoying its
success can’t be said for SixDegrees.com.
success throughout its long run.
Sporting a name based on this theory somewhat associated with actor Kevin Bacon that no person can be separated by more than six degrees from another, the website sprung up in 1997 and was one of the very first to allow its users to create profiles, invite friends, organize groups and browse at other user’s profiles. The founders worked the six degrees angle hard by encouraging members to bring more people into the fold. Unfortunately, this encouragement ultimately became a bit too pushy for several, and the site slowly de-evolved
Ch_1 One of Five Chapters
***** 10
Connected
History of Social Networking
Launch Year of Major Social Network Sites 1997
1999
2000
2001
2002
Six Degrees.com
LiveJournal.com
LunarStorm.com
Cyworld.com
Fotolog.com
Asian Avenue.com
MGents.com
Ryze.com
Friendster.com Skyblog.com
Black Planet.com
2003
2004
2005
2006
MySpace.com
Orkut.com
YouTube.com
Facebook.com
Couchsurfing.com
Dogster.com
Bebo.com
Windows Live Spaces
Hi5.com
Flickr.com
Yahoo! 360.com
Twitter.com
LinkedIn.com
Mutiply.com
Xanga.com
MyChurch.com
Tribe.net
Catster.com
Ning.com
Last.FM.
Hyves.com
Ch_1 One of Five Chapters
***** 11
Connected
History of Social Networking
Friendster, LinkedIn, MySpace and Facebook In 2002, social networking really hit its stride
In fact, LinkedIn contacts are actually referred to as
during the creation of Friendster.com. Friendster
connections. Today, LinkedIn currently boasts more
used a degree of separation concept all similar to
than 75 million member profiles. More than tripling
that of SixDegrees.com, refined it into a routine
LinkedIn’s figures, according to recent estimates,
and dubbed it the Circle of Friends, where in the
is MySpace, launched in 2003.
pathways connecting people were displayed and promoted the idea that a rich online community
MySpace is no longer residing upon that social
can exist only between persons who truly have
networking throne in several of English speaking
common bonds. And it ensured there were plenty
countries since that honor now belongs to Facebook
of new ways to discover those bonds.
in Canada and UK. MySpace somewhat remains the perennial favorite in the USA. The site does so
An interface that shared the exact traits one
by tempting the key of young adult demographic
would find at any online dating website certainly
with entertainment, music video and a funky, self
didn’t seem to hurt. And, in just a year after its
customize, fun, feature filled environment.
launch, Friendster also boasted more than three million registered users with a ton of investment
It looked and felt hipper than major competitor
interest. Though the service has since seen more
Friendster right from the start, and it conducted a
than its share of technical issues, or questionable
campaign of sorts in the early days to show how
management decisions, and with resulting drops
alienated it is, however, it is now the ubiquitous
in its North American fortunes, however it remains
Facebook that leads the global social networking
a force in Asia. Introduced just one year later in
pack. Like many networking websites, by university
2003, LinkedIn decided to take a more serious,
students who initially peddled their products to
sober approach to the overall social networking
other students, Facebook was launched in 2004 as
phenomenon. Rather than being a mere playground
a Harvard only exercise and remained a campus
for classmates and teenagers, LinkedIn was, and
oriented site for two full years before finally opening
still is, a networking resource for business people
the social neworking site to the public in 2006.
who wants to connect with other professionals.
Ch_1 One of Five Chapters
33% Facebook
67% Other Sites
2009
***** 12
Connected
History of Social Networking
44% Facebook
Facebook grew by 1/3 from 2009 to 2010
57% Other Sites
2010
Ch_1 One of Five Chapters
***** 13
Connected
History of Social Networking
Profits from User Generated Content Social networking led to a proliferation in user
their own domain. It’s clear that social networking
generated content, allowing users to become mini
has led to a proliferation in user generated content,
content producers. Users take photos and videos
thus allowing neworking users to become mini
that they upload to other sites to share with their
content producers. Users take photos and upload to
friends. What hasn’t been clear however, is just
other sites to share with their friends. What hasn’t
how much these sites are making from the content
been clear is just how much these sites are making
users willingly upload. Facebook comes out on top,
from the content users willingly upload.
having made a huge 1.86 billion in 2010. This will come in the form of advertising, as every piece of
Facebook comes out on top, having made a huge
content user create is basically another page on the
1.86 billion in 2010. This will come in the form of
site which leads to more ads being placed, more
advertising, as every piece of content user create is
impressions for the advertiser and more clicks.
another page on the site which leads to more ads being placed, more impressions for the advertiser
All that content users are producing all translates
and more clicks. All that content Faceook users are
directly into the revenue figures for the top five
producing translates directly into revenue figures
social networks. What networkers are relinquishing
for the top five social networks.
through ownership of their own content of course, is the reach users get through the social platforms.
