Social network service A social network service focuses on the building and verifying of online social networks for communities of people who share interests and activities, or who are interested in exploring the interests and activities of others, and which necessitates the use of software. Most social network services are primarily web based and provide a collection of various ways for users to interact, such as chat, messaging, email, video, voice chat, file sharing, blogging, discussion groups, and so on. The main types of social networking services are those which contain directories of some categories (such as former classmates), means to connect with friends (usually with self-description pages), and recommender systems linked to trust. Popular methods now combine many of these, with MySpace, Bebo and Facebook being the most widely used in the anglosphere and Friendster being the most widely used in Asia. There have been some attempts to standardize them (see the FOAF standard) but this has led to some privacy concerns. History of social network services The notion that individual computers linked electronically could form the basis of computer mediated social interaction and networking was suggested early on - for example The Network Nation by S. Roxanne Hiltz and Murray Turoff (Addison-Wesley, 1978, 1993) effectively sketched out how computer-mediated communication -- such as the Internet -- should be developed for this purpose. There were many early efforts to support social networks via computer-mediated communication, including Usenet, bulletin board services (BBS), Arpanet, and EIES: Murray Turoff's server-based Electronic Information Exchange Service (Turoff and Hiltz, 1978, 1993). The Information Routing Group developed a schema about how the proto-Internet might support this. Early social networking websites included Classmates.com (1995), focusing on ties with former school mates, SixDegrees.com (1997), focusing on indirect ties, and CaringBridge.org (1997), connecting family and friends during a critical llness, treatment or recovery. Two different models of social networking that came about in 1999 were trust-based, developed by Epinions.com, and friendship-based, such as those developed by Jonathan Bishop and used on some regional UK sites between 1999 and 2001. Innovations included not only showing who is "friends" with whom, but giving users more control over content and connectivity. By 2005, one social networking service MySpace, was reportedly getting more page views than Google, with Facebook, a competitor, rapidly growing in size. In 2007, Facebook began allowing externally-developed add-on applications, and some applications enabled the graphing of a user's own social network -- thus linking social networks and social networking. Social networking began to flourish as a component of business internet strategy at around March 2005 when Yahoo launched Yahoo! 360°. In July 2005 News Corporation bought MySpace, followed by ITV (UK) buying Friends Reunited in December 2005. It is estimated that combined there are now over 200 social networking sites using these existing and emerging social networking models. Information from Wikipedia 1 3/7/2016 Business applications Social networks connect people at low cost; this can be beneficial for entrepreneurs and small businesses looking to expand their contact base. These networks often act as a customer relationship management tool for companies selling products and services. Companies can also use social networks for advertising in the form of banners and text ads. Since businesses operate globally, social networks can make it easier to keep in touch with contacts around the world. In many ways business networking on social networks has eclipsed the amount of networking that takes place on dedicated business networking websites. Medical applications Social networks are beginning to be adopted by healthcare professionals as a means to manage institutional knowledge, disseminate peer to peer knowledge and to highlight individual physicians and institutions. The advantage of using a dedicated medical social networking site is that all the members are screened against the state licensing board list of practitioners. The role of social networks is especially of interest to pharmaceutical companies who spend approximately "32 percent of their marketing dollars" attempting to influence the opinion leaders of social networks. In contrast, CaringBridge is a nonprofit organization offering free personalized websites to people in a health care crisis, hospitalization, undergoing medical treatment and/or recovering from a significant medical condition or procedure. Its functionality is similar to a blog. The service allows family members and friends to receive consistent information via a single website, and eliminates the need to place and receive numerous telephone calls. CaringBridge is the largest (for traffic) charitable nonprofit website in the world. By the end of 2007, more than 90,000 people have created a CaringBridge website. In total, those websites have received over a half a billion visits and 13 million written guestbook messages of love, hope and support. Languages, nationalities and academia Various social networking sites have sprung up catering to different languages and countries. The popular site Facebook has been cloned for various countries and languages and some specializing in connecting students and faculty. Social networks for social good Several websites are beginning to tap into the power of the social networking model for social good. Such models may be highly successful for connecting otherwise fragmented industries and small organizations without the resources to reach a broader audience with interested and passionate users. Users benefit by interacting with a like minded community and finding a channel for their energy and giving. Examples include SixDegrees.org (Kevin Bacon). Typical structure of a social networking service Basics In general, social networking services, such as MySpace, Facebook and Bebo, allow users to create a profile for themselves. Users can upload a picture of themselves and can often be "friends" with other users. In most social networking services, both users must confirm that they are friends before they are linked. For example, if Alice Information from Wikipedia 2 3/7/2016 lists Bob as a friend, then Bob would have to approve Alice's friend request before they are listed as friends. Some social networking sites have a "favorites" feature that does not need approval from the other user. Social networks usually have privacy controls that allows the user to choose who can view their profile or contact them, etc. Additional features Some social networks have additional features, such as the ability to create groups that share common interests or affiliations, upload videos, and hold discussions in forums. Geosocial networking co-opts internet mapping services to organize user participation around geographic features and their attributes. Business model Few social networks currently charge money for membership. In part, this may be because social networking is a relatively new service, and the value of using them has not been firmly established in customers' minds. Companies such as MySpace and Facebook sell online advertising on their site. Hence, they are seeking large memberships, and charging for membership would be counter productive. Some believe that the deeper information that the sites have on each user will allow much better targeted advertising than any other site can currently provide. Sites are also seeking other ways to make money, such as by creating an online marketplace (Facebook's Marketplace) or by selling professional information and social connections to businesses: such as LinkedIn. Social networks operate under an autonomous business model, in which a social network's members serve dual roles as both the suppliers and the consumers of content. This is in contrast to a traditional business model, where the suppliers and consumers are distinct agents. Revenue is typically gained in the autonomous business model via advertisements, but subscription-based revenue is possible when membership and content levels are sufficiently high. Privacy issues On large social networking services, there have been growing concerns about users giving out too much personal information and the threat of sexual predators. Users of these services need to be aware of data theft or viruses. However, large services, such as MySpace, often work with law enforcement to try to prevent such incidents. In addition, there is a perceived privacy threat in relation to placing too much personal information in the hands of large corporations or governmental bodies, allowing a profile to be produced on an individual's behavior on which decisions, detrimental to an individual, may be taken. Furthermore, there is an issue over the control of data - information having been altered or removed by the user may in fact be retained and/or passed to 3rd parties. This danger was highlighted when the controversial social networking site Quechup harvested e-mail addresses from users' e-mail accounts for use in a spamming operation. Investigations Social network services are increasingly being used in legal and criminal investigations. Information posted on sites such as MySpace and Facebook, has been used by police, probation, and university officials to prosecute users of said sites. In some situations, content posted on MySpace has been used in court to determine an appropriate sentence based on a defendant's attitude. Information from Wikipedia 3 3/7/2016 Facebook is increasingly being used by school administrations and law enforcement agencies as a source of evidence against student users. The site, the number one online destination for college students, allows users to create profile pages with personal details. These pages can be viewed by other registered users from the same school which often include resident assistants and campus police who have signed-up for the service. Name Advogato Annobii aSmallWorld Baboo Bebo Black Planet Broadcaster.com Buzznet Cake Financial Capazoo CarDomain Care2 Classmates.com Consumating CouchSurfing Cyworld Dandelife Dodgeball DontStayIn Experience Project Facebook Faceparty Flickr Flixster Fotki Fotolog Friends Reunited Friendster Frühstückstreff Gaia Online Information from Wikipedia Description/Focus Free and open source software developers Books European jet set and social elite General, Popular in Europe General, Popular in UK, Ireland, New Zealand and the Pacific Islands African-Americans Video sharing and webcam chat Video sharing and webcam chat Investing General (blogs, photos, music, videos) Car Enthusiasts Green living and social activism School, College, Work, and the military "Consumeetings" Hospitality Young South Koreans Collective narratives or "shared biographies" Mobile location-based service Clubbing (primarily UK) Life Expereinces General, Popular in Canada, UK and USA British teens and young adults Photo sharing Movies Phot Sharing Photoblogging School, College, Work, sports and streets General General Anime and Games 4 Registered Users 11,000 Unknown Registration Open Open 150,000 12,500,000 Invite-only Open to people 18 and over 40,000,000 16,000,000 Open to people 13 and over Open 26,000,000 Unknown Open Open Unknown 1,600,000 Open Open 8,123,058 Open 40,000,000 21,000 402,000 21,200,000 Open Open Open Open Unknown Open Unknown 333,000 Unknown Open Open Open 58,000,000 Open to people 13 and older 5,900,000 4,000,000 36,000,000 1,000,000 12,695,007 Open to people 16 and older Open Open Open Open 19,000,000 50,000,000 11,600 93,000,000 Open Open Open Open 3/7/2016 Gather Geni.com Grono.net GuildCafe Habbo hi5 Hospitality Club Hyves imeem IRC-Galleria iWiW Jaiku Joga Bonito LibraryThing LinkedIn LiveJournal LunarStorm MEETin Meetup.com MiGente.com MindViz Mixi MOG Multiply My Opera Community MyChurch MySpace myYearbook Netlog NewNotes.net Nexopia OkCupid orkut OUTeverywhere Passado Passportstamp Plaxo Playahead Playtxt Pownce ProfileHeaven RateItAll Reunion.com Ryze Sconex Searchles Sermo Shelfari Soundpedia Sportsvite Stickam Information from Wikipedia Articles, Pictures, Video Sharing, Group Discussions Genealogy Poland Games General General Hospitality Dutch Music, Video, Photo, Blog Finland Hungary General Soccer Books Business Blogging Sweden General General Latinos Profiles, Photo/Video sharing, Music Japan Music Relationships General Chuches General General General (was Facebox) General Canada Networking/Dating General Gay General Travel Business General Mobile social network General General General General Business American high schools Social search and networking Physicians Books Music Recreational Sports Video Streaming and chat 5 450,000 750,000 1,350,000 Unknown 82,000,000 50,000,000 328,629 5,000,000 16,000,000 400,000 3,100,000 Unknown Unknown 214,425 16,000,000 12,900,000 1,200,000 72,000 2,000,000 3,600,000 Open Open Invite-Only Open Open Open Open Open Open Open Invite Only Open Open Open Open Open Open Open Open Open 145,000 9,830,000 Unknown 7,500,000 1,001,798 70,306 217,000,000 950,000 28,000,000 Unknown 1,158,531 800,000 67,000,000 Unknown 4,700,000 1,200 15,000,000 530,000 70,000 Unknown 100,000 Unknown 28,000,000 250,000 500,000 Unknown 40,000 Unknown 3,500,000 18,000 1,305,051 Open Invite-Only Open Open Open Open Open Open Open Open Open Open Open Open Open Open Open Open Invite only Open Open Open Open Open Open Open to MD's in USA Open Open Open Open 3/7/2016 Student.com StudiVZ Tagged.com TakingITGlobal TravBuddy.com Travellerspoint tribe.net Twitter Vox WAYN WebBiographies Windows Live Spaces Woophy Xanga XING Yahoo! 360° Yahoo! Mash Zooomr Colleges University Students General Social Action Travel Travel General Micro-blogging Blogging Travel/Lifestyle Cenealoegy Blogging (was MSN Spaces) Travel/Photography/Photo sharing Blogging Business Linked to Yahoo! ID's Yahoo! New SNS Universal Photo Sharing 800,000 4,000,000 30,000,000 145,000 760,000 105,000 602,876 Unknown Unknown 8,000,000 Unknown 40,000,000 Open Open Open Open Open Open Open Open Open Open - 18 or older Open Open 23,000 40,000,000 4,000,000 Unknown Unknown Unknown Open Open Open Open to 18 or older Invite only while in beta Open Blog A blog (a portmanteau of web log) is a website where entries are commonly displayed in reverse chronological order. "Blog" can also be used as a verb, meaning to maintain or add content to a blog. Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. The ability for readers to leave comments in an interactive format is an important part of many blogs. Most blogs are primarily textual, although some focus on art (artlog), photographs (photoblog), sketchblog, videos (vlog), music (MP3 blog), audio (podcasting) are part of a wider network of social media. Microblogging is another type of blogging which consists of blogs with very short posts. As of December 2007, blog search engine Technorati was tracking more than 112 million blogs. Topics in journalism Professional issues News • Reportage • Writing • Ethics • Objectivity • Values • Attribution • Defamation • Editorial independence • Education • Other topics Fields Arts • Business • Environment • Fashion • Music • Science • Sports • Trade • Video games • Weather Genres Advocacy journalism Citizen journalism Civic journalism Gonzo journalism Investigative journalism Information from Wikipedia 6 3/7/2016 Literary journalism Narrative journalism New Journalism Visual journalism Watchdog journalism Social impact Fourth Estate Freedom of the press Infotainment Media bias News propaganda Public relations Yellow journalism News media Newspapers Magazines News agencies Broadcast journalism Online journalism Photojournalism Alternative media Roles Journalist • Reporter • Editor • Columnist • Commentator • Photographer • News presenter • Meteorologist History Before blogging became popular, digital communities took many forms, including Usenet, commercial online services such as GEnie, BiX and the early CompuServe, e-mail lists nd Bulletin Board Systems (BBS). In the 1990s, Internet forum software, such as WebEx, created running conversations with "threads". Threads are topical connections between messages on a metaphorical "corkboard". Some have likened blogging to the MassObservation project of the mid-20th century. 1983–1990 (Pre-HTTP) Usenet was the primary serial medium included in the original definition of the World Wide Web.