What users are relinquishing through ownership
Networks invest in building the infrastructure to
of their own content of course, is the reach they
facilitate sharing amongst communities and users
get through the social platforms. Networks invest
create the content that keeps it going, that keeps
in building the infrastructure to facilitate sharing
communities growing and gets people talking. The
and networking users create the content that runs
problem of course is that many people don’t realize
it and keeps the communities growing.
how much direct revenue they’re generating for sites when networkers do this. More people turn towards social networks to distribute their content, away from blogging, where the content is within
Ch_1 One of Five Chapters
***** 14
Connected
History of Social Networking
Estimated Revenue For Each Site (2010) Facebook YouTube MySpace LinkedIn Twitter
45
MILLION
243 MILLION
288 MILLION
945 MILLION
1.860 BILLION
Ch_2 Two of Five Chapters
***** 15
Connected
Define Social Networking
>> A Global phenomenom 17 - 20 >> types of social networks 21 - 24 >> advantages of social networks 25 - 26 >> Disdvantages of social networks 27 - 28 >> facebook addiction disorder 29 - 30
Ch_2 Two of Five Chapters
***** 16 Define Social Networking
Connected
Ch_2 Two of Five Chapters
***** 17
Connected
Define Social Networking
A Global Phenomenon To the average networker, a Social Network is an application that resides within their desktop or browser. It consists of a login page, an account, a profile, and games. There are a very sophisticated hardware and software that must constantly run in order to enable these applications to function properly. Several program apps, such as Twitter’s messaging-client, are installed programs on the user’s computer, called client-based applications. In the world of computer interactions, there are two different types of that we refer to, a client and a server. User’s computers are the clients and the computers that deliver application to the users are the servers. The servers collect information from all users of application. Based on the user preferences and social connections within the application, the server will share the information with other client end users. The application server will receive and store photos, for instance, and then based on the permission granted by a networker who uploaded, grant access to several other users.
Social Networking is an experience of exploration. To wander into this digital realm, is to embark on a journey leading to the unknown. There are countless, possible routes explorers can take, paths that lead to discoveries, streams that flow with consciousness and crossroads where others await. It’s the experience that counts. And the destination, is the surprise...
Ch_2
***** 18
Connected
Define Social Networking
Two of Five Chapters
Countries with the Highest Numbers of Internet Users (In Millions)
26.2
239.9
CANADA
51.4
43.6
RUSSIA UK
USA
420.0
cHINA
20.3
AFRICA
29.7
PHILIPPINES
75.9
Brazil
AUSTRALIA
30.6
Ch_2 Two of Five Chapters
***** 19
Connected
Define Social Networking
How many Networks do You Belong to?
Delicious
Foursquare
Corotflot
Ember App
Hyves
Identi.ca
Mixx
W3
Blip
Smugmug
Photobucket
Slash Dot
YouTube
Scribd
Github
Soundcloud
Gdgt
Gowalla
Retweet
SlideShare
Ch_2
***** 20
Two of Five Chapters
Connected
Define Social Networking
Yahoo Buzz
Bebo
Apple
MobileMe
Feedburner
Behance
Share This
Google Buzz
Viddler
WordPress
Vimeo
Last.fm
Friendster
Bing
RSS
Squidoo
Tumblr
Gowalla
Blogger
Google Talk
Design Float
WordPress
Deviant Art
With the innovations of web based technologies, social media can be found everywhere on the web, changing the way human interacts. Therefore, the demands for social media icons are raised within the web comm unity especially for web designers who create commercial sites or themes.
Ch_2 Two of Five Chapters
***** 21
Connected
Define Social Networking
Types of Social Networks Hobbies: One of the most popular reasons many people use the Internet is to conduct research on their favorite projects or topics of interest related to personal hobbies. In most cases, when people find a website merely based on their favorite hobby, they also discover a community of people from around the world who share the same passion.
Professional Networks: These networks can help the user by enhancing their careers or industry. If they happen to be a field technician for a mobile phone company, they might even consider getting involved in their firm’s online community.
Information Communities: Are made up of people seeking answers to problems. An example is, when the user is looking for the best investment products to build for retirement, the user will perform a web research beforehand and then discover unlimited blogs, websites and even forums filled with people who are looking for the same kind of information.
Ch_2 Two of Five Chapters
Goal: Socializing
Online Communities
Goal: Career and business opportunities
Business Networks
Linked in Social Networkers communicate with other users using applications like blogs, chats and messages.
Goal: Soulmate
Online Matchmaking
***** 22
Connected
Define Social Networking
Goal: Get back in touch
Alumni Networks
Ch_2 Two of Five Chapters
***** 23
Connected
Define Social Networking
What is Social Networking? Social networking has gained immense popularity.
Networking applications can provide an amount of
With the current community spending a significant
medium for businesses to interact with their past
time at the workplace rather than the outside world, social networkers fullfill their basic needs for social interaction through computer mediated language. Those who participate in this are called nodes and the relationship of these key actors are ties.
or current and prospective employee and within the customers to advertise their product. This particular advertising medium has proved to be more effective than the word of mouth influence. Together with this, social networking sites also allow us to identity and connect with our present and past friends who we may have lost contact with. Networking sites
A social networking site comprises of nodes which are all tied by specific interdependencies, values, ideas, financial exchanges, friendships, kinships, conflicts and trade. The ties can be of any order, it can vary from the ties of a family holds among its family members or the trade ties between two organizations or perhaps between countries. There are three known types of social networks being, primary, secondary and tertiary. Social Network are open in nature and primarily used by the younger generation to search for friends and relationships, which in a way are informal in nature.
have often been used to promote blogs, or to post updates. It is because of its capacity to make life exciting has caught the attention of people.
Ch_2 Two of Five Chapters
Primary - includes friend circles, family members and relatives. Secondary - has a broader base and includes classmates, schoolmates and colleagues. Tertiary - has the widest range of contacts and includes strangers.
Tertiary
SECONDARY
PRIMARY
***** 24 Define Social Networking
Connected
Ch_2 Two of Five Chapters
***** 25
Connected
Define Social Networking
Advantages of Social Networking Needs to Connect: To connect is the most basic
Viral Nature: Social networks are viral in nature as
human need because socialing plays a vital part.
much affect is not required to build it.
Social networks helps people to socialize both in their interest group and with diverse people. This is
Connections: One person is friends with another
why social networks are so successful as they are
who have other friends. There is a lot of potential
a platform for the people with similar interest to
in such a situation. By using a social networking
interact without the restriction of boundaries.
website, a networker can get connected with these people to form a web full of connections. As long as
Needs to Share: It is a basic need to share either a
one gives as well as receives, connections work and
user’s opinion or expertise. Social networking sites
become valuable in the long run.
helps social networkers with their knowledge and expertise and is also very helpful for those who need that knowledge for various purposes. Identity: Social networking redefines the identity of a person in a social context manner, someone who belongs to a particular interest group which is a part of a social network represents a character of the person’s personality and then this becomes an integral part of the identity. Low Costs: It is usually cheap to use online social networking websites since most of them are usually free of charge. While personal use is rather simple and for anyone, its functions are underestimated.
Ch_2
***** 26
Connected
Define Social Networking
Two of Five Chapters
How Social Networks Work
1 Create and publicize your profile
4 Build your connection list
2 Manage your profile information
5 Join groups and accept invitations
3 Browse the connection graph
6 Communicate with your connections via messages, emails, blogs and chat
Ch_2 Two of Five Chapters
***** 27
Connected
Define Social Networking
Disadvantages of Social Networking Time Consuming: At many times social networking turns out to be time-consuming while not giving much in return and comes out less efficient. Not Always Productive: Social networking is used in order to gain knowledge and expertise but many times it becomes a platform for entertainent or fun and loses its original productivity. Target for Marketers: The networkers who belong to a social network create their social groups with similar type of needs and interests, it becomes a marketer’s easy choice or target. Undesirable Interactions: In social networking there are undesirable or social interactions which makes it boring and create fatigue. If one is interested in business social networking then different levels of social interaction might help. Lack of Anonymity: Sharing a full name, location, address, age, gender and other types of information maybe be an issue and put the user at risk.
Ch_2
***** 28
Connected
Define Social Networking
Two of Five Chapters
12 11 10 9 8 7 6 5 4 3 2 1
% 1
0
5
15
20
25
Data abuse pr data forwarding or lack of data protecting that state,
30
35
40
45
50
6
Stalking, harassment, becoming a crime victim (3%)
companies, or individuals (52%) companies, or individuals (52%)
7
Commercial selling of personal data (5%)
2
8
Data and identity thief (2%)
Private affairs become public and result in a lack of privacy (10%)
3
55
Personal profile data and images are accessed by employer, and resulting job related disadvantages as losing a (9%) job. (9%) resultin job related disadvantages such such as losing a job.
9
Defacing of profiles and data integrity (3%)
10
Internet addiction, increase of stress and health damages (1%)
4
11
Unrealistic, competition and exaggeration of self-representation (2%)
12
Friends can get a negative impression of me (1%)
5
Recieving advertisments or spam (5%)
Lack or loss of personal contacts, superficial communication improverishment of social relations. (7%) improverishment of social relations. (7%)
Ch_2 Two of Five Chapters
***** 29
Connected
Define Social Networking
Facebook Addiction Disorder Is there a thing as too much Facebook? Several experts
Facebook can show two faces to its community. The first
are say yes, since many people are spending an extreme
one is a fun, happy, pleasant, beautiful world that millions
amount of time on this site. Psychologists are exploring
of people around the world visit. It is especially appealing
ramifications Facebook has on the lives of people. The
to be in this type of fun, loving atmosphere when their real
amount of time spent is considered an addiction.
day-to-day lives are not well. People posting on Facebook present only the best of their lives and some have take
Doctors have named the social networking obsession as
liberties with describing how wonderful their lives are.
Facebook Addiction Disorder. Psychologist Dr. Michael Fence described the condition as a situation in which a
The second face of the social network is compulsive and
person’s Facebook usage time overtakes and interferes
voyeuristic in nature. Everyone wants to talk with you and
with daily activities such as sleeping, waking up, getting
send you gifts on Facebook. This website makes you feel
dressed, and is overly harmful to physical social activities.
very popular having hundreds of “friends” listed on your
Dr. Elias Aboujaoude, the director of Stanford’s Impulse
page. Everyone is interested and has a comment to make
Control Disorders Clinic, did a study and he noted that a
regarding what you are doing and saying. People who are
person’s drive to compulsively use the internet is similar to
on Facebook excessively each day may want to stop and
that of other impulse control disorders.
think about the amount of time that they are spending with “friends” that they will probably never meet in person.
It was characterized by the repetitive and irresistible urge
They should consider how that time could be better spent
to perform a pleasurable act that will lead to personal and
doing activities with their families and friends in person
professional problems and become otherwise intrusive in
rather than in front of a computer. Facebook, if used in
one’s life. While Facebook Addiction Disorder is not yet an
moderation, is an exciting site to visit to keep in contact
actual medical diagnosis, there are currently many studies
with old friends, family and to make new friends.
taking place and many therapists are noting a rise in their clients who are hooked to the point of social dysfunction.