[3] It featured the Moderated Newsgroup which allowed all posting in a newsgroup to be under the control of an individual or small group. Most such newsgroups were simply moderated discussion forums, however, in 1983-84, one exception, named mod.ber, was created, named after and managed by an individual: Brian E. Redman. Regularly, Redman and a few associates posted summaries of interesting postings and threads taking place elsewhere on the net. With its serial journal publishing style, presence on the pre-HTTP web and strong similarity to the common blog form which features links to interesting and cool places on the net chosen by the blogger, mod.ber had many of the characteristics commonly associated with the term "blog".It ceased operation after approximately 8 months. Brad Templeton calls the newsgroup rec.humor.funny (which he founded) the world's oldest still existing blog. 1994–2001 Information from Wikipedia 7 3/7/2016 The modern blog evolved from the online diary, where people would keep a running account of their personal lives. Most such writers called themselves diarists, journalists, or journalers. A few called themselves "escribitionists". The Open Pages webring included members of the online-journal community. Justin Hall, who began eleven years of personal blogging in 1994 while a student at Swarthmore College, is generally recognized as one of the earliest bloggers, as is Jerry Pournelle. Another early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site in 1994. This practice of semi-automated blogging with live video together with text, was referred to as sousveillance, and such journals were also used as evidence in legal matters. Other forms of journals kept online also existed. A notable example was game programmer John Carmack's widely read journal, published via the finger protocol. Some of the very earliest bloggers, like Steve Gibson of sCary's Quakeholio (now Shacknews) and Stephen Heaslip of Blue's News (still running since 1995 with online archives back to July 1996), evolved from the Quake scene and Carmack's .plan updates. Steve Gibson was hired to blog full-time by Ritual Entertainment on February 8, 1997, possibly making him the first hired blogger. Websites, including both corporate sites and personal homepages, had and still often have "What's New" or "News" sections, often on the index page and sorted by date. One example of a news based "weblog" is the Drudge Report founded by the self-styled maverick reporter Matt Drudge, though apparently Drudge dislikes this classification. Another is the Institute for Public Accuracy which began posting news releases featuring several news-pegged one-paragraph quotes several times a week beginning in 1998. One noteworthy early precursor to a blog was the tongue-in-cheek personal website that was frequently updated by Usenet legend Kibo. Early weblogs were simply manually updated components of common websites. However, the evolution of tools to facilitate the production and maintenance of web articles posted in reverse chronological order made the publishing process feasible to a much larger, less technical, population. Ultimately, this resulted in the distinct class of online publishing that produces blogs we recognize today. For instance, the use of some sort of browser-based software is now a typical aspect of "blogging". Blogs can be hosted by dedicated blog hosting services, or they can be run using blog software, such as WordPress, Movable Type, blogger or LiveJournal, or on regular web hosting services. The term "weblog" was coined by Jorn Barger on 17 December 1997. The short form, "blog," was coined by Peter Merholz, who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in April or May of 1999. This was quickly adopted as both a noun and verb ("to blog," meaning "to edit one's weblog or to post to one's weblog"). After a slow start, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near-simultaneous arrival of the first hosted blog tools: Open Diary launched in October 1998, soon growing to thousands of online diaries. Open Diary innovated the reader comment, becoming the first blog community where readers could add comments to other writers' blog entries. Brad Fitzpatrick, a well known blogger started LiveJournal in March 1999. Andrew Smales created Pitas.com in July 1999 as an easier alternative to maintaining a "news page" on a website, followed by Diaryland in September 1999, focusing more on a personal diary community. Evan Williams and Meg Hourihan (Pyra Labs) launched blogger.com in August 1999 (purchased by Google in February 2003) Information from Wikipedia 8 3/7/2016 Blogging combined the personal web page with tools to make linking to other pages easier — specifically permalinks, blogrolls and TrackBacks. This, together with weblog search engines enabled bloggers to track the threads that connected them to others with similar interests. 2001–2004 Several broadly popular American blogs emerged in 2001: Andrew Sullivan's AndrewSullivan.com, Ron Gunzburger's Politics1.com, Taegan Goddard's Political Wire, Glenn Reynolds' Instapundit, Charles Johnson's Little Green Footballs, and Jerome Armstrong's MyDD — all blogging primarily on politics (two earlier popular American political blogs were Bob Somerby's Daily Howler launched in 1998 and Mickey Kaus' Kausfiles launched in 1999). By 2001, blogging was enough of a phenomenon that how-to manuals began to appear, primarily focusing on technique. The importance of the blogging community (and its relationship to larger society) increased rapidly. Established schools of journalism began researching blogging and noting the differences between journalism and blogging. Also in 2002, many blogs focused on comments by U.S. Senate Majority Leader Trent Lott. Senator Lott, at a party honoring U.S. Senator Strom Thurmond, praised Senator Thurmond by suggesting that the United States would have been better off had Thurmond been elected president. Lott's critics saw these comments as a tacit approval of racial segregation, a policy advocated by Thurmond's 1948 presidential campaign. This view was reinforced by documents and recorded interviews dug up by bloggers. Though Lott's comments were made at a public event attended by the media, no major media organizations reported on his controversial comments until after blogs broke the story. Blogging helped to create a political crisis that forced Lott to step down as majority leader. The impact of this story gave greater credibility to blogs as a medium of news dissemination. Though often seen as partisan gossips, bloggers sometimes lead the way in bringing key information to public light, with mainstream media having to follow their lead. More often, however, news blogs tend to react to material already published by the mainstream media. Since 2002, blogs have gained increasing notice and coverage for their role in breaking, shaping, and spinning news stories. The Iraq war saw bloggers taking measured and passionate points of view that go beyond the traditional left-right divide of the political spectrum. Blogging by established politicians and political candidates, to express opinions on war and other issues, cemented blogs' role as a news source. (See Howard Dean and Wesley Clark.) Meanwhile, an increasing number of experts blogged, making blogs a source of in-depth analysis. (See Daniel Drezner and J. Bradford DeLong.) The second Iraq war was the first "blog war" in another way: Iraqi bloggers gained wide readership, and one, Salam Pax, published a book of his blog. Blogs were also created by soldiers serving in the Iraq war. Such "warblogs" gave readers new perspectives on the realities of war, as well as often offering different viewpoints from those of official news sources. Blogging was used to draw attention to obscure news sources. For example, bloggers posted links to traffic cameras in Madrid as a huge anti-terrorism demonstration filled the streets in the wake of the March 11 attacks. Bloggers began to provide nearly-instant commentary on televised events, creating a secondary meaning of the word "blogging": to simultaneously transcribe and editorialize speeches and events shown on television. (For Information from Wikipedia 9 3/7/2016 example, "I am blogging Rice's testimony" means "I am posting my reactions to Condoleezza Rice's testimony into my blog as I watch her on television.") Real-time commentary is sometimes referred to as "liveblogging." 2004–present In 2004, the role of blogs became increasingly mainstream, as political consultants, news services and candidates began using them as tools for outreach and opinion forming. Even politicians not actively campaigning, such as the UK's Labour Party's MP Tom Watson, began to blog to bond with constituents. Minnesota Public Radio broadcast a program by Christopher Lydon and Matt Stoller called "The blogging of the President," which covered a transformation in politics that blogging seemed to presage. The Columbia Journalism Review began regular coverage of blogs and blogging. Anthologies of blog pieces reached print, and blogging personalities began appearing on radio and television. In the summer of 2004, both United States Democratic and Republican Parties' conventions credentialed bloggers, and blogs became a standard part of the publicity arsenal. Mainstream television programs, such as Chris Matthews' Hardball, formed their own blogs. Merriam-Webster's Dictionary declared "blog" as the word of the year in 2004. In 2004, Global Voices Online, a site which "aggregates, curates, and amplifies the global conversation online – shining light on places and people other media often ignore" surfaced, bringing to light bloggers from around the world. Today, the site has a relationship with Reuters and is responsible for breaking many global news stories. Blogs were among the driving forces behind the "Rathergate" scandal, to wit: (television journalist) Dan Rather presented documents (on the CBS show 60 Minutes) that conflicted with accepted accounts of President Bush's military service record. Bloggers declared the documents to be forgeries and presented evidence and arguments in support of that view, and CBS apologized for what it said were inadequate reporting techniques (see Little Green Footballs). Many bloggers view this scandal as the advent of blogs' acceptance by the mass media, both as a news source and opinion and as means of applying political pressure. Some bloggers have moved over to other media. The following bloggers (and others) have appeared on radio and television: Duncan Black (known widely by his pseudonym, Atrios), Glenn Reynolds (Instapundit), Markos Moulitsas Zúniga (Daily Kos), Alex Steffen (Worldchanging) and Ana Marie Cox (Wonkette). In counter-point, Hugh Hewitt exemplifies a mass media personality who has moved in the other direction, adding to his reach in "old media" by being an influential blogger. Some blogs were an important news source during the December 2004 Tsunami such as Medecins Sans Frontieres, which used SMS text messaging to report from affected areas in Sri Lanka and Southern India. Similarly, during Hurricane Katrina in August 2005 and the aftermath a few blogs which were located in New Orleans, including the Interdictor and Gulfsails were able to maintain power and an Internet connection and disseminate information that was not covered by the Main Stream Media. In the United Kingdom, The Guardian newspaper launched a redesign in September 2005, which included a daily digest of blogs on page 2. Also in June 2006, BBC News launched a weblog for its editors, following other news companies. In January 2005, Fortune magazine listed eight bloggers that business people "could not ignore": Peter Rojas, Xeni Jardin, Ben Trott, Mena Trott, Jonathan Schwartz, Jason Goldman, Robert Scoble, and Jason Calacanis. In 2007, Tim O'Reilly proposed a Blogger's Code of Conduct. Information from Wikipedia 10 3/7/2016 Types There are various types of blogs, and each differs in the way content is delivered or written. By media type A blog comprising videos is called a vlog, one comprising links is called a linklog, a site containing a portfolio of sketches is called a sketchblog or one comprising photos is called a photoblog.[15] Blogs with shorter posts and mixed media types are called tumblelogs. An Artlog is a form of art sharing and publishing in the format of a blog, but differentiated by the predominant use of and focus on Art work rather than text. A rare type of blog hosted on the Gopher Protocol is known as a Phlog Information from Wikipedia 11 3/7/2016 By device Blogs can also be defined by which type of device is used to compose it. A blog written by a mobile device like a mobile phone or PDA is called a moblog.[16] Genre Some blogs focus on a particular subject, such as political blogs, travel blogs, fashion blogs, project blogs, niche blogs, classical music blogs, legal blogs (often referred to as a blawgs) or dreamlogs. While not a legitimate type of blog, one used for the sole purpose of spamming is known as a Splog. A Slog (Site or website log) is a section or 'slice' of a regular business website, which is seamlessly integrated within the regular website structure but is produced with blogging software. Legal status of publishers A blog can be private, as in most cases, or it can be for business purposes. Blogs, either used internally to enhance the communication and culture in a corporation or externally for marketing, branding or PR purposes are called corporate blogs. Blog search engines Several blog search engines are used to search blog contents (also known as the blogosphere), such as blogdigger, Feedster, and Technorati. Technorati provides current information on both popular searches and tags used to categorize blog postings. Blogging Communities and Directories Several online communities exist that connect people to blogs and bloggers to other bloggers, including BlogCatalog and MyBlogLog. A collection of local blogs is sometimes referred to as a Bloghood. Popularity Recently, researchers have analyzed the dynamics of how blogs become popular. There are essentially two measures of this: popularity through citations, as well as popularity through affiliation (i.e. blogroll). The basic conclusion from studies of the structure of blogs is that while it takes time for a blog to become popular through blogrolls, permalinks can boost popularity more quickly, and are perhaps more indicative of popularity and authority than blogrolls, since they denote that people are actually reading the blog's content and deem it valuable or noteworthy in specific cases. Recently, through the mass popularity of sponsored post ventures such as PayPerPost (now known as Izea) a large number of personal blogs have started writing sponsored posts for advertisers wanting to boost buzz about new products and services. It has revolutionised the blogosphere almost in the same way that Google AdSense did. The blogdex project was launched by researchers in the MIT Media Lab to crawl the Web and gather data from thousands of blogs in order to investigate their social properties. It gathered this information for over 4 years, and autonomously tracked the most contagious information spreading in the blog community, ranking it by recency and popularity. It can thus be considered the first instantiation of a memetracker. The project is no longer active, but a similar function is now served by tailrank.com. Blogs are also given rankings by Technorati based on the number of incoming links and Alexa Internet based on the web hits of Alexa Toolbar users. In August 2006, Technorati listed the most linked-to blog as that of Chinese actress Xu Jinglei and the most-read blog as group-written Boing Boing. Gartner forecasts that blogging will peak in 2007, leveling off when the number of writers who maintain a personal website reaches 100 million. Gartner analysts expect that the novelty value of the medium will wear off as most people who are interested in the phenomenon have checked it out, and new bloggers will offset the number of writers who abandon their creation out of boredom. The firm estimates that there are more than 200 Information from Wikipedia 12 3/7/2016 million former bloggers who have ceased posting to their online diaries, creating an exponential rise in the amount of "dotsam" and "netsam" — that is to say, unwanted objects on the Web. It was reported by Chinese media Xinhua that the blog of Xu Jinglei received more than 50 million page views, claiming to be the most popular blog in the world.[20] In mid-2006, it also had the most incoming links of any blogs on the Internet. Blurring with the mass media Many bloggers, particularly those engaged in participatory journalism, differentiate themselves from the mainstream media, while others are members of that media working through a different channel. Some institutions see blogging as a means of "getting around the filter" and pushing messages directly to the public. Some critics worry that bloggers respect neither copyright nor the role of the mass media in presenting society with credible news. Bloggers and other contributors to user generated content are behind Time magazine naming their 2006 person of the year as "you". Many mainstream journalists, meanwhile, write their own blogs — well over 300, according to CyberJournalist.net's J-blog list. The first known use of a weblog on a news site was in August 1998, when Jonathan Dube of The Charlotte Observer published one chronicling Hurricane Bonnie. Blogs have also had an influence on minority languages, bringing together scattered speakers and learners; this is particularly so with blogs in Gaelic languages, whose creators can be found as far away from traditional Gaelic areas as Kazakhstan and Alaska. Minority language publishing (which may lack economic feasibility) can find its audience through inexpensive blogging. There are many examples of bloggers who have published books based on their blogs, e.g., Salam Pax, Ellen Simonetti, Jessica Cutler, ScrappleFace. Blog-based books have been given the name blook. A prize for the best blog-based book was initiated in 2005, the Lulu Blooker Prize. However success has been elusive offline, with many of these books not selling as well as their blogs. Only sex blogger Tucker Max cracked the New York Times Bestseller List. Blogging consequences The emergence of blogging has brought a range of legal liabilities and other often unforeseen consequences. One area of concern is the issue of bloggers releasing proprietary or confidential information. Another area of concern is blogging and defamation. A third area of concern is employees who write about aspects of their place of employment or their personal lives, and then face loss of employment or other adverse consequences. A number of examples of blogging and its sometimes negative or unforeseen consequences are cited here. Defamation or liability Several cases have been brought before the national courts against bloggers concerning issues of defamation or liability. The courts have returned with mixed verdicts. Internet Service Providers (ISPs), in general, are immune from liability for information that originates with Third Parties (U.S. Communications Decency Act and the EU Directive 2000/31/EC). In John Doe v. Patrick Cahill, the Delaware Supreme Court held that stringent standards had to be met to unmask anonymous bloggers, and also took the unusual step of dismissing the libel case itself (as unfounded under American libel law) rather than referring it back to the trial court for reconsideration. In a bizarre twist, the Cahills were able to obtain the identity of John Doe, who turned out to be the person they suspected: the Information from Wikipedia 13 3/7/2016 town's mayor, Councilman Cahill's political rival. The Cahills amended their original complaint, and the mayor settled the case rather than going to trial. In Malaysia, eight Royal Dutch Shell Group companies collectively obtained in June 2004 an Interim Injunction and Restraining Order against a Shell whistleblower, a Malaysian geologist and former Shell employee, Dr John Huong. The proceedings are in respect of alleged defamatory postings attributed to Dr Huong on a weblog hosted in North America but owned and operated by an 89 year old British national, Alfred Donovan, a long term critic of Shell. The Shell action is directed solely against Dr Huong. Further proceedings against Dr Huong were issued by the same plaintiff companies in 2006 in respect of publications on Donovan weblog sites in 2005 and 2006. The further proceedings include a "Notice to Show Cause" relating to a "contempt of court" action potentially punishable by imprisonment. The contempt hearing and a related application by the eight Royal Dutch Shell plaintiff companies for Dr Huong to produce Alfred Donovan for cross-examination in connection with an affidavit Donovan provided, was scheduled to be heard in the High Court of Malay in Kuala