Ch_2 Two of Five Chapters
175,000,000 USERS Log Into Facebook Per Day
***** 30 Define Social Networking
Connected
Ch_3 Three of Five Chapters
***** 31
Connected
Web Security and Privacy
>> Identity ThEFT IN SOCIAL NETWORKS 33 - 34 >> Anonymity in the Digital Era 35 - 36 >> PRIVACY SETtINGS IN FACEBOOK 37 - 38 >> Which Networking Sites Are Secure 39 - 40
Ch_3 Three of Five Chapters
***** 32 Web Security and Privacy
Connected
Ch_3 Three of Five Chapters
***** 33
Connected
Web Security and Privacy
Identity Theft in Social Networks What exactly is social networking identity theft? It is a form of cybers quatting using social media sites. If you have ever attempted to join a social networking website or tried to apply for an email and discovered that both your first or last name were already taken, may or may not have been social networking identity theft. In several cases, multiple individuals simply share the exact same name, but sometimes a cybersquatter wants to control your e-persona for various reasons. Either someone out there shares your exact name and happened to register first, or else somebody took your name so that you cannot have it, or wants to sell it back to you, or wants to pose as you in order to disrupt your life. The most damaging happens when an imposer wants to pose as you in order to disrupt your life. This disruption can take on several forms. They may harass and stalk you, or even to harass and stalk people that you know. They may steal your social media identity for financial gain. Thieves can use email accounts and other social medias to extract funds from others or open accounts.
Ch_3 Three of Five Chapters
44% of networkers said if they
discovered a social media provider did not adequately protect privacy or security, they would continue to use the social network site.
50% of social networkers aren’t
very confident and even sure that their networking website of contact list of friends only includes people they know and can trust.
***** 34
Connected
Web Security and Privacy
60% of social networkers users
are either not confident or unsure of their website’s provider’s ability to protect their identity.
Ch_3 Three of Five Chapters
***** 35
Connected
Web Security and Privacy
Anonymity in the Digital Era There is excessive trust in the social networking
manage. It is imperative to spend a few minutes
world today. People have entirely dropped their
and lock down your profiles so they can’t be seen
sense of cynicism when logged onto their sites.
by everyone in the world.
Apparently, the users see no reason to distrust. Generally, your list of friends are people who you
It is not unusual for an identity hackers to friend
know, like and trust. In the digital world, your
a potential victim especially when the thief poses
guard is as down as it will ever be. You can be
as somebody the target may know, or someone
in the safety of your own home or office, hanging
who is within the target’s social circle. Once the
with people from all over, in big cities and never
thief has been accepted as a friend, he or she is
feel that you have to watch your back.
in the target’s inner circle and gains a great deal of insight into the target’s daily life.
It is reported that one third of social networkers have at least three pieces of information posted on their pages that could lead to identity theft. Names, addresses, birth dates, mothers’ maiden names, kids’ names, pets’ names and also phone numbers are among the various types of data that could help a thief piece together your identity. Almost 80% of those polled are concerned about privacy issues on social networking, yet almost 60% are unaware of what their privacy settings are and who could visit their data. One third of social networkers admitted that they actually use the same password for all their social networking accounts. Almost all social networks have privacy settings that networking users never venture to
Ch_3 Three of Five Chapters
There is an excessive amount of trust in the networking world.
***** 36 Web Security and Privacy
Connected
Ch_3 Three of Five Chapters
***** 37
Connected
Web Security and Privacy
Privacy Settings in Facebook Facebook is distinctive among several other social
basic information and personal information. The
networking services sites in two ways pertinent
default privacy settings for a new user is that the
to personal privacy. Users are required to identify
entirety of this information is viewable by anyone
their accounts authentically through their system.
in their network. Their profile is also viewable by
According to its usage, Facebook networkers may
anyone who is friends with the user on Facebook.
not impersonate any person or entities, or falsely
While anyone who is not connected to that user
state and misrepresent yourself, your age or your
via network or friendship cannot view the user’s
affiliation with anyone else. Such bold statement
profile, by default they can still locate them using
means that the information users provide on their
a global search function as well as view a version
profiles is particularly very sensitive.
of the user’s profile consisting only of their display photo, name, and network affiliation.
Secondly, Facebook is organized around a system of networks that correspond to physical locations and
Facebook.com has always provided the options for
institutions. The site maintains countless college,
managing the precise level of access to particular
high schools, regional, and work networks across
groups of people and to particular sections of one’s
the globe. Membership in such networks, while not
profile, two settings are of particular interest. It is
required, is recommended by Facebook and allows
considered a profile to be private if either the user
the general location of users to be recognized.
has decided to change their default settings so that their profile is no longer accessible by others.
Networks determine the default level of ‘‘public’’ exposure afforded a new profile. When a new user is registered on Facebook, the user is provided with a blank profile template consisting of a number of pre-determined response categories. This include
Ch_3 Three of Five Chapters
***** 38 Web Security and Privacy
Connected
Ch_3 Three of Five Chapters
***** 39
Connected
Web Security and Privacy
Which Networking Sites are Secure? Excellent Good Fair Poor
Ch_3
***** 40
Three of Five Chapters
Connected
Web Security and Privacy
Myspace
Bebo
Facebook has now allowed 13 year-old networkers
Myspace values privacy and in fact, it gives the
Bebo.com is the only networking site that defaults
to create their own profiles on the site, personalized
user complete control over their profile’s privacy
user’s profile to private. Setting must be manually
privacy settings give Facebook the name of one of
settings. The user can also limit who can access
changed to be public. The user can limit the ages
the most secure social networking websites on the
their page or block individual members. The user
of people they want contacting them by setting a
Internet. Facebook continues to make advances in
can also have the ability to report spam messages
minimum and maximum age. There is also a nifty
the customization of user profile settings, sharing
and account misuse. Myspace will remove profiles
link of a video on the user’s profile explaining the
photos and protecting the user’s information.
that lied about age to obtain membership.
safety concerns and privacy settings.
Friendster
Twitter must now establish the comprehensive
Friendster’s privacy settings allow your friends to
New security features LinkedIn provides includes
informational security program that is reasonably
view your full profile while a limited profile is still
the ability to view your profile as others will see it,
designed to protect the privacy, confidentiality and
accessible to other Friendster members. One plus
and make changes. Security setting are present,
integrity of non-public consumer information. This
to this social networking website is a direct link
however, identity hackers still hijack a new user’s
website has the best track record when it comes to
at the bottom of profile pages and a report abuse
LinkedIn profie by capturing cookies created and
caring about their user’s security.
button on group and profile pages.
then stored on their computers.
Ch_4 Four of Five Chapters
***** 41
Connected
Technology vs Communication
>> Technology Dependency 43 - 44 >> Computer Meditated Communication 45 - 46 >> Netspeak Internet Jargon 47 - 50 >> Impacts on Interpersonal Social Skills 51 - 52
Ch_4 Four of Five Chapters
***** 42 Technology vs Communication
Connected
Ch_4 Four of Five Chapters
***** 43
Connected
Technology vs Communication
Technology Dependency Technology could be traced all the way back from evolution of mankind. The early humans invented the usage of stone weapons which were essentially fractured rocks that would be used like a modern day axe. The discovery of fire, clothing and shelter were major technological advancements. Invention of the wheel later catapulted the advancements in transport and energy. The discovery of iron and the steel was a major revolution as well. This is the greatest creation of mankind’s and has been around since the beginning of time, from the stone wheel to the Internet and social networking sites. Many people think technology is encompassed in the computer and the Internet. However, the truth is that people uses technology in one way or another on a daily basis. Technology has become the foundation of people’s existence. In simple words, technology has become the lifeline of the individual user. In the current era of technology and information driven processes, it is easy to witness how interpersonal communication has become entwined with social networking sites.
Ch_4 Four of Five Chapters
***** 44
Connected
Technology vs Communication
The Never Ending Cycle of Technology DVD player
Wireless Router
Laptop
Clothes Dryer
Stereo
Freezer
Standard TV
Air Conditioner
Cooking Range
Ceiling Fan
Door Bell
Water Heater
Ch_4 Four of Five Chapters
***** 45
Connected
Technology vs Communication
Computer Meditated Language While people participate together in virtual online
Computer Mediated Communication is defined as
communication they assess how much they feel
any communicative transaction that occurs through
that they are present in a physical setting. Social presence theory states that CMC creates a sense of intimacy or we are together feeling through an emoticon system. C MC is the best choice to resolve uncertainty in a virtual communication. There are misconceptions that CMC as a method of computer communication lacks the ability to convey one’s emotions, feelings and expressions in the same way face to face communication can. During a person to person talk, one heavily rely on non-verbal signals to complement. To add this diminution to the computer meditated language, typography cues using the keyboard are used to convey a variety of expressions and emotions.
the usage of two or more networking computers. This term have been used traditionally regarding to communications that occur through computer mediated formats such as instant text messages, e-mails and chat rooms. CMC has also been applied to other forms of text based interactions.
Ch_4
***** 46
Four of Five Chapters
Connected
Technology vs Communication
Common Text Emoticons
O:) Angelic
:’(
:-V
:[
Crying
Shouting
:D
;)
:(
>:[
:-S
:<
:-&
:-6
:O
:-\
Laughing
Discontent
:) Happy
Winking
Incoherent
Exhausted
Sad
Depressed
Surprised
Really Down
:# Sealed
Tonguetied
Undecided
Ch_4 Four of Five Chapters
***** 47
Connected
Technology vs Communication
Netspeak Internet Jargon Internet and social networking media continue to
This has very interesting implications for linguists
play a role in overhauling on the English language.
and for those who are studying the evolution of
Slang jargons have gained more popularity among
Internet based communication. Regional dialect
English speakers and network users. In this year,
have been existing for centuries, but text-based
several web related words had been added into
dialects seem to be something new. If Twitter is
Oxford Dictionaries included OMG, LOL, TTYL, WTH
influencing the language, this will affect the use of
and several others. Beginning the month of June
the restricted space of 140-characters.
2011, more vocabularies that were influenced by social networking were added into the dictionary. The newest study revealed that regional slang is alive and as well, on Twitter.com. Certain dialects have distinctive slang, for example, the Southern “y’all” which researchers have shown is used on Twitter as well as in everyday conversation. Spoken slang such as Pittsburgh’s yinz and the Southern’s y’all have moved from spoken word to tweets. Perhaps more interesting is the fact that regions are now developing their own Twitter based (i.e. not spoken but only typed) dialects. “Koo” is a Northern Californian Twitter dialect, for instance, while “Coo” is very specific to Southern California. The commonly used LOL is taken by Washington DC’ers. Researchers say that the different dialects appearing on Twitter are influenced by both the 140-character mlimit as well as regional dialects.
Ch_4 Four of Five Chapters
KOO
Northern Californian Dialect
COO
Southern Californian Dialect
Regions are developing their own Twitter-based (not spoken but only typed) dialects. “Koo” is a Northern Californian Twitter dialect, for instance, while “Coo” is specific to Southern California.