Lumpur on 17 August 2006. Donovan's principle weblog is royaldutchshellplc.com. In January 2007, two prominent political bloggers, Jeff Ooi and Ahiruddin Attan were sued by pro-government newspaper, The New Straits Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin bin Aun and Brenden John a/l John Pereira over an alleged defamation. The plaintiff was supported by the Malaysian government. Following the suit, the Malaysian government proposed to "register" all bloggers in Malaysia in order to better control parties against their interest. [27]. This is the first such legal case against bloggers in the country. In Britain, a college lecturer contributed to a blog in which she referred to a politician (who had also expressed his views in the same blog) using various uncomplimentary names, including referring to him as a "Nazi". The politician found out the real name of the lecturer (she wrote under a pseudonym) via the ISP and successfully sued her for £10,000 in damages and £7,200 costs. In the United States blogger Aaron Wall was sued by Traffic Power for defamation and publication of trade secrets in 2005. According to Wired Magazine, Traffic Power had been "banned from Google for allegedly rigging search engine results." Wall and other "white hat" search engine optimization consultants had exposed Traffic Power in what they claim was an effort to protect the public. The case was watched by many bloggers because it addressed the murky legal question of who's liable for comments posted on blogs. Employment Losing one's employment as a consequence of personal blog commentary about the place of employment has become so commonplace that there is now an informal verb for the event: "dooced". The word dooce originates from the pseudonym of Heather Armstrong, who lost her job after writing satirical accounts of her place of employment on her personal blog. In general, attempts at hiding the blogger's name and/or the place of employment in anonymity have proved ineffective at protecting the blogger. Employees who blog about elements of their place of employment raise the issue of employee branding, since their activities can begin to affect the brand recognition of their employer. Ellen Simonetti, a Delta Air Lines flight attendant, was fired by the airline for photos of herself in uniform on an airplane and comments posted on her blog "Queen of the Sky: Diary of a Flight Attendant" which her employer deemed inappropriate. This case highlighted the issue of personal blogging and freedom of expression vs. employer rights and responsibilities, and so it received wide media attention. Simonetti took legal action against the airline for "wrongful termination, defamation of character and lost future wages".The suit is postponed while Delta is in bankruptcy proceedings (court docket). Information from Wikipedia 14 3/7/2016 In the spring of 2006, Erik Ringmar, a tenured senior lecturer at the London School of Economics was ordered by the convenor of his department to "take down and destroy" his blog in which he discussed the quality of education at the school.. Mark Cuban, owner of the Dallas Mavericks, was recently fined during the 2006 NBA playoffs for criticizing NBA officials on the court and in his blog. Mark Jen was terminated in 2005 after a mere 10 days of employment at Google for discussing corporate secrets on his personal blog. In India, blogger Gaurav Sabnis resigned from IBM after his posts exposing the false claims of a management school, IIPM, led to management of IIPM threatening to burn their IBM laptops as a sign of protest against him. Jessica Cutler, aka "The Washingtonienne", blogged about her sex life while employed as a congressional assistant. After the blog was discovered and she was fired,[40] she wrote a novel based on her experiences and blog: The Washingtonienne: A Novel. Cutler is presently being sued by one of her former lovers in a case that could establish the extent to which bloggers are obligated to protect the privacy of their real life associates. Catherine Sanderson, aka Petite Anglaise, lost her job in Paris at a British accountancy firm as a consequence of blogging. Although given in the blog in a fairly anonymous manner, some of the descriptions of the firm and some of its people were less than flattering. Sanderson later won a compensation claim case against the British firm, however. On the other hand, Penelope Trunk, writing in the Globe in 2006, was one of the first to point out that a large portion of bloggers are professionals, and a well written blog can actually help attract employers. Political dangers Blogging can sometimes have unforeseen consequences in politically sensitive areas. Blogs are much harder to control than broadcast or even print media. As a result totalitarian and authoritarian regimes often seek to suppress down blogs, or to punish those who maintain them. In Singapore, two ethnic Chinese were imprisoned under the country’s anti-sedition law for posting antiMuslim remarks in their weblogs. Egyptian blogger Kareem Amer was charged with insulting the Egyptian president Hosni Mubarak and an Islamic institution through his online blog. It is the first time in the history of Egypt that a blogger was prosecuted. After a brief trial session that took place in Alexandria, the blogger was found guilty and sentenced to prison terms of three years for insulting Islam and inciting sedition, and one year for insulting Mubarak. Egyptian blogger Abdel Monem Mahmoud was arrested in April 2007 for things written in his blog. Monem, for whom a campaign has been taken up at, is a member of the Muslim Brotherhood. After expressing opinions in his personal weblog about the state of the Sudanese armed forces, Jan Pronk, United Nations Special Representative for the Sudan, was given three days notice to leave Sudan. The Sudanese army had demanded his deportation. Information from Wikipedia 15 3/7/2016 Other consequences One unfortunate consequence of blogging is the possibility of attacks or threats against the blogger, sometimes without apparent reason. Kathy Sierra, author of the innocuous blog Creating Passionate Users, was the target of such vicious threats and misogynistic insults that she canceled her keynote speech at a technology conference in San Diego, fearing for her safety. While a blogger's anonymity is often tenuous, internet trolls who would attack a blogger with threats or insults can be emboldened by anonymity. Sierra and supporters initiated an online discussion aimed at countering abusive online behavior, and developed a blogger's code of conduct. Collaborative blog A collaborative blog is a type of weblog which publishes posts written by multiple users. The majority of high profile collaborative blogs are based around a single uniting theme, such as politics or technology. While the traditional popular (and rather insulting) view of the weblog is that of the lone blogger hunched over his or her keyboard in their parents' basement, in recent years the blogosphere has seen the emergence and growing popularity of more collaborative efforts, often set up by already established bloggers wishing to pool time and resources to both reduce the pressure of maintaining a popular website and to attract a larger readership. Types While every collaborative blog is unique they can usually be placed in one of two broad categories: Invite only An Invite Only collaborative blog is one in which a founder blogger personally selects a small group of cobloggers, inviting them to contribute to his or her blog. The Invite Only blog typically focues on a single common interest subject - i.e. politics, legal issues or, occasionally, comedy. For instance, in July of 2003 Chris Bertram established Crooked Timber, a collaborative Invite Only blog frequented by such established bloggers and academics as Kieran Healy, Ted Barlow and Henry Farrell, beginning with the introductory post: Crooked Timber is a cabal of philosophers, politicians manque, would-be journalists, sociologues, financial gurus, dilletantes and flaneurs who have assembled to bring you the benefit of their practical and theoretical wisdom on matters historical, literary, political, philosophical, economic, sociological, cultural, sporting, artistic, cinematic, musical, operatic, comedic, tragic, poetic, televisual etc. etc., all from perspectives somewhere between Guy Debord, Henry George and Dr Stephen Maturin. We hope you’ll enjoy the show. Open invite Conversely, Open Invite collaborative blogs allow any user to register for a blogging account, providing instant access. Perhaps the most famous of these blogs is DailyKos, a left-leaning collaborative blog founded in 2002 by Markos Moulitsas. DailyKos allows bloggers the opportunity to post their opinions on the site without preapproval of the content. Open Invite collaborative blogs succeed on the basis that the community acts to weed out trolls, spammers and other troublemakers. Much like online forums (and Wikipedia itself), the accessible nature of the Open Invite Information from Wikipedia 16 3/7/2016 collaborative site is protected by dedicated moderators and fellow bloggers who will act quickly to quell any signs of spamming. Advantages For bloggers In recent years the blogosphere has seen the emergence of many new Invite Only collaborative blogs, each accepting contributions from a group of established bloggers. While it may be unfair to ascribe this trend to any particular cause it is often the case that the pressures of maintaining a popular individual blog for an extended period of time can become too great, leading the successful blogger to naturally tend towards a lower pressure collaborative effort. On well-known example of this phenomenon can be found at Protein Wisdom, a popular blog written by surreal conservative Jeff Goldstein. A much publicised incident in which Goldstein was harassed by University of Arizona adjunct lecturer Deborah Frisch - combined with various other real-life obligations - led Goldstein to retool Protein Wisdom as a collaborative site frequented by a number of guest posters while Goldstein partially withdrew. Today Goldstein blogs both at Protein Wisdom and the high profile collaborative blog Pajamas Media. Collaborative blogs (especially of the Open Invite variety) allow those without their own personal site (or those with poorly-trafficked sites) the opportunity to present their opinions to a much larger audience than they would typically have access. For readers A primary advantage for the readers of collaborative blogs is the simple fact that a collaborative effort usually make for a more regularly updated site. It is not unusual to find collaborative weblogs publishing new material 24 hours a day, allowing readers the opportunity to read new material on an almost constant basis. Disadvantages While Open Invite collaborative blogs encourage vibrant discussion on such subjects as politics and current affairs they unfortunately tend to attract bloggers who are more interested in promoting personal websites and baiting readers with controversial viewpoints. The task of policing a large collaborative weblog can be enormous, requiring the dedication of community-minded moderators to remove/modify material that conflicts with the terms of service and general ethos of the site. In Invite Only collaborative blogs the problems can become much more serious, if easier to police. While most Invite Only collaborative blogs consist of a small number of like-minded bloggers it is often the case that individuals within the group differ in opinion on divisive issues (i.e. abortion or the War on Terror). While infighting on these blogs can make for interesting reading it can sometimes become a problem. Popularity In recent years the popularity of collaborative blogs has soared. In fact, at time of writing seven of the top ten weblogs listed in N.Z. Bear's Blog Ecosystem (a popular league table of blogs based on the number of incoming links) employ collaboration of some sort. Information from Wikipedia 17 3/7/2016 In addition to the growth in traditional collaborative blogs the last two years has seen the emergence of a professional variety of collaboration - made up of either professional, paid commentators such as The Huffington Post (though arguably The Post does not qualify as a true blog) or high profile bloggers engaged in a profit-sharing scheme (i.e. Pajamas Media). Wiki A wiki is software that allows users to create, edit, and link web pages easily. Wikis are often used to create collaborative websites and to power community websites. They are being installed by businesses to provide affordable and effective Intranets and for Knowledge Management. Ward Cunningham, developer of the first wiki, WikiWikiWeb, originally described it as "the simplest online database that could possibly work". ne of the best known wikis is Wikipedia. History Wiki Wiki is a reduplication of wiki, a Hawaiian word for "fast." In English, "wiki" is an abbreviation of it. WikiWikiWeb was the first site to be called a wiki. Ward Cunningham started developing WikiWikiWeb in 1994, and installed it on the Internet domain c2.com on March 25, 1995. It was named by Cunningham, who remembered a Honolulu International Airport counter employee telling him to take the "Wiki Wiki" Chance RT-52 shuttle bus line that runs between the airport's terminals. According to Cunningham, "I chose wiki-wiki as an alliterative substitute for 'quick' and thereby avoided naming this stuff quick-web." Cunningham was in part inspired by Apple's HyperCard. Apple had designed a system allowing users to create virtual "card stacks" supporting links among the various cards. Cunningham developed Vannevar Bush's ideas by allowing users to "comment on and change one another's text". In the early 2000s, wikis were increasingly adopted in enterprise as collaborative software. Common uses included project communication, intranets, and documentation, initially for technical users. Today some companies use wikis as their only collaborative software and as a replacement for static intranets. There may be greater use of wikis behind firewalls than on the public Internet. On March 15, 2007, wiki entered the Oxford English Dictionary Online. Characteristics A wiki enables documents to be written collaboratively, in a simple markup language using a web browser. A single page in a wiki is referred to as a "wiki page", while the entire collection of pages, which are usually well interconnected by hyperlinks, is "the wiki". A wiki is essentially a database for creating, browsing, and searching through information. A defining characteristic of wiki technology is the ease with which pages can be created and updated. Generally, there is no review before modifications are accepted. Many wikis are open to alteration by the general public without requiring them to register user accounts. Sometimes logging in for a session is recommended, to create a "wiki-signature" cookie for signing edits automatically. Many edits, however, can be made in real-time and appear almost instantly online. This can facilitate abuse of the system. Private wiki servers require user authentication to edit pages, and sometimes even to read them. Information from Wikipedia 18 3/7/2016 Editing wiki pages Ordinarily, the structure and formatting of wiki pages are specified with a simplified markup language, sometimes known as "wikitext". For example, starting a line of text with an asterisk ("*") is often used to enter it in a bulleted list. The style and syntax of wikitexts can vary greatly among wiki implementations, some of which also allow HTML tags. The reason for taking this approach is that HTML, with its many cryptic tags, is not very legible, making it hard to edit. Wikis therefore favour plain text editing, with fewer and simpler conventions than HTML, for indicating style and structure. MediaWiki syntax Equivalent HTML Rendered output "Take some more tea," the March Hare said to Alice, very earnestly. <p>"Take some more tea," the March Hare said to Alice, very earnestly.</p> "Take some more tea," the March Hare said to Alice, very earnestly. "I've had nothing yet," Alice replied in an offended tone: "so I can't take more." <p>"I've had nothing yet," Alice replied in an offended tone: "so I can't take more."</p> "I've had nothing yet," Alice replied in an offended tone: "so I can't take more." "You mean you can't take ''less''," said the Hatter: "it's very easy to take ''more'' than nothing." <p>"You mean you can't take <i>less</i>," said the Hatter: "it's very easy to take <i>more</i> than nothing."</p> "You mean you can't take less," said the Hatter: "it's very easy to take more than nothing." (Quotation above from Alice's Adventures in Wonderland by Lewis Carroll) Although limiting access to HTML and Cascading Style Sheets (CSS) of wikis limits user ability to alter the structure and formatting of wiki content, there are some benefits. Limited access to CSS promotes consistency in the look and feel and having JavaScript disabled prevents a user from implementing code, which may limit access for other users. Increasingly, wikis are making "WYSIWYG" ("What You See Is What You Get") editing available to users, usually by means of JavaScript or an ActiveX control that translates graphically entered formatting instructions, such as "bold" and "italics", into the corresponding HTML tags or wikitext. In those implementations, the markup of a newly edited, marked-up version of the page is generated and submitted to the server transparently, and the user is shielded from this technical detail. Many implementations (for example MediaWiki) allow users to supply an "edit summary" when they edit a page. This is a short piece of text (usually one line) summarizing the changes. It is not inserted into the article, but is stored along with that revision of the page, allowing users to explain what has been done and why; this is similar to a log message when committing changes to a revision control system. Most wikis keep a record of changes made to wiki pages; often every version of the page is stored. This means that authors can revert to an older version of the page, should it be necessary because a mistake has been made or the page has been vandalised. Information from Wikipedia 19 3/7/2016 Navigation Within the text of most pages there are usually a large number of hypertext links to other pages. This form of non-linear navigation is more "native" to wiki than structured/formalized navigation schemes. That said, users can also create any number of index or table of contents pages, with hierarchical categorization or whatever form of organization they like. These may be challenging to maintain by hand, as multiple authors create and delete pages in an ad hoc manner. Wikis generally provide one or more ways to categorize or tag pages, to support the maintenance of such index pages. Most wikis have a backlink feature, an easy way to see what pages link to the page you're currently on. It is typical in a wiki to create links to pages that do not yet exist, as a way to invite others to share what they know about a subject new to the wiki. Linking and creating pages Links are created using a specific syntax, the so-called "link pattern". Originally, most wikis used CamelCase to name pages and create links. These are produced by capitalizing words in a phrase and removing the spaces between them (the word "CamelCase" is itself an example). While CamelCase makes linking very easy, it also leads to links which are written in a form that deviates from the standard spelling. CamelCase-based wikis are instantly recognizable because they have many links with names such as "TableOfContents" and "BeginnerQuestions". It is possible for a wiki to render the visible anchor for such links "pretty" by reinserting spaces, and possibly also reverting to lower case. However, this reprocessing of the link to improve the readability of the anchor is limited by the loss of capitalization information caused by CamelCase reversal. For example, "RichardWagner" should be rendered as "Richard Wagner", whereas "PopularMusic" should be rendered as "popular music". There is no easy way to determine which capital letters should remain capitalized. As a result, many wikis now have "free linking" using brackets, and some disable CamelCase by default. Searching Most wikis offer at least a title search, and sometimes a full-text search. The scalability of the search depends on whether the wiki engine uses a database. Indexed database access is necessary for high speed searches on large wikis. Alternatively, external search engines such as Google can sometimes be used on wikis with limited searching functions in order to obtain more precise results. However, a search engine's indexes can be very out of date (days, weeks or months) for many websites. Trust and security Controlling changes History comparison reports highlight the changes between two revisions of a page. Wikis are generally designed with the philosophy of making it easy to correct mistakes, rather than making it difficult to make them. Thus, while wikis are very open, they provide a means to verify the validity of recent additions to the body of pages. The most prominent, on almost every wiki, is the "Recent Changes" page—a specific list numbering recent edits, or a list of all the edits made within a given time frame. Some wikis can filter the list to remove minor edits and edits made by automatic importing scripts ("bots"). Information from Wikipedia 20 3/7/2016 From the change log, other functions are accessible in most wikis: the Revision History showing previous page versions; and the diff feature, highlighting the changes between two revisions. Using the Revision History, an editor can view and restore a previous version of the article. The diff feature can be used to decide whether or not this is necessary. A regular wiki user can view the diff of an edit listed on the "Recent Changes" page and, if it is an unacceptable edit, consult the history, restoring a previous revision; this process is more or less streamlined, depending on the wiki software used. In case unacceptable edits are missed on the "Recent Changes" page, some wiki engines provide additional content control. It can be monitored to ensure that a page, or a set of pages, keeps its quality. A person willing to maintain pages will be warned of modifications to the pages, allowing him or her to verify the validity of new editions quickly. Trustworthiness Critics of publicly-editable wiki systems argue that these systems could be easily tampered with; while proponents argue that the community of users can catch malicious content and correct it. Lars Aronsson, a data systems specialist, summarizes the controversy as follows: “ Most people, when they first learn about the wiki concept, assume that a website that can be edited by anybody would soon be rendered useless by destructive input. It sounds like offering free spray cans next to a grey concrete wall. The only likely outcome would be ugly graffiti and simple tagging, and many artistic efforts would not be long lived. Still, it seems to work very well. ” Security The open philosophy of most wikis, allowing anyone to edit content, does not ensure that all editors are wellmeaning. Vandalism can be a major problem. In larger wiki sites, such as those run by the Wikimedia Foundation, vandalism can go unnoticed for a period of time. Wikis by their very nature are susceptible to intentional disruption, known as "trolling". Wikis tend to take a soft security[9] approach to the problem of vandalism; making damage easy to undo rather than attempting to prevent damage. Larger wikis often employ sophisticated methods, such as bots that automatically identify and revert vandalism and JavaScript enhancements that show how many characters have been added in each edit. In this way vandalism can be limited to just "minor vandalism" or "sneaky vandalism", where the characters added/eliminated are so few that bots do not identify them and users do not pay much attention to them. The amount of vandalism a wiki receives depends on how open the wiki is. For instance, some wikis allow unregistered users, identified by their IP addresses, to edit content, whilst others limit this function to just registered users. What most wikis do is allow IP editing, but privilege registered users with some extra functions to lend them a hand in editing; on most wikis, becoming a registered user is very simple and can be done in seconds, but detains the user from using the new editing functions until either some time passes, as in the English Wikipedia, where registered users must wait for three days after creating an account in order to gain access to the new tool, or until several constructive edits have been made in order to prove the user's trustworthiness and usefulness on the system, as in the Portuguese Wikipedia, where users require at least 15 constructive edits before authorization to use the added tools. Basically, "closed up" wikis are more secure and reliable but grow slowly, whilst more open wikis grow at a steady rate but result in being an easy target for vandalism. A clear example of this would be that of Wikipedia and Citizendium. The first is extremely open, allowing anyone with a computer and internet access to edit it, making it grow rapidly, whilst the latter requires the users' real name and a biography of themselves, affecting the growth of the wiki but creating an almost "vandalism-free" ambiance. Information from Wikipedia 21 3/7/2016 Wiki software architecture Nearly all wikis are implemented as server software. However, some have been implemented purely on the client-side using Javascript, and some have been built on top of peer-to-peer networks. Wiki communities Many wiki communities are private, particularly within enterprises. They are often used as internal documentation for in-house systems and applications. The "open to everyone", all-encompassing nature of Wikipedia is a significant factor in its growth, while many other wikis are highly specialized. There also exist WikiNodes which are pages on wikis that describe related wikis. They are usually organized as neighbors and delegates. A neighbor wiki is simply a wiki that may discuss similar content or may otherwise be of interest. A delegate wiki is a wiki that agrees to have certain content delegated to that wiki. One way of finding a wiki on a specific subject is to follow the wiki-node network from wiki to wiki; another is to take a Wiki "bus tour," for example: Wikipedia's Tour Bus Stop. Domain names containing "wiki" are growing in popularity to support specific niches. For those interested in creating their own wiki, there are many publicly available "wiki farms", some of which can also make private, password-protected wikis. PeanutButterWiki, Socialtext, Wetpaint, and Wikia are popular examples of such services. For more information, see List of wiki farms. Note that free wiki farms generally contain advertising on every page. For those interested in how to build a successful wiki community, and encourage wiki use, Wikipatterns is a guide to the stages of wiki adoption and a collection of communitybuilding and content-building strategies. The English-language Wikipedia has the largest user base among all wikis and ranks in the top twenty among all websites in terms of traffic. Other large wikis include the WikiWikiWeb, Memory Alpha, Wikitravel, World66 and Susning.nu, a Swedish-language knowledge base. The largest wikis are listed and updated on Wikimedia's "meta" wiki. Web 2.0 On September 30, 2005, Tim O'Reilly wrote a piece summarizing his view of Web 2.0. The mind-map pictured above (constructed by Markus Angermeier on November 11, 2005) sums up some of the memes of Web 2.0, with example-sites and services attached. In studying and/or promoting web-technology, the phrase Web 2.0 can refer to a perceived second generation of web-based communities and hosted services — such as social-networking sites, wikis, and folksonomies — which aim to facilitate creativity, collaboration, and sharing between users. The term gained currency following the first O'Reilly Media Web 2.0 conference in 2004. Although the term suggests a new version of the World Wide Web, it does not refer to an update to any technical specifications, but to changes in the ways software developers and end-users use webs. According to Tim O'Reilly, "Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform." Information from Wikipedia 22 3/7/2016 Some technology experts, notably Tim Berners-Lee, have questioned whether one can use the term in a meaningful way, since many of the technology components of "Web 2.0" have existed since the early days of the Web. An IBM social networking analyst, Dario de Judicibus, has proposed a different definition which is more focused on social interactions and architectural implementation: "Web 2.0 is a knowledge-oriented environment where human interactions generate content that is published, managed and used through network applications in a service-oriented architecture." Defining "Web 2.0" In alluding to the version-numbers that commonly designate software upgrades, the phrase "Web 2.0" hints at an improved form of the World Wide Web. Technologies such as weblogs (blogs), social bookmarking, wikis, podcasts, RSS feeds (and other forms of many-to-many publishing), social software, and web application programming interfaces (APIs) provide enhancements over read-only websites. Stephen Fry (actor, author, and broadcaster), who writes a technology column in the British Guardian newspaper, describes Web 2.0 as "an idea in people's heads rather than a reality. It’s actually an idea that the reciprocity between the user and the provider is what's emphasized. In other words, genuine interactivity, if you like, simply because people can upload as well as download". The idea of "Web 2.0" can also relate to a transition of some websites from isolated information silos to interlinked computing platforms that function like locally-available software in the perception of the user. Web 2.0 also includes a social element where users generate and distribute content, often with freedom to share and re-use. This can allegedly result in a rise in the economic value of the web as users can do more online. Tim O'Reilly regards Web 2.0 as business embracing the web as a platform and using its strengths (global audiences, for example). O'Reilly considers that Eric Schmidt's abridged slogan, don't fight the Internet, encompasses the essence of Web 2.0 — building applications and services around the unique features of the Internet, as opposed to building applications and expecting the Internet to suit as a platform (effectively "fighting the Internet"). In the opening talk of the first Web 2.0 conference, O'Reilly and John Battelle summarized what they saw as the themes of Web 2.0. They argued that the web had become a platform, with software above the level of a single device, leveraging the power of the "Long Tail", and with data as a driving force. According to O'Reilly and Battelle, an architecture of participation where users can contribute website content creates network effects. Web 2.0 technologies tend to foster innovation in the assembly of systems and sites composed by pulling together features from distributed, independent developers (a kind of "open source" development and an end to the software-adoption cycle (the so-called "perpetual beta"). Web 2.0 technology allegedly encourages lightweight business models enabled by syndication of content and of service and by ease of picking-up by early adopters. Tim O'Reilly provided examples of companies or products that embody these principles in his description of his four levels in the hierarchy of Web 2.0-ness. Level-3 applications, the most "Web 2.0"-oriented, only exist on the Internet, deriving their effectiveness from the inter-human connections and from the network effects that Web 2.0 makes possible, and growing in effectiveness in proportion as people make more use of them. O'Reilly gave as examples eBay, Craigslist, Wikipedia, del.icio.us, Skype, dodgeball and AdSense. Level-2 applications can operate offline but gain advantages from going online. O'Reilly cited Flickr, which benefits from its shared photo-database and from its community-generated tag database. Level-1 applications operate offline but gain features online. O'Reilly pointed to Writely (now Google Docs & Spreadsheets) and iTunes (because of its Information from Wikipedia 23 3/7/2016 music-store portion). Level-0 applications work as well offline as online. O'Reilly gave the examples of MapQuest, Yahoo! Local and Google Maps (mapping-applications using contributions from users to advantage can rank as "level 2"). Non-web applications like email, instant-messaging clients and the telephone fall outside the above hierarchy. Some authors understand 2.0 as "all those Internet utilities and services sustained in a data base which can be modified by users whether in its content (adding, changing or deleting- information or associating metadates with the existing information), or how to display them, or in content and external aspect simultaneously." (Ribes, 2007) Characteristics of "Web 2.0" Web 2.0 websites allow users to do more than just retrieve information. They can build on the interactive facilities of "Web 1.0" to provide "Network as platform" computing, allowing users to run software-applications entirely through a browser. Users can own the data on a Web 2.0 site and exercise control over that data.[13][12] These sites may have an "Architecture of participation" that encourages users to add value to the application as they use it.[12][2] This stands in contrast to very old traditional websites, the sort which limited visitors to viewing and whose content only the site's owner could modify. Web 2.0 sites often feature a rich, user-friendly interface based on Ajax[12][2], Flex or similar rich media. The sites may also have social-networking aspects. The concept of Web-as-participation-platform captures many of these characteristics. Bart Decrem, a founder and former CEO of Flock, calls Web 2.0 the "participatory Web" and regards the Web-as-information-source as Web 1.0. The impossibility of excluding group-members who don’t contribute to the provision of goods from sharing profits gives rise to the possibility that rational members will prefer to withhold their contribution of effort and free-ride on the contribution of others. Technology overview The sometimes complex and continually evolving technology infrastructure of Web 2.0 includes serversoftware, content-syndication, messaging-protocols, standards-oriented browsers with plugins and extensions, and various client-applications. The differing, yet complementary approaches of such elements provide Web 2.0 sites with information-storage, creation, and dissemination challenges and capabilities that go beyond what the public formerly expected in the environment of the so-called "Web 1.0". Web 2.0 websites typically include some of the following features/techniques: Information from Wikipedia rich Internet application techniques, often Ajax-based semantically valid XHTML and HTML markup microformats extending pages with additional semantics folksonomies (in the form of tags or tagclouds, for example) Cascading Style Sheets to aid in the separation of presentation and content REST and/or XML- and/or JSON-based APIs syndication, aggregation and notification of data in RSS or Atom feeds mashups, merging content from different sources, client- and server-side weblog-publishing tools wiki or forum software, etc., to support user-generated content 24 3/7/2016 Innovations sometimes associated with "Web 2.0" Web-based applications and desktops The richer user-experience afforded by Ajax has prompted the development of websites that mimic personal computer applications, such as word processing, the spreadsheet, and slide-show presentation. WYSIWYG wiki sites replicate many features of PC authoring applications. Still other sites perform collaboration and project management functions. In 2006 Google, Inc. acquired one of the best-known sites of this broad class, Writely.[16] Several browser-based "operating systems" have been developed, including EyeOS and YouOS. They essentially function as application platforms, not as operating systems per se. These services mimic the user experience of desktop operating-systems, offering features and applications similar to a PC environment. They have as their distinguishing characteristic the ability to run within any modern browser. Numerous web-based application services appeared during the dot-com bubble of 1997–2001 and then vanished, having failed to gain a critical mass of customers. In 2005, WebEx acquired one of the better-known of these, Intranets.com, for USD45 million.