***** 48 Technology vs Communication
Connected
Ch_4 Four of Five Chapters
***** 49
Connected
Technology vs Communication
Twitter Jargon
PLZ
CYA
IMHO
BTW
G2G
BTW
ASAP
L8R
LMK
OMW
KK Okay
Thanks
NE1
SUP
W/E
HTH
Please
Got To Go
Let Me Know
Anyone
See You Again
By The Way
On My Way
Whatâ&#x20AC;&#x2122;s Up
In my Honest Opinion
As Soon As Possible
Whatever
By The Way
Later
TNX
Hope That Helps
Ch_4 Four of Five Chapters
***** 50
Connected
Technology vs Communication
OMG
TC Take Care
Talk To You Later
TTYL
LOL
SRY
WTH
SRSLY
NP
WB
IDK
NTH
NMD
JK
UR
LMAO
RUOK
Oh My God
Sorry
Welcome Back
Just Kidding
What The Hell
I Donâ&#x20AC;&#x2122;t Know
Your
Seriously
Nothing
Laugh my Ass Off
Laugh Out Loud
No Problem
Nevermind
Are You Okay
Ch_4 Four of Five Chapters
***** 51
Connected
Technology vs Communication
Impacts on Interpersonal Social Skills With this development of technology over time,
Interpersonal communication is very diminishing in
communication has become one aspect which has
many ways. Networkingâ&#x20AC;&#x2122;s impact on interpersonal
been evolved immensely. Communicating today is
communication is multi-faceted, and should be
very different than what we used to do in earlier
tempered with the benefits of technology. Now
days. And it is going to be even more different in all
the question is why interpersonal or even human
the days to come. Among communication mediums
communication is this significant. The simplest
or interpersonal communication is the one which
answer is because we are all human and when we
has been influenced directly with the application of
interact with each other in person; it is way more
technology on our current life.
effective than doing non face-to-face methods.
Human communication simply refers to the act of exchanging messages between two or even more persons. More precisely, it could be said human communication is the face to face communication, like two or more people talking, interacting. Human communication is also an essential part of daily interaction. Benefits of communication are obvious as they enhance aspects of our social lives. Social Networking has influence on interpersonal communication and this also changes the rules social interaction. People fear losing one critical element in communication, the human element. Technologies such as Social Networks often offers quick communication, and making it fairly easy with a large group of people.
Ch_4 Four of Five Chapters
***** 52
Connected
Technology vs Communication
Effectiveness of Communication
Most Effective Communication
Video Conference
Face to Face
2
1
Least Effective Communication
Telephone
3
Written Notes
4
Ch_5 Five of Five Chapters
***** 53
Connected
The Future of Networking
>> FUTURE OF Web And SOCIAL NETWORKS 55 - 56 >> THe Next big Social network: Gowalla 57 - 58 >> Future TRENDS OF MOBILE NETWORKING 59 - 60 >> A TRANSPARENT SOCIETY 61 - 62 >> Glossary 63 - 64
Ch_5 Five of Five Chapters
***** 54 The Future of Networking
Connected
Ch_5 Five of Five Chapters
***** 55
Connected
The Future of Networking
Future of Web and Social Networks According to a recent study, 47 percent of adults
personal photos. “It changed things,” he said. “It
own a social network site. Few technologies have
was one simple thing. Now you have this new way
grown as fast and had such an immediate impact on
to look at your life.” Facebook hosts more than 15
our culture, communication and even commerce.
billion photos now. Recordon noted how Facebook
This panel assessed the near future and considered
and other social networks are influencing politics
the next 53 percent, or what happens when social
as well. “It has a large impact on elections all over
networking may become ubiquitous. This examined
the world,” he said. “The key point there is that
some of the challenges faced by individuals and
the human neocortex might exist so we can track
organizations as networking tools expands.
who’s my friend and whos not.
Users need a new cultural toolkit to deal with the
That kind of reciprocal social status management
realities ahead as more people spend more time in
is at the heart of social groups. It’s a core human
social networks. Now there are serious implications
feature. We have all this cognitive capacity, but
to moving your sociality from a medium like this,
that cognitive capacity is a secondary artifact to
talking face-to-face in person, which has laws of
the fact that we need to keep track of our social
physics, that we have a cultural toolkit for. It is
environment very exclusively. What the Internet
usually considered as, space confines who can see
has done is make social networks and all of the
you and time makes your speech ephemeral.
sociality that goes into everyday life visible.
On the internet sene, space collapses and it’s not
It is predicted that in the future people will not
considered ephemeral. It is there and we do not
simply build their identity into a place like Facebook,
yet have the cultural toolkit to deal with socializing
but instead they would also be able to maintain a
like this in such environment. The unpredictability
personally homebase similar to a blog as their own
of the social Internet were discussed by panelists.
identity. Two hottest technologies online, Twitter
You never know how people will adopt and adapt a
and Facebook, are the fastest and integrating real
tool when it is offered to them. Dave Recordon of
time delivery of activity streams. At the moment,
Facebook offered that nobody would have guessed
Ambiance, Automation and Emergence are three
that people would go overboard by sharing all their
forms of value emerging from the Real Time Web.
Ch_5 Five of Five Chapters
***** 56
Connected
The Future of Networking
The Real Time Web Ambiance: The Internet is made up of web pages
Real-time is a set of technologies and practices that
linked together, but hovering around many of those
enable web users to receive information as soon as
pages are now social media signals like blog posts,
it is published by its authors, rather than requiring
bookmarks, tweets and other URL links that refer
them or their software check a source periodically
to a page but aren’t visible when you’re looking at it. Most of us use Google to find pages about things we’re looking for, but Google prioritizes historical inbound links and the text on pages.
for updates. This is fundamentally different from real-time computing since there is no knowing when, or really if, a response will be received. The information types transmitted this way are often short messages, status updates, news alerts, or links to longer documents. The content is often soft
Automation: We probably should have started out with this, but what’s the most obviously valuable example of value in real-time information delivery in recent internet history? Blackberry and the push email. We tend to assume that the real time web is something we’ll be looking at constantly, because it’s constantly bringing new information. The real time web could very well just do its thing and notify us, in real time, of important events. Emergence: One of the things that will be good to automate is the emergence of topics. Tweetmeme, a groundbreaking new service, other than Twitter, has already been talked about enough to have more than 220k results appear in a Google search.
in that meaning it is based on the social web.
Ch_5 Five of Five Chapters
***** 57
Connected
The Future of Networking
The Next Big Social Network: Gowalla Twitter is currently labeled as a microblogging
dedicated applications available on Google Android,
the geographical position of the mobile device and
service site with an estimate of 114 million users,
iPhone, Palm Web OS and BlackBerry. Checkins can
can be used in a variety of contexts, few examples
which is, despite of its huge user base, only a tiny
be pushed through Notifications to iPhones, and by
are health, object search, social entertainment,
part of the web blog trend currently sweeping the
linking accounts, to Twitter and Facebook. Users
work and also personal life.
internet, and only seems to get bigger each day.
will create “Trips”, which links up to 20 related
However, due to the ever expanding domain that
spots, falling into categories such as Nature Hikes
is the internet despite Twitter and Facebook both
or Pub Crawls. Spots and Trips can be “featured” by
only being a few years old, neither are considered
Gowalla, and with this comes a special status and
news or remarkable anymore.
icon, along with being highlighted on the website.
The hype they once had a few years back is now
Featured spots tend to be local landmarks such as
since long gone. So what the trendsetters of today
Buckingham Palace in London, while featured Trips
are asking themselves is: Who will be the next
are chosen for being unique and exciting. Checking
Twitter or Facebook? What will be the next hype
in, users may receive virtual “Items” as a bonus
which will take the internet and its users by storm?
and these can be swapped or dropped at Spots.
Some people claim that the next social networking
Users become “Founders” of a spot by dropping an
trend to rampage the ‘internets’ will be all location
item there. Items form a key feature within the
based social networking.
game and each user has a vault into which they can place items they want to keep.
Meet Gowalla, a location based social networking service which won the Mobile category interactive
Upon first glance location based services, such as
award in the 2010 South by Southwest festival
Gowalla might seem like a interactive version of
in Austin, Texas US. Gowalla is a primarily mobile
a scavenger hunt, but there is so much more. A
web application that allows users to check in to
location-based service is either an information or
locations that they visit using their mobile device.
entertainment services, all made accessible with
This is achieved either through the usage of the
mobile devices utilizing the ability to make use of
Ch_5 Five of Five Chapters
***** 58 The Future of Networking
Gowalla can include services to identify a location
Gowalla is a mobile web application that allows users
of a person or even objects, such as discovering
to check in to locations that they visit through their
the nearest cash machine or whereabouts of a
mobile devices. This step could be achieved either
friend or employees. It could also include parcel
by the usage of dedicated applications available on
tracking and vehicle tracking services. It can also include mobile commerce when taking the form of coupons or advertising directed at customers. This application will also include personalized weather services and location-based games for entertainment. The possibilities for Gowalla and its relatives are endless and many believes that this kind of service will be the next thing to hit the internet. But all is not well in the kingdom of location based networking. Many people have been quick to point out some of the shortcomings that might stop the likes of Gowalla in its tracks, and hinder its prophecy of domination on the software mobile device market right now. What is certain is that this app has potential and that itâ&#x20AC;&#x2122;s something new and worth the time being updated on. Promoters of location based network suggests that once technology and user base has reached a certain level then services like Gowalla has the same potential to explode and become the next big hit in the universe of Networking, question is if it has what it takes to be the next big hit.
the Android, iPhone, Palm and BlackBerry. There is currently no way of checking in through the standard website, only through mobile devices.
Connected
Ch_5 Five of Five Chapters
***** 59
Connected
The Future of Networking
Future Trends of Mobile Networking The explosive growth of mobile devices further
It is very possible that the next generation mobile
enhanced the global interpersonal communication.
devices can store large volume of data and can
As mobile phones today become more powerful,
establish high speed internet connections on web.
technology experts are seeing significant shifts on
These technology updates will pave the way for
how people will acutally use their devices in the
full integration of web services, social networking,
future. So here are some of the most important
mobile communication and traditional media. These
evolving trends on mobile social networking and
new features are now present in most high end
communication. Predictions of the mobile network
mobile devices. Next step is the popularization of
is that as the next generation of devices will
the technology so it can be enjoyed by all users.
democratize the utilization of mobile email. The potential benefits of Mobile Broadband are Today, only high end mobile phone users can
far more than just bandwidth. In the future, it
effectively utilize mobile emails. But now with more
will be possible for everyone to access, and share
carriers offering highly integrated devices, more and
information and engage in social gaming activities
more people will be able to enjoy fast and reliable
in a mobile networked world through any terminal,
mobile email and mobile social networking.
at any time, from any location.