[19] Rich Internet applications Recently, rich-Internet application techniques such as Ajax, Adobe Flash, Flex, and Silverlight have evolved that have the potential to improve the user-experience in browser-based applications. These technologies allow a web-page to request an update for some part of its content, and to alter that part in the browser, without needing to refresh the whole page at the same time. Server-side software Functionally, Web 2.0 applications build on the existing Web server architecture, but rely much more heavily on back-end software. Syndication differs only nominally from the methods of publishing using dynamic content management, but web services typically require much more robust database and workflow support, and become very similar to the traditional intranet functionality of an application server. Vendor approaches to date fall either under a universal server approach (which bundles most of the necessary functionality in a single server platform) or under a web-server plugin approach (which uses standard publishing tools enhanced with API interfaces and other tools). Client-side software The extra functionality provided by Web 2.0 depends on the ability of users to work with the data stored on servers. This can come about through forms in an HTML page, through a scripting language such as Javascript / Ajax, or through Flash, Silverlight or Java Applets. These methods all make use of the client computer to reduce server workloads and to increase the responsiveness of the application. XML and RSS Advocates of "Web 2.0" may regard syndication of site content as a Web 2.0 feature, involving as it does standardized protocols, which permit end-users to make use of a site's data in another context (such as another website, a browser plugin, or a separate desktop application). Protocols which permit syndication include RSS (Really Simple Syndication — also known as "web syndication"), RDF (as in RSS 1.1), and Atom, all of them Information from Wikipedia 25 3/7/2016 XML-based formats. Observers have started to refer to these technologies as "Web feed" as the usability of Web 2.0 evolves and the more user-friendly Feeds icon supplants the RSS icon. Specialized protocols Specialized protocols such as FOAF and XFN (both for social networking) extend the functionality of sites or permit end-users to interact without centralized websites. Web APIs Machine-based interaction, a common feature of Web 2.0 sites, uses two main approaches to Web APIs, which allow web-based access to data and functions: REST and SOAP. 1. 2. REST (Representational State Transfer) Web APIs use HTTP alone to interact, with XML or JSON payloads; SOAP involves POSTing more elaborate XML messages and requests to a server that may contain quite complex, but pre-defined, instructions for the server to follow. Often servers use proprietary APIs, but standard APIs (for example, for posting to a blog or notifying a blog update) have also come into wide use. Most communications through APIs involve XML (eXtensible Markup Language) or JSON payloads. See also Web Services Description Language (WSDL) (the standard way of publishing a SOAP API) and this list of Web Service specifications. Economics and "Web 2.0" The analysis of the economic implications of "Web 2.0" applications and loosely-associated technologies such as wikis, blogs, social-networking, open-source, open-content, file-sharing, peer-production, etc. has also gained scientific attention. This area of research investigates the implications Web 2.0 has for an economy and the principles underlying the economy of Web 2.0. Don Tapscott and Anthony D. Williams argue in their book Wikinomics: How Mass Collaboration Changes Everything (2006) that the economy of "the new web" depends on mass collaboration. Tapscott and Williams regard it as important for new media companies to find ways of how to make profit with the help of Web 2.0. The prospective Internet-based economy that they term "Wikinomics" would depend on the principles of openness, peering, sharing, and acting globally. They identify seven Web 2.0 business-models (peer pioneers, ideagoras, prosumers, new Alexandrians, platforms for participation, global plantfloor, wiki workplace). Organizations could make use of these principles and models in order to prosper with the help of Web 2.0-like applications: “Companies can design and assemble products with their customers, and in some cases customers can do the majority of the value creation”. “In each instance the traditionally passive buyers of editorial and advertising take active, participatory roles in value creation.“ Tapscott and Williams suggest business strategies as “models where masses of consumers, employees, suppliers, business partners, and even competitors cocreate value in the absence of direct managerial control”. Tapscott and Williams see the outcome as an economic democracy. Some other views in the scientific debate agree with Tapscott and Williams that value-creation increasingly depends on harnessing open source/content, networking, sharing, and peering, but disagree that this will result Information from Wikipedia 26 3/7/2016 in an economic democracy, predicting a subtle form and deepening of exploitation, in which Internet-based global outsourcing reduces labour-costs. In such a view, the economic implications of a new web might include on the one hand the emergence of new business-models based on global outsourcing, whereas on the other hand non-commercial online platforms could undermine profit-making and anticipate a co-operative economy. For example, Tiziana Terranova speaks of "free labor" (performed without payment) in the case where prosumers produce surplus value in the circulation-sphere of the cultural industries [23] Criticism Given the lack of set standards as to what "Web 2.0" actually means, implies, or requires, the term can mean radically different things to different people. The argument exists that "Web 2.0" does not represent a new version of the World Wide Web at all, but merely continues to use so-called "Web 1.0" technologies and concepts. Note that techniques such as Ajax do not replace underlying protocols like HTTP, but add an additional layer of abstraction on top of them. Many of the ideas of Web 2.0 had already featured in implementations on networked systems well before the term "Web 2.0" emerged. Amazon.com, for instance, has allowed users to write reviews and consumer guides since its launch in 1995, in a form of self-publishing. Amazon also opened its API to outside developers in 2002.[24] Previous developments also came from research in computer-supported collaborative learning and computersupported cooperative work and from established products like Lotus Notes and Lotus Domino. In a podcast interview Tim Berners-Lee described the term "Web 2.0" as a "piece of jargon": "nobody really knows what it means"; and went on to say "if Web 2.0 for you is blogs and wikis, then that is people to people. But that was what the Web was supposed to be all along." Conversely, when someone proclaims a website "Web 2.0" for the use of some trivial feature (such as blogs or gradient-boxes) observers may generally consider it more an attempt at promotion than an actual endorsement of the ideas behind Web 2.0. "Web 2.0" in such circumstances has sometimes sunk simply to the status of a marketing buzzword, which can mean whatever a salesperson wants it to mean, with little connection to most of the worthy but (currently) unrelated ideas originally brought together under the "Web 2.0" banner. Other criticism has included the term "a second bubble," (referring to the Dot-com bubble of circa 1995–2001), suggesting that too many Web 2.0 companies attempt to develop the same product with a lack of business models. The Economist has written of "Bubble 2.0." Venture capitalist Josh Kopelman noted that Web 2.0 excited only 53,651 people (the number of subscribers to TechCrunch, a Weblog covering Web 2.0 matters), too few users to make them an economically-viable target for consumer applications. Trademark In November 2004, CMP Media applied to the USPTO for a service mark on the use of the term "WEB 2.0" for live events. On the basis of this application, CMP Media sent a cease-and-desist demand to the Irish non-profit organization IT@Cork on May 24, 2006, but retracted it two days later.[29] The "WEB 2.0" service mark registration passed final PTO Examining Attorney review on May 10, 2006, but as of June 12, 2006 the PTO had not published the mark for opposition. The European Union application (application number 004972212, which would confer unambiguous status in Ireland) remains currently pending after its filing on March 23, 2006. Information from Wikipedia 27 3/7/2016 RSS RSS (formally "RDF Site Summary", known colloquially as "Really Simple Syndication") is a family of Web feed formats used to publish frequently updated content such as blog entries, news headlines or podcasts. An RSS document, which is called a "feed", "web feed", or "channel", contains either a summary of content from an associated web site or the full text. RSS makes it possible for people to keep up with their favorite web sites in an automated manner that's easier than checking them manually. RSS content can be read using software called an "RSS reader", "feed reader" or an "aggregator". The user subscribes to a feed by entering the feed's link into the reader or by clicking an RSS icon in a browser that initiates the subscription process. The reader checks the user's subscribed feeds regularly for new content, downloading any updates that it finds. The initials "RSS" are used to refer to the following formats: Really Simple Syndication (RSS 2.0) RDF Site Summary (RSS 1.0 and RSS 0.90) Rich Site Summary (RSS 0.91) RSS formats are specified using XML, a generic specification for the creation of data formats. History The RSS formats were preceded by several attempts at syndication that did not achieve widespread popularity. The basic idea of restructuring information about web sites goes back to as early as 1995, when Ramanathan V. Guha and others in Apple Computer's Advanced Technology Group developed the Meta Content Framework (MCF). For a more detailed discussion of these early developments, see the history of web syndication technology. RDF Site Summary, the first version of RSS, was created by Guha at Netscape in March 1999 for use on the My.Netscape.Com portal. This version became known as RSS 0.9. In July 1999, Dan Libby of Netscape produced a new version, RSS 0.91, that simplified the format by removing RDF elements and incorporating elements from Dave Winer's scriptingNews syndication format. Libby also renamed RSS to Rich Site Summary and outlined further development of the format in a "futures document". This would be Netscape's last participation in RSS development for eight years. As RSS was being embraced by web publishers who wanted their feeds to be used on My.Netscape.Com and other early RSS portals, Netscape dropped RSS support from My.Netscape.Com in April 2001 during new owner AOL's restructuring of the company, also removing documentation and tools that supported the format. Two entities emerged to fill the void, neither with Netscape's help or approval: The RSS-DEV Working Group and Winer, whose UserLand Software had published some of the first publishing tools outside of Netscape that could read and write RSS. Winer published a modified version of the RSS 0.91 specification on the UserLand web site, covering how it was being used in his company's products, and claimed copyright to the document. A few months later, UserLand filed a U.S. trademark registration for RSS, but failed to respond to a USPTO trademark examiner's request and the request was rejected in December 2001. Information from Wikipedia 28 3/7/2016 The RSS-DEV Working Group, a project whose members included Guha and representatives of O'Reilly Media and Moreover, produced RSS 1.0 in December 2000.[10] This new version, which reclaimed the name RDF Site Summary from RSS 0.9, reintroduced support for RDF and added XML namespaces support, adopting elements from standard metadata vocabularies such as Dublin Core. In December 2000, Winer released RSS 0.92 a minor set of changes aside from the introduction of the enclosure element, which permitted audio files to be carried in RSS feeds and helped spark podcasting. He also released drafts of RSS 0.93 and RSS 0.94 that were subsequently withdrawn. In September 2002, Winer released a major new version of the format, RSS 2.0, that redubbed its initials Really Simple Syndication. RSS 2.0 removed the type attribute added in the RSS 0.94 draft and added support for namespaces. Because neither Winer nor the RSS-DEV Working Group had Netscape's involvement, they could not make an official claim on the RSS name or format. This has fueled ongoing controversy in the syndication development community as to which entity was the proper publisher of RSS. One product of that contentious debate was the creation of a rival syndication format, Atom, that began in June 2003. The Atom syndication format, whose creation was in part motivated by a desire to get a clean start free of the issues surrounding RSS, has been adopted as an IETF standard. In July 2003, Winer and UserLand Software assigned the copyright of the RSS 2.0 specification to Harvard's Berkman Center for the Internet & Society, where he had just begun a term as a visiting fellow. At the same time, Winer launched the RSS Advisory Board with Brent Simmons and Jon Udell, a group whose purpose was to maintain and publish the specification and answer questions about the format. In December 2005, the Microsoft Internet Explorer team[15] and Outlook team announced on their blogs that they were adopting the feed icon first used in the Mozilla Firefox browser . A few months later, Opera Software followed suit. This effectively made the orange square with white radio waves the industry standard for RSS and Atom feeds, replacing the large variety of icons and text that had been used previously to identify syndication data. In January 2006, RSS Advisory Board chairman Rogers Cadenhead announced that eight new members had joined the group, continuing the development of the RSS format and resolving ambiguities in the RSS 2.0 specification. Netscape developer Chris Finke joined the board in March 2007, the company's first involvement in RSS since the publication of RSS 0.91. In June 2007, the board revised its version of the specification to confirm that namespaces may extend core elements with namespace attributes, as Microsoft has done in Internet Explorer 7. In its view, a difference of interpretation left publishers unsure of whether this was permitted or forbidden. Instant messaging (IM) is a form of real-time communication between two or more people based on typed text. The text is conveyed via computers connected over a network such as the Internet. Overview Instant messaging offers real-time communication and allows easy collaboration, which might be considered more akin to genuine conversation than email's "letter" format. In contrast to e-mail, the parties know whether the peer is available. Most systems allow the user to set an online status or away message so peers are notified when the user is available, busy, or away from the computer. On the other hand, people are not forced to reply immediately to incoming messages. For this reason, some people consider communication via instant Information from Wikipedia 29 3/7/2016 messaging to be less intrusive than communication via phone. However, some systems allow the sending of messages to people not currently logged on (offline messages), thus removing much of the difference between IM and email. Instant messaging allows instantaneous communication between a number of parties simultaneously, by transmitting information quickly and efficiently, featuring immediate receipt of acknowledgment or reply. In certain cases IM involves additional features, which make it even more popular, i.e. to see the other party, e.g. by using web-cams, or to talk directly for free over the internet. It is possible to save a conversation for later reference. Instant messages are typically logged in a local message history which closes the gap to the persistent nature of e-mails and facilitates quick exchange of information like URLs or document snippets (which can be unwieldy when communicated via telephone). History In early instant messaging programs each character appeared when it was typed. The UNIX "talk" command shown in these screenshots was popular in the 1980s and early 1990s. Instant messaging actually predates the internet, first appearing on multi-user operating systems like CTSS and Multics[1] in the mid-1960s. Initially, many of these systems, such as CTSS'.SAVED, were used as notification systems for services like printing, but quickly were used to facilitate communication with other users logged in to the same machine. As networks developed, the protocols spread with the networks. Some of these used a peer-to-peer protocol (eg talk, ntalk and ytalk), while others required peers to connect to a server (see talker and IRC) In the last half of the 1980s and into the early 1990s, the Quantum Link online service for Commodore 64 computers offered user-to-user messages between currently connected customers which they called "On-Line Messages" (or OLM for short). Quantum Link's better known later incarnation, America Online, offers a similar product under the name "AOL Instant Messages" (AIM). While the Quantum Link service ran on a Commodore 64, using only the Commodore's PETSCII text-graphics, the screen was visually divided up into sections and OLMs would appear as a yellow bar saying "Message From:" and the name of the sender along with the message across the top of whatever the user was already doing, and presented a list of options for responding. As such, it could be considered a sort of GUI, albeit much more primitive than the later Unix, Windows and Macintosh based GUI IM programs. OLMs were what Q-Link called "Plus Services" meaning they charged an extra per-minute fee on top of the monthly Q-Link access costs. Modern, Internet-wide, GUI-based messaging clients, as they are known today, began to take off in the mid 1990s with ICQ (1996) being the first, followed by AOL Instant Messenger (AOL Instant Messenger, 1997). AOL later acquired Mirabilis, the creators of ICQ. A few years later ICQ (by now owned by AOL) was awarded two patents for instant messaging by the U.S. patent office. Meanwhile, other companies developed their own applications (Excite, MSN, Ubique, and Yahoo), each with its own proprietary protocol and client; users therefore had to run multiple client applications if they wished to use more than one of these networks. In 1998 IBM released IBM Lotus Sametime, a product based on technology acquired when IBM bought Haifabased Ubique and Lexington-based Databeam. In 2000, an open source application and open standards-based protocol called Jabber was launched. Jabber servers could act as gateways to other IM protocols, reducing the need to run multiple clients. Modern multiprotocol clients such as Pidgin, Trillian, Adium and Miranda can use any of the popular IM protocols without the need for a server gateway. IBM Lotus Sametime's November 2007 release added server-gateway support for XMPP. Information from Wikipedia 30 3/7/2016 Recently, many instant messaging services have begun to offer video conferencing features, Voice Over IP (VoIP) and web conferencing services. Web conferencing services integrate both video conferencing and instant messaging capabilities. Some newer instant messaging companies are offering desktop sharing, IP radio, and IPTV to the voice and video features. The term "instant messenger" is a service mark of Time Warner and may not be used in software not affiliated with AOL in the United States. For this reason, the instant messaging client formerly known as Gaim or gaim announced in April 2007 that they would be renamed "Pidgin". Cooperation There have been several attempts to create a unified standard for instant messaging: IETF's SIP (Session Initiation Protocol) and SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions), APEX (Application Exchange), Prim (Presence and Instant Messaging Protocol), the open XML-based XMPP (Extensible Messaging and Presence Protocol), more commonly known as Jabber and OMA's (Open Mobile Alliance) IMPS (Instant Messaging and Presence Service) created specifically for mobile devices. Most attempts at creating a unified standard for the major IM providers (AOL, Yahoo! and Microsoft) have failed and each continues to use its own proprietary protocol. However, while discussions at IETF were stalled, Reuters head of collaboration services, David Gurle (the founder of Microsoft's Real Time Communication and Collaboration business), surprised everybody by signing the first inter-service provider connectivity agreement on September 2003. This historic agreement enabled AIM, ICQ and MSN Messenger users to talk with Reuters Messaging counterparts and vice-versa against an access fee. Following this breakthrough agreement between networks Microsoft, Yahoo! and AOL came to a deal where Microsoft's Live Communication Server 2005 (which is interestingly also used by Reuters for its Reuters Messaging service) users would also have the possibility to talk to public instant messaging users. This deal settled once for all the protocol for interconnectivity in the market as SIP/SIMPLE and established a connectivity fee for accessing public instant messaging clouds. Separately, on October 13, 2005 Microsoft and Yahoo! announced that by (the Northern Hemisphere) summer of 2006 they would interoperate using SIP/SIMPLE which is followed on December 2005 by the AOL and Google strategic partnership deal where Google Talk users would be able to talk with AIM and ICQ users provided they have an identity at AOL. There are two ways to combine the many disparate protocols: 1. 2. One way is to combine the many disparate protocols inside the IM client application. The other way is to combine the many disparate protocols inside the IM server application. This approach moves the task of communicating to the other services to the server. Clients need not know or care about other IM protocols. For example, LCS 2005 Public IM Connectivity. This approach is popular in Jabber/XMPP servers however the so-called transport projects suffer the same reverse engineering difficulties as any other project involved with closed protocols or formats. Some approaches, such as that adopted by the Sonork enterprise IM software or the Jabber/XMPP network or Winpopup LAN Messenger, allow organizations to create their own private instant messaging network by enabling them to limit access to the server (often with the IM network entirely behind their firewall) and administer user permissions. Other corporate messaging systems allow registered users to also connect from outside the corporation LAN, by using a secure firewall-friendly HTTPS based protocol. Typically, a dedicated corporate IM server has several advantages such as pre-populated contact lists, integrated authentication, and better security and privacy. Information from Wikipedia 31 3/7/2016 Some networks have made changes to prevent them from being utilized by such multi-network IM clients. For example, Trillian had to release several revisions and patches to allow its users to access the MSN, AOL, and Yahoo! networks, after changes were made to these networks. The major IM providers typically cite the need for formal agreements as well as security concerns as reasons for making these changes. Mobile Instant Messaging Mobile Instant Messaging (MIM) is a presence enabled messaging service that aims to transpose the desktop messaging experience to the usage scenario of being on the move. While several of the core ideas of the desktop experience on one hand apply to a connected mobile device, others do not: Users usually only look at their phone's screen — presence status changes might occur under different circumstances as happens at the desktop, and several functional limits exist based on the fact that the vast majority of mobile communication devices are chosen by their users to fit into the palm of their hand. Some of the form factor and mobility related differences need to be taken into account in order to create a really adequate, powerful and yet convenient mobile experience: radio bandwidth, memory size, availability of media formats, keypad based input, screen output, CPU performance and battery power are core issues that desktop device users and even nomadic users with connected notebooks are usually not exposed to. Several formerly untackled issues have been identified and addressed within IMPS, which was developed as part of an early mobile telephone industry initiative to kick off a broader usage of mobile instant messaging. The Open Mobile Alliance has taken over this standard, formerly called Wireless Village, as IMPS V1.0 in November 2002. Since then this standards has been further developed to IMPS V1.3, the latest candidate for release, and is expected to be released before the end of 2006. There are downloadable mobile applications offered by different independent developers that allow users to chat within public (MSN, Yahoo!, Google Talk, AIM, ICQ) and corporate (IBM Lotus Sametime, LCS, Reuters) IM services from mobile devices. Among the advantages of using such IM clients over SMS are: IM clients use data instead of SMS text messages; IM-like chat mode, faster and quicker messaging. Some IM software allows group communication. Several large scale mobile telephone industry companies are planning to jointly deliver a ubiquitous, interoperable presence enabled messaging service, built according to interoperability recommendations developed in the GSM Association. Considering these organisations are jointly representing approximately 1.5 billion active Short Text Messaging (SMS) users, it remains to be seen if such an initiative may also help to drive the different industry factions to agree on a truly interoperable approach at least for Mobile Instant Messaging sometime in the not too far future. In the meantime, other developments have proposed usage of downloadable applications with the intention to create their own approach to IM that runs on most mobile phones worldwide. Essentially, several of these clients are Java applications are instantly downloaded and then connected to back-end servers through GPRS/3G Internet Channels. Some of the implementations can connect to other IM services. Friend-to-friend networks Instant Messaging may be done in a Friend-to-friend network, in which each node connects to the friends on the friendslist. This allows for communication with friends of friends and for the building of chatrooms for instant messages with all friends on that network. Information from Wikipedia 32 3/7/2016 Emotions are often expressed in shorthand. For example; lol. But a movement is currently underway to be more accurate with the emotional expression. Real time reactions such as (chortle) (snort) (guhfaw) or (eye-roll) are rapidly taking the place of acronyms. Business application Instant messaging has proven to be similar to personal computers, e-mail, and the WWW, in that its adoption for use as a business communications medium was driven primarily by individual employees using consumer software at work, rather than by formal mandate or provisioning by corporate information technology departments. Tens of millions of the consumer IM accounts in use are being used for business purposes by employees of companies and other organizations. In response to the demand for business-grade IM and the need to ensure security and legal compliance, a new type of instant messaging, called "Enterprise Instant Messaging" ("EIM") was created when Lotus Software launched IBM Lotus Sametime in 1998. Microsoft followed suit shortly thereafter with Microsoft Exchange Instant Messaging, later created a new platform called Microsoft Office Live Communications Server, and released Office Communications Server 2007 in October 2007. Both IBM Lotus and Microsoft have introduced federation between their EIM systems and some of the public IM networks so that employees may use a single interface to both their internal EIM system and their contacts on AOL, MSN, and Yahoo!. Current leading EIM platforms include IBM Lotus Sametime, Microsoft Office Communications Server, and Jabber XCP. In addition, industry-focused EIM platforms such as IMtrader from Pivot Incorporated, Reuters Messaging, and Bloomberg Messaging provide enhanced IM capabilities to financial services companies. The adoption of IM across corporate networks outside of the control of IT organizations creates risks and liabilities for companies who do not effectively manage and support IM use. Companies implement specialized IM archiving and security products and services like those from Secure Computing, Akonix, Surfcontrol, and ScanSafe to mitigate these risks and provide safe, secure, productive instant messaging capabilities to their employees. Risks and liabilities Although instant messaging delivers many benefits, it also carries with it certain risks and liabilities, particularly when used in workplaces. Among these risks and liabilities are: Security risks (e.g. IM used to infect computers with spyware, viruses, trojans, worms) Compliance risks Inappropriate use Intellectual property leakage Crackers' (malicious "hacker" or black hat hacker) use of instant messaging networks to deliver malicious code has grown consistently from 2004 to the present, with the number of discrete attacks listed by the IM Security Center[6] having grown 15% from 347 attacks in 2005 to 406 in 2006. Hackers use two methods of delivering malicious code through IM: delivery of virus, trojan, or spyware within an infected file, and the use of "socially engineered" text with a web address that entices the recipient to click on a URL that connects him or her to a website that then downloads malicious code. Viruses, worms, and trojans typically propagate by sending themselves rapidly through the infected user's buddy list. An effective attack using a "poison URL" may reach tens of thousands of people in minutes when each person's buddy list receives messages appearing to be from a trusted friend. The recipients click on the web address, and the entire cycle starts again. Infections may range from nuisance to criminal, and are becoming more sophisticated each year. Information from Wikipedia 33 3/7/2016 In addition to the malicious code threat, the use of instant messaging at work also creates a risk of noncompliance to laws and regulations governing the use of electronic communications in businesses. In the United States alone there are over 10,000 laws and regulations related to electronic messaging and records retention.[7] The more well-known of these include the Sarbanes-Oxley Act, HIPAA, and SEC 17a-3. Recent changes to Federal Rules of Civil Procedure, effective December 1, 2006, create a new category for electronic records which may be requested during discovery (law) in legal proceedings. Most countries around the world also regulate the use of electronic messaging and electronic records retention in similar fashion to the United States. The most common regulations related to IM at work involve the need to produce archived business communications to satisfy government or judicial requests under law. Many instant messaging communications fall into the category of business communications that must be archived and retrievable. Organizations of all types must protect themselves from the liability of their employees' inappropriate use of IM. The informal, immediate, and ostensibly anonymous nature of instant messaging makes it a candidate for abuse in the workplace. The topic of inappropriate IM use became front page news in October 2006 when Congressman Mark Foley resigned his seat after admitting sending offensive instant messages of a sexual nature to underage former House pages from his Congressional office PC. The Mark Foley Scandal led to media coverage and mainstream newspaper articles warning of the risks of inappropriate IM use in workplaces. In most countries, corporations have a legal responsibility to ensure harassment-free work environment for employees. The use of corporate-owned computers, networks, and software to harass an individual or spread inappropriate jokes or language creates a liability for not only the offender but also the employer. A survey by IM archiving and security provider Akonix Systems, Inc. in March 2007 showed that 31% of respondents had been harassed over IM at work.[8] Companies now include instant messaging as an integral component of their policies on appropriate use of the World Wide Web, email, and other corporate assets. Security and archiving In the early 2000s, a new class of IT security provider emerged to provide remedies for the risks and liabilities faced by corporations who chose to use IM for business communications. The IM security providers created new products to be installed in corporate networks for the purpose of archiving, content-scanning, and securityscanning IM traffic moving in and out of the corporation. Similar to the e-mail filtering vendors, the IM security providers focus on the risks and liabilities described above. With rapid adoption of IM in the workplace, demand for IM security products began to grow in the mid-2000s. By 2007, the preferred platform for the purchase of security software had become the "appliance", according to IDC, who estimate that by 2008, 80% of network security products will be delivered via an appliance. User base Note that many of the numbers listed in this section are not directly comparable, and some are speculative. Some instant messaging systems are distributed among many different instances and thus difficult to measure in total (e.g. Jabber). While some numbers are given by the owners of a complete instant messaging system, others are provided by commercial vendors of a part of a distributed system. Some companies may be motivated to inflate their numbers in order to increase advertisement earnings or to attract partners, clients, or customers. Importantly, some numbers are reported as the number of "active" users (without a shared standard of that activity), others indicate total user accounts, while others indicate only the users logged in during an instance of peak usage. Information from Wikipedia 34 3/7/2016 Service User count Date/source 53 million active September 2006 >100 million total January 2006 AIM 27.2 million active September 2006 WLM 155 million total April 2005 20 million peak online (majority in 3 June 2006 China) QQ 221 million "active" (majority in China) 3 June 2006 11 million peak online January 2008 >220 million total October 2007 4 million active 2002 5 million total in Europe alone 2004 Skype ICQ Paltalk 3.3 million unique August 2006 visitors per month Mail.ru Agent 1 million active (daily) Information from Wikipedia September 2006 35 3/7/2016 PSYC 1 million active February 2007. Total count cannot be accurately estimated due to the (daily) (majority in decentralized nature of the protocol. Brazil) 40-50 million total January 2007, based on calculations of Jabber Inc 90 million total Based on calculations of Process-One: Process-One uses ejabberd as Jabber server software. If it is assumed that ejabberd has a 40% market share amongst public and private open source server deployments, there are 50 million users using open source servers. With Jabber Inc's numbers, this adds up to the 90 million number stated here. eBuddy 35 million total October 2006, including 4 million mobile users Yahoo! Messenger 22 million total September 2006 IBM Lotus Sametime 17 million total (private, in enterprises) November 2007 Xfire 6.1 million total January 2007 Gadu-Gadu 5.6 million total June 2006 MXit 4.8 million total 10 August 2007. Note that these users are part of the Jabber user base as (>200,000 outside MXit federates with the Jabber network. of South Africa) Meebo 1 million total October 2006 IMVU 1 million total June 2007 VZOchat >200,000 October 2007 Jabber Information from Wikipedia 36 3/7/2016 MySpaceIM unknown Greynet Within the context of corporate and organizational networks, a greynet is an elusive networked computer application that is downloaded and installed on end user systems without express permission from network administrators and often without awareness or cognition that it is deeply embedded in the organization’s network fabric. These applications may be of some marginal use to the user, but inevitably consume system and network resources. In addition, greynet applications often open the door for end use systems to become compromised by additional applications, security risks and malware. Examples Public instant messaging (AIM, MSN, Yahoo!) Web conferencing (webcam, Voice Over IP (VoIP) Telephony Peer-to-Peer (P2P) file sharing clients Data Processing SETI@Home Adware “utilities” Commercial spyware Keystroke logging The Dynamics of Greynet Growth As computer workstations have become connected to the Internet, a variety of programs have proliferated that offer the ability to extend communications, gather and deliver information, and to serve the needs of marketing concerns. Among the first to emerge were instant messaging clients such as ICQ, AOL Instant Messenger and MSN Messenger. Developments in technology have added video capability through webcam units, all of which have worked together to take advantage of available bandwidth in single, small network, and corporate environments. The growth of greynets takes advantage of software and hardware developments. Informal networks are now appearing that provide a variety of streaming media and content that is supplied or modified by end users. An emerging category is "podcasting", in which users generate content for widespread download on portable MP3 players. Problems with Greynet Programs The problem with greynet