Although services on demand are now already
Despite the industryâ&#x20AC;&#x2122;s expectations, the evolution
integrated on mobile devices, the scope and quality
of MobileBroad band is influenced by irregular
of available services are fairly limited. Following the
development in four following areas: services and
current increasing sophistication of mobile devices
applications, terminals, the price, and networks.
and continued build up of data transfer capability,
With the convergence of the industry, services
mobile service on the demand can become a high
and applications, terminals, and pricing have, over
point of future mobile networking. Finally, future
recent years, reached optimum conditions and also
mobile devices could become technology appliance
achieved revolutionary breakthroughs.
which can be on all aspects of mobile computing.
Ch_5 Five of Five Chapters
Mobile Social Networking Gains Traction Younger consumers are the most likely to particupate in social networking via mobile - 66% of mobile social networkers are under 35 years of age. Facebook is the most popular social networking site accesssed via a mobile - 92% of mobile social networkers visit Facebook. Twitter sees the most frequent mobile usage, with half of its mobile users visiting the site daily.
MAC / PC Social Networking Users Mobile Social Networking Users
***** 60 The Future of Networking
Connected
Ch_5 Five of Five Chapters
***** 61
Connected
The Future of Networking
A Transparent Society The future of social network has implanted the idea of wearing a gestural interface that augments the physical world with digital information and lets users use natural hand gestures to interact with that information. In other words, having a mirror, pocket projector, camera and a cellphone connected to website on your person, would allow the world around us to become like a computer displaying certain information and also perform several particular tasks on request. Making a viewing box just using your fingers and thumbs, for example, would take a photograph in a sixth sense world. Such developments have been in progress since the beginning of this year. However, these have also been met with serious debates over peopleâ&#x20AC;&#x2122;s personal privacy and raised more than just a few concerns. It is still difficult to say or predict if and how when such technology will ever enter society and become a major part of userâ&#x20AC;&#x2122;s daily lives. Nevertheless, several concept ideas are emerging to give us an idea of what such technology may be like.
Ch_5
***** 62
Five of Five Chapters
Connected
The Future of Networking
Face Recognition: Imagine holding up your phone
Databases and Directories: Discover who lives
Goodbye to Privacy: Privacy is already an issue
or other digital device against a person you’ve just
where and how you are connected; then phone
of concern, now and for our digital future, says
met or passed by. You’d instantly have information
them, e-mail them, add them to your network right
Buckland. We’re still working out the ethical and
returned about that person within seconds, gleaned
then and there. Get other news about the suburb
moral framework. We may even see a backlash
from an automatic web, public profile and social
and other socio economic information. You’d be able
from society angry at this intrusion. It may, end
network search. You’d discover common friends,
to hold up your phone in a crowded room and work
up being okay because you will be in control, you
talking points and then have the ability to add
out who is connected to whom. You could instantly
could refuse access to SN or don’t tweet. But there
them to your network. By a semantic scan, you’d
gauge your primary and secondary networks and
will be information about you that you won’t be
discover negative or positive comments on Google
instantly know who you should chat to, what the
able to control too. There’ll be inevitable abuse and
or elsewhere relating to this individual.
conversation are, and what to avoid.
misuse of the information, which will hopefully be manageable in the near future.
Ch_5
***** 63
Five of Five Chapters
Connected
Glossary
Glossary B
Bulletin Board System: Also known as BBS, a computer system running software that allows users to connect and log in to the system using
I
Identity Theft: The fraudulent acquisition and the use of a personâ&#x20AC;&#x2122;s private identifying information, usually for financial gain.
a terminal program. A user can perform functions such as upload, downloading software and reading bulletins.
Intergalactic Network: The first conception of what eventually become the current Internet. J.C.R. Licklider coined the term in 1963.
C
CompuServe: First online service to offer Internet connectivity, albeit limited access, as early as 1989 when it connected its proprietary e-mail to allow incoming and outgoing messages.
M
Microblogging: A broad-casting medium in the form of blogging. A microblog is different from a traditional blog in that its content is typically smaller in both actual and aggregate file size. Microblogs allow users to exchange elements of content such as short sentences,
Common Text Emoticons: An emoticon is a short sequence of
individual images, or video links.
keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
Mobile Application: Mobile applications, known as an application or called an â&#x20AC;&#x153;appâ&#x20AC;?, is a computer software designed to help the user to
Cybersquatting: Known as domain squatting, is registering, trafficking
perform singular or multiple related specific tasks.
in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
N H
Networks: In information technology, a network is a series of points or nodes interconnected by communication paths.
Hardware: Hardware is a general term for the physical artifacts of a technology. It also mean the physical components of a computer
Node: A node can be any device connected to a computer network. On
system, in the form of computer hardware.
an IP network, a node is any device with an IP address.
Ch_5 Five of Five Chapters
R
Real-Time Web: The real-time web is a set of technologies and practices that enable social network users to receive information or updates as soon as it is published by its authors.
S
Secondary Network: This network includes the broader base range, as classmates, schoolmates and colleagues. Servers: A server is a software framework that is dedicated to the execution of procedure types such as, programs, routines, scripts or supporting the construction of applications. Socia Media Icons: Every website has one thing in common, presence of Social Media Icons and Buttons. Eye catchy social media icons will surely draw more attention from the website and visitors will feel the urge by clicking on these icons. Software: Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
T
Tertiary Network: This network connection contains the widest range
V
Virtual: The term has been defined in philosophy as that which is not
of contacts and including strangers.
real but may display the salient qualities of the real.
***** 64 Glossary
Connected