programs is fourfold. First, greynet programs create network security risks by causing broad vectors for malware dissemination. For example, hackers' attacks that use IM and P2P networks have grown consistently since 2004, with The IM Security Center charting a 15% increase in attacks from 2005 to 2006, and a cumulative 710% growth in the number of viruses, worms, trojans, and spyware programs from April 2005 to April 2007. Second, they create privacy issues for the network by opening large holes for information leakage. Third, greynet programs create compliance issues for a computer network by creating an invisible parallel communications network. Fourth, they create issues on local machines through the consumption of local system resources and possible operating system or program stability concerns. All of these things increase network and IT administration time and costs. Information from Wikipedia 37 3/7/2016 Added to this in the corporate work environment is the loss of meaningful production time due to non-work related distractions through these greynet applications. Individual network environment policies may vary from non-existent to a full lockdown of end user system privileges. See the "Risks and Liabilities" section of Instant Messaging for a more detailed overview of threats, risks, and solutions to those problems for the most prevalent of the greynet programs, public IM. Dealing with the security aspects of greynets has led to the emergence of specific administrative software packages that monitor and control traffic, as well as the enhancement of security suites and adware clients. Security and Monitoring Among the first and most prevalent of the specific administrative software packages were products that secure networks against threats borne by IM and P2P networks. These products were first introduced in 2002, and now protect 10% to 15% of U.S. corporations. Protection against these types of risks to corporate networks is still in early stages of adoption however, as evidenced by the fact that 73% of companies have security or "hygiene" in place for their email networks, while only 11% have hygiene in place for instant messaging and P2P. Products are available for security, content filtering, and archiving the use of these networks from companies such as Akonix, CSC, FaceTime, Global Relay, and Scansafe. References According to Facetime: MySpace and other social networking sites will continue to be the most popular target for hackers, phishers and spammers in 2008 as long as they continue to offer the same level of profile customization to their users. The danger to corporate networks lies within the growing tendency for workers to blur their work and professional lives, often surfing these social networking sites on their work PCs and so exposing the organization to information loss, inbound malware threats and compliance risks. Hackers often use social engineering – manipulation with contextual language to trick victims into clicking on links that launch infected files - to propagate malware over IM networks as well as within social networking sites. The files may take the form of multimedia (jpegs or movie files) or traditional executable files. This ranges from an IM appearing to be from a trusted buddy to fake MySpace comments, messages or friend requests. For example, in September 2007 a virus propagated through MSN Messenger delivering a .zip file full of malicious code. Victims received messages appearing to be from those on their buddy lists saying "Do you remember this girl? I can't believe she took this pic… do you know her?" In November 2007, a Skype Worm propagated via a message stating "help me find this girl," accompanied by an executable file named "photo," which deposited a large number of infected files on the victim's computer. Social Networking Security Concerns According to FaceTime Security Labs, the increasing threat over this past year has been the boldness of a growing underclass of glory hackers on social networking sites such as MySpace. The danger to corporate networks lies within the growing tendency for workers to blur their work and personal lives, often surfing these social networking sites on their work PCs and so exposing the organization to information loss, inbound malware threats and compliance risks. Information from Wikipedia 38 3/7/2016 In November 2007, The Bandjammer Trojan ran rampant through MySpace music profiles. Once a band's MySpace page had been hacked, an invisible background image was created that linked to a dangerous site. Visitors to the hacked profile had their browsers hijacked, with the Trojan installing fake toolbars warning of a possible spyware infection, which included a handy link to click for a free scan which in turn took victims directly to various porn sites. In the height of the holiday season, many MySpace users received a friend request from a "fake Tom," with the promise of free ring tones. The messages appeared to be from Tom Anderson, president and co-founder of MySpace, who users meet as their first friend when signing up for a MySpace profile. MySpace quickly deleted the fake profiles, but hackers quickly regrouped with new fake profiles sporting Tom's famous profile photo associated with random first names. For knowledge workers, it is as common to do work at home as it is to conduct personal tasks while at work. According to the recent survey Greynets in the Enterprise: Third Annual Survey of Greynet Trends, Attitudes and Impact, commissioned by FaceTime and conducted by NewDiligence, 85 percent of end users use their work PCs for personal purposes. Users describe looking at interesting sites on the Web (74 percent), banking (60 percent) and shopping (60 percent) as their top online personal activities at work, outside of sending email. "Many hacks and scams are creeping into the mainstream areas of MySpace and other social networking sites, as the perpetrators become bolder and more aggressive," reports FaceTime's Director of Malware Research Chris Boyd. "The most horrendous content imaginable is now easily stumbled upon via simple redirects and blog hijacks. The myth that you have to ‘go looking for it' has never seemed further from the truth." Boyd saw an aggressive shift in the hacker behavior over the past year, with a growing underclass of young hackers who don't care about revealing their real identity. "Children as young as 12 years old are sharing professional phishing kits and trading stolen credit card details," said Boyd. "MySpace and other social networking sites will continue to be the most popular target for hackers, phishers and spammers in 2008 as long as they continue to offer the same level of profile customization to their users," continued Boyd. "It's never a good idea to promote functionality over security, but there's no way MySpace can suddenly change how their site works, causing their users to lose interest in the very things that brought them there in the first place." 2007 research findings and hacker busts from Boyd and other researchers are detailed on the FaceTime Security Labs blog at http://www.blog.spywareguide.com. Growing Concern over Greynets According to the GreynetsGuide.com Web site managed by FaceTime Security Labs, there are more than 600 greynets currently in use worldwide. The list includes commonly downloaded applications such as IM and Web conferencing, along with newer plug in-type applications like search engine tool bars and online social networking sites, multimedia distribution portals, IPTV, and Web 2.0 applications. FaceTime expects this number to grow to more than 1,000 by the end of 2008. The concern over greynets in the enterprise stems from their inherent characteristics: these real-time applications are evasive and always on, and many are structured with a liberal allowance for user customization. These attractive aspects of greynets are the same characteristics that classify them as high security and compliance risks. The nature of these greynets compounds the risks of inbound malware, outbound information leakage and require continual revisiting of network usage and compliance policies. Information from Wikipedia 39 3/7/2016 The uncontrolled use of greynets on enterprise networks has grown significantly over the past year. Most organizations cite between eight and ten greynets operating in their networks, according to the Greynets in the Enterprise survey. This high level of employee usage has increased from 20 percent in 2005 to 41 percent in 2006 to 56 percent in 2007. Employees continue to believe they have the right to download any application they need onto their work PCs (36 percent). "While many greynet applications have legitimate business uses, there are also many that do not," said Cabri. "Most organizations are not willing to accept the security and compliance exposure resulting from the uncontrolled use of these applications. IT managers need to ensure the safe use of approved applications and effectively detect and block the rogue use of unapproved applications." BELMONT, CALIF. - January 8, 2008 - FaceTime Communications, the leading provider of solutions that control greynets and manage unified communications in the enterprise, today announced its initial findings of 2007 malware trends affecting today's enterprise networks through instant messaging (IM), P2P file sharing and chat applications. During 2007 there were 1,088 incidents reported over all IM, P2P, and chat vectors. Text messaging, or texting is the common term for the sending of "short" (160 characters or fewer) text messages from mobile phones using the Short Message Service (SMS). It is available on most digital mobile phones and some personal digital assistants with on-board wireless telecommunications. The individual messages which are sent are called text messages, or in the more colloquial text speak texts. SMS gateways exist to connect mobile SMS services with instant message (IM) services, the world wide web, desktop computers, and even landline telephones (through speech synthesis). Devices which can connect to mobile phones and PDAs through protocols such as Bluetooth can also sometimes use that link to send SMS messages over the wireless network. SMS arose as part of the widely deployed GSM protocol, but is now also available with non-GSM systems. The most common application of the service is person-to-person messaging, but text messages are also often used to interact with automated systems, such as ordering products and services for mobile phones, or participating in contests. There are some services available on the Internet that allow users to send text messages free of direct charge to the sender, although users of all North American networks have to pay to receive any SMS text message(T-Mobile, AT&T, Sprint, Verizon). Text Messaging Gateway Providers SMS gateway providers facilitate the SMS traffic between businesses and mobile subscribers, being mainly responsible for carrying mission-critical messages, SMS for enterprises, content delivery and entertainment services involving SMS, e.g. TV voting. Considering SMS messaging performance and cost, as well as the level of text messaging services, SMS gateway providers can be classified as aggregators or SS7 providers. The aggregator model is based on multiple agreements with mobile carriers to exchange 2-way SMS traffic into and out of the operator’s SMS platform (Short Message Service Centre – SMS-C), also known as local termination model. Aggregators lack direct access into the SS7 protocol, which is the protocol where the SMS messages are exchanged. These providers have no visibility and control over the message delivery, being unable to offer delivery guarantees. SMS messages are delivered in the operator’s SMS-C, but not the subscriber’s handset. Another type of SMS gateway provider is based on SS7 connectivity to route SMS messages, also known as international termination model. The advantage of this model is the ability to route data directly through SS7, which gives the provider total control and visibility of the complete path during the SMS routing. This means Information from Wikipedia 40 3/7/2016 SMS messages can be sent directly to and from recipients without having to go through the SMS-Centres of other mobile operators. Therefore, it’s possible to avoid delays and message losses, offering full delivery guarantees of messages and optimised routing. This model is particularly efficient when used in mission-critical messaging and SMS used in corporate communications. The University of Duisburg-Essen, in partnership with mobile messaging provider Tyntec, have developed the study for SMS messaging to enable the detailed monitoring of SMS transmissions to ensure a greater degree of reliability and a higher average speed of delivery.[1] The new parameters can be used by mobile network operators, third party SMS gateways and mobile network infrastructure software vendors to monitor the transmission of SMS messages and to detect network transmission problems quickly and accurately. History Many companies have claimed to have sent the very first text message but according to a former employee of NASA Edwaed Lantz, the first was sent via one simple 1989 Motorola beeper in 1989 by Raina Fortini from NYC to Melbourne Beach Florida using upside down numbers that could be read as words and sounds. The first commercial SMS message was sent over the Vodafone GSM network in the United Kingdom on 3 December 1992, from Neil Papworth of Sema Group (using a personal computer) to Richard Jarvis of Vodafone (using an Orbitel 901 handset). The text of the message was "Merry Christmas". The first SMS typed on a GSM phone is claimed to have been sent by Riku Pihkonen, an engineer student at Nokia, in 1993. Initial growth of text messaging was slow, with customers in 1995 sending on average only 0.4 messages per GSM customer per month. One factor in the slow takeup of SMS was that operators were slow to set up charging systems, especially for prepaid subscribers, and eliminate billing fraud which was possible by changing SMSC settings on individual handsets to use the SMSCs of other operators. Over time, this issue was eliminated by switch-billing instead of billing at the SMSC and by new features within SMSCs to allow blocking of foreign mobile users sending messages through it. By the end of 2000, the average number of messages per user reached 35. The first web text messaging portal was invented in another English town called Doncaster by e2sms. Beta tested in 1996 and launched in 1997/1998 it offer two sms from mobile phones to email or via a web portal. It also offered the first commercial advertising service, sending 50,000 SMS's per month with servers in the UK, Chile and Switzerland. They initially used Vodaphones free -dialin- service but eventually hacked the orange gateway. It is also alleged that the fact that roaming customers, in the early days, rarely received bills for their SMSs after holidays abroad had a boost on text messaging as an alternative to voice calls. SMS was originally designed as part of GSM, but is now available on a wide range of networks, including 3G networks. However, not all text messaging systems use SMS, and some notable alternate implementations of the concept include J-Phone's "SkyMail" and NTT Docomo's "Short Mail", both in Japan. E-mail messaging from phones, as popularized by NTT Docomo's i-mode and the RIM BlackBerry, also typically use standard mail protocols such as SMTP over TCP/IP. Today text messaging is the most widely used mobile data service on the planet, with 72% of all mobile phone users worldwide or 1.9 Billion out of 2.7 Billion phone subscribers at end of 2006 being active users of the Short Message Service (SMS). In countries like Finland, Sweden and Norway over 90% of the population use SMS. The European average is about 85% and North America is rapidly catching up with over 40% active users of SMS by end of 2006. The largest average usage of the service by mobile phone subscribers is in the Information from Wikipedia 41 3/7/2016 Philippines with an average of 15 texts sent per day by subscriber. In Singapore the average is 12 and in South Korea 10. Text messaging was reported to have addictive tendencies by the Global Messaging Survey by Nokia in 2001 and was confirmed to be addictive by the study at the Catholic University of Leuven in Belgium in 2004. Since then the study at the Queensland University of Australia has found that text messaging is the most addictive digital service on mobile or internet, and is equivalent in addictiveness to cigarette smoking. The text reception habit introduces a need to remain connected, called "Reachability". Technical details Messages are sent to a Short Message Service Centre (SMSC) which provides a store-and-forward mechanism. It attempts to send messages to their recipients. If a recipient is not reachable, the SMSC queues the message for later retry. Some SMSCs also provide a "forward and forget" option where transmission is tried only once. Message delivery is best effort, so there are no guarantees that a message will actually be delivered to its recipient and delay or complete loss of a message is not uncommon, particularly when sending between networks. Users may choose to request delivery reports, which can provide positive confirmation that the message has reached the intended recipient, but notifications for failed deliveries are unreliable at best. Transmission of the short messages between SMSC and phone can be done through different protocols such as SS7 within the standard GSM MAP framework or TCP/IP within the same standard. Limitations of the messages used within these protocols result in the maximum single text message size of either 160 7-bit characters, 140 8-bit characters, or 70 16-bit characters. Characters in languages such as Arabic, Chinese, Korean, Japanese or Slavic languages (e.g., Russian) must be encoded using the 16-bit UCS-2 character encoding (see Unicode). Larger content (known as long SMS or concatenated SMS) can be sent segmented over multiple messages, in which case each message will start with a user data header (UDH) containing segmentation information. Since the segmentation information is carried within the text message, the number of characters per segment is lower: 153 for 7-bit encoding, 134 for 8-bit encoding and 67 for 16-bit encoding. The receiving phone is responsible for reassembling the message and presenting it to the user as one long message. While the standard theoretically permits up to 255 segments, 6 to 8 segment messages are the practical maximum, and long messages are often billed as equivalent to multiple SMS messages. Some service providers offer the ability to send messages to land line telephones regardless of their capability of receiving text messages by automatically phoning the recipient and reading the message aloud using a speech synthesizer along with the number of the sender. Premium content SMS is widely used for delivering digital content such as news alerts, financial information, logos and ringtones. Such messages are also known as premium-rated short messages (PSMS). The subscribers are charged extra for receiving this premium content, and the amount is typically divided between the mobile network operator and the value added service provider (VASP) either through revenue share or a fixed transport fee. Services like 82ASK and Any Question Answered have used the PSMS model to enable rapid response to mobile consumers' questions, using on-call teams of experts and researchers. Premium short messages are increasingly being used for "real-world" services. For example, some vending machines now allow payment by sending a premium-rated short message, so that the cost of the item bought is added to the user's phone bill or subtracted from the user's prepaid credits. Recently, premium messaging Information from Wikipedia 42 3/7/2016 companies have come under fire from consumer groups due to a large number of consumers racking up huge phone bills. Some mobile networks, now require users to call their provider to enable premium messages from reaching their handset. A new type of 'free premium' or 'hybrid premium' content has emerged with the launch of text-service websites. These sites allow registered users to receive free text messages when items they are interested go on sale, or when new items are introduced. An alternative to inbound SMS is based on Long numbers (international number format, e.g., +44 7624 805000), which can be used in place of short codes / premium-rated short messages for SMS reception in several applications, such as TV voting, product promotions and campaigns. Long numbers are internationally available, as well as enabling businesses to have their own number, rather than short codes which are usually shared across a lot of brands. Additionally, Long numbers are non-premium inbound numbers. Popularity Short message services are developing very rapidly throughout the world. In 2000, just 17 billion SMS messages were sent; in 2001, the number was up to 250 billion, and 500 billion SMS messages in 2004. At an average cost of USD 0.10 per message, this generates revenues in excess of $50 billion for mobile telephone operators and represents close to 100 text messages for every person in the world. SMS is particularly popular in Europe, Asia (excluding Japan; see below), Australia and New Zealand. Popularity has grown to a sufficient extent that the term texting (used as a verb meaning the act of mobile phone users sending short messages back and forth) has entered the common lexicon. In China, SMS is very popular, and has brought service providers significant profit (18 billion short messages were sent in 2001). It is a very influential and powerful tool in the Philippines, where the average user sends 1012 text messages a day . The Philippines alone sends on the average 400 million text messages a day or approximately 142 billion text messages sent a year, more than the annual average SMS volume of the countries in Europe, and even China and India. SMS is hugely popular in India, where youngsters often exchange lots of text messages, and companies provide alerts, infotainment, news, cricket scores update, railway/airline booking, mobile billing, and banking services on SMS. In 2001, text messaging played an important role in deposing former Philippine president Joseph Estrada. Short messages are particularly popular amongst young urbanites. In many markets, the service is comparatively cheap. For example, in Australia a message typically costs between AUD 0.20 and AUD 0.25 to send (some pre-paid services charge AUD 0.01 between their own phones), compared with a voice call, which costs somewhere between AUD 0.40 and AUD 2.00 per minute (commonly charged in half-minute blocks). Despite the low cost to the consumer, the service is enormously profitable to the service providers. At a typical length of only 190 bytes (incl. protocol overhead), more than 350 of these messages per minute can be transmitted at the same data rate as a usual voice call (9 kbit/s). Mobile Service Providers in New Zealand, such as Vodafone and Boost Mobile, provide up to 2000 SMS messages for NZ$10 per month. Users on these plans send on average 1500 SMS messages every month. Text messaging has become so popular that advertising agencies and advertisers are now jumping into the text message business. Services that provide bulk text message sending are also becoming a popular way for clubs, associations, and advertisers to quickly reach a group of opt-in subscribers. This advertising has proven to be Information from Wikipedia 43 3/7/2016 extremely effective, but some insiders worry that advertisers may abuse the power of mobile marketing and it will someday be considered spam. Europe Europe follows next behind Asia in terms of the popularity of the use of SMS. In 2003, an average of 16 billion messages were sent each month. Users in Spain sent a little more than fifty messages per month on average in 2003. In Italy, Germany and the United Kingdom the figure was around 35–40 SMS messages per month. In each of these countries the cost of sending an SMS message varies from as little as £0.03–£0.18 depending on the payment plan. Curiously France has not taken to SMS in the same way, sending just under 20 messages on average per user per month. France has the same GSM technology as other European countries so the uptake is not hampered by technical restrictions. In the Republic of Ireland, a total of 1.5 billion messages are sent every quarter, on average 114 messages per person per month. Whilst in the United Kingdom over 1 billion text messages are sent every week. The Eurovision Song Contest organized the first pan-European SMS-voting in 2002, as a part of the voting system (there was also a voting over traditional phone lines). In 2005, the Eurovision Song Contest organized the biggest televoting ever (with SMS and phone voting). United States In the United States, however, the appeal of SMS is more limited. Although an SMS message usually costs only US$0.15 (many providers also offer monthly text messaging plans), only 13 messages were sent by the average user per month in 2003. In the US, SMS is often charged both at the sender and at the destination, but it cannot be rejected or dismissed, as opposed to the phone calls. The reasons for this are varied—many users have unlimited "mobile-to-mobile" minutes, high monthly minute allotments, or unlimited service. Moreover, push to talk services offer the instant connectivity of SMS and are typically unlimited. Furthermore, the integration between competing providers and technologies necessary for cross-network text messaging has only been available recently. Some providers originally charged extra to enable use of text, further reducing its usefulness and appeal. The relative popularity of e-mail-based devices such as the BlackBerry in North America may be a response to the weakness of text messaging there, but these further weaken the appeal of texting among the users most likely to use it. However the recent addition of Cingular-powered SMS voting on the television program American Idol has introduced many Americans to SMS, and usage is on the rise In the third quarter of 2006, more than 10 billion text messages crossed Cingular's network, up almost 15 percent from the preceding quarter. In the United States, while texting is widely popular among the ages of 10-25 years old, it is increasing among adults and business users as well. According to both the Mobile Marketing Association and Pew Internet & American Life Project Surveys, 40% of US Mobile phone users text. The split by age group is as follows: 1324's: 80% text, 18-27's 63% text, 28-39's: 31% text, 40-49's: 18% text. The amount of texts being sent in the United States has gone up over the years as the price has gone down to an average of $0.10 per text sent and received. Many providers also will make unlimited texting available for a lower price. Finland In addition to SMS voting, a different phenomenon has risen in more mobile-phone-saturated countries. In Finland some TV channels began "SMS chat", which involved sending short messages to a phone number, and the messages would be shown on TV a while later. Chats are always moderated, which prevents sending harmful material to the channel. The craze soon became popular and evolved into games, first slow-paced quiz Information from Wikipedia 44 3/7/2016 and strategy games. After a while, faster paced games were designed for television and SMS control. Games tend to involve registering one's nickname, and after that sending short messages for controlling a character on screen. Messages usually cost 0.05 to 0.86 Euro apiece, and games can require the player to send dozens of messages. In December 2003, a Finnish TV-channel, MTV3, put a Santa character on air reading aloud messages sent in by viewers. More recent late-night attractions on the same channel include "Beach Volley", in which the bikini-clad female hostess blocks balls "shot" by short message. On March 12 2004, the first entirely "interactive" TV-channel "VIISI" began operation in Finland. That did not last long though, as SBS Finland Oy took over the channel and turned it into a music channel named "The Voice" in November 2004. In 2006, the Prime Minister of Finland, Matti Vanhanen, made front page news when he allegedly broke up with his girlfriend with a text message. In 2007, the first text message only book, which is about a business executive who travels throughout Europe and India, was published by a Finnish author. Japan Japan was among the first countries to widely adopt short messages, with pioneering non-GSM services including J-Phone's "SkyMail" and NTT Docomo's "Short Mail". However, short messaging has been largely rendered obsolete by the prevalence of mobile Internet e-mail, which can be sent to and received from any email address, mobile or otherwise. That said, while usually presented to the user simply as a uniform "mail" service (and most users are unaware of the distinction), the operators may still internally transmit the content as short messages, especially if the destination is on the same network. Philippines The Philippines is known as the ‘text capital of the world’. ‘Presently each mobile phone user in the Philippines is sending out at least 10 text messages a day compared to about 3 text messages per user in the United Kingdom (Pertierra 2005a; cf. Ling 2004). About one Filipino in two is a subscriber to a mobile phone service. At the end of 2005 four of the top mobile phone service providers in the country stated there were 34.78 million mobile phone subscribers in the Philippines, this was up from 32.94 million the year before. One of the main reasons text messages became so popular in the Philippines is the affordabilty. In addition, text messaging was generally more reliable compared to a fixed phone line or relying on poor mobile phone coverage that included drop-outs. The term Generation Y first appeared in an August 1993 magazine AD Age editorial to describe those children born between 1981–1995. The scope of the term has changed greatly since then, to include, in many cases, anyone born as early as 1976 and late as 2000. Use of the term Generation Y to describe any cohort of individuals is controversial for a variety of reasons. "Generation Y" alludes to a succession from "Generation X", a term which was originally coined as a pejorative label. While Generation Y alludes to that cohort's successive relationship to Generation X, the term Echo Boomers is used to allude to the generation's close tie to the primary childbearing years of Baby Boomers; the term Second Baby Boom is also used in this way and to denote the population expansion that Generation Y represents. The terms Millennials and Internet generation ("iGen") are attempts to give the Gen Y cohort more independent names that are tied with key events and cultural trends that are strongly associated with the generation. No single term is the "correct" term to describe members of this generation. Information from Wikipedia 45 3/7/2016 Generation Y are primarily children of the Baby boomers and Generation Jones, though some are children of older Gen X adults. Because of this, there is a perceived tendency to share social views with the Boomers and culture with Gen X, who serve chiefly as their 'older cousins' or even older siblings. The actual “Echo Boom” was a five year span between 1989 and 1993 when for the first time since 1964, the number of live births reached over four million. Previously, even the rate of 1965 (3.76 million) was not reached until 1985. Also, the birthrate of 1971 (17.2%) has yet to be reached according to the 2000 census. A notable demographic shift should begin to occur in 2011 when the oldest Baby Boomers (b. 1946) hit the United States' legal retirement age of 65. As Boomers retire, more members of Generation X will be expected to take roles in middle and upper management and the large membership of Generation Y should take up positions in the lower half of the workforce, a process which may have possibly begun, since some definitions have members of Gen Y in their late 20s. Career and the workplace According to the book Millennial Leaders: Success Stories From Today’s Most Brilliant Generation Y Leaders:, Dr. Carolyn Martin, a principal with RainMaker Thinking Inc., says that one of the most significant changes in the workplace that will affect the way Generation Y approaches work is job security. Gen Y’s success will be increasingly linked to their ability to acquire as wide a variety of marketable skills that they can as they move about in their career(s). As of 2007,[5]there are more pronounced generational gaps in communications styles and job expectations in the workplace. Titled “Gen Y at Work,” the survey was conducted from June 1 to June 13, 2007 among 2,546 hiring managers and Human Resource professionals across all industries. Nearly half (49 percent) of employers surveyed said the biggest gap in communication styles between Generation Y workers (employees 29 years old or younger) and workers older than they are is that Gen Y workers communicate more through technology than in person. Another one-in-four (25 percent) say they have a different frame of reference, especially in terms of pop culture. In terms of job expectations, 87 percent of all hiring managers and HR professionals say some or most Gen Y workers feel more entitled in terms of compensation, benefits and career advancement than older generations. Seventy-three percent of hiring managers and HR professionals ages 25 to 29 share this sentiment. Employers provided the following examples: 74 percent of employers say Gen Y workers expect to be paid more 61 percent say Gen Y workers expect to have flexible work schedules 56 percent say Gen Y workers expect to be promoted within a year 50 percent say Gen Y workers expect to have more vacation or personal time 37 percent say Gen Y workers expect to have access to state-of-the-art technology Over half (55 percent) of employers over the age of 35 feel Gen Y workers have a more difficult time taking direction or responding to authority than other generations of workers. “Generation Y workers are an important segment of the workforce and literally the future of companies and organizations,” said Rosemary Haefner, vice president of Human Resources for CareerBuilder.com. “They grew up in a technology-driven world where standards and norms have changed and often operate under different perspectives than older co-workers. As companies' cultures evolve with each generation, you see all workers benefiting from a variety of viewpoints and work styles.” Information from Wikipedia 46 3/7/2016 Fifteen percent of employers said they changed or implemented new policies or programs to accommodate Gen Y workers changes, Haefner points out, that would have likely benefited workers of all ages. Examples include: More flexible work schedules (57 percent); More recognition programs (33 percent); More access to state-of-the-art technology (26 percent); Increased salaries and bonuses (26 percent); More ongoing education programs (24 percent); Paying for cell phones, blackberries, etc. (20 percent); More telecommuting options (18 percent); More vacation time (11 percent). Eighty-one percent of 18- to 25-year-olds surveyed a Pew Research Center poll said getting rich is their generation's most important or second-most-important life goal; 51% said the same about being famous. Determination Dates that define a person belonging to Generation X have also been disputed. Others have suggested that such regional restrictions of use are unnecessary in the ever globalizing world. Generations are not defined by formal process, but rather by demographers, the media, popular culture, market researchers, and by members of the generation themselves. For instance, while the periodical American Demographics typically uses 1976 to demarcate the start of Generation Y, demographers Howe and Strauss have consistently used "the High School class of 2000", or those born in 1982 as their demarcation. While many possible years are used as the endpoint of Generation Y, the term is almost never applied to current infants. Because of the flexible nature of such demographic terms, two people of the same birth year can identify as either Generation X, Y, or something that follows Y, such as the New Silent Generation and neither is wrong. Numerous alternative terms (such as "millennials" in the popular press in the United States) have been coined to describe subjects of the cohort. As the term "Generation X" was originally coined to describe the post Baby Boomer generation in the United Kingdom [7] (and later adapted to describe the same generation in the United States and Canada), some use "Generation Y" only to refer to Americans, Canadians, and other Anglophone people who were born after Generation X. If the years 1978–2000 are used, as is common in market research, then the size of Generation Y in the United States is approximately 76 million. Trends among members As with previous generations, many trends (and problems) began to surface as members of Generation Y come of age. Drug use such as underage drinking and pharming parties are high. It is estimated 77% have drank underage. According to Time magazine, Pharming parties are get-togethers where prescription drugs are exchanged. These parties, while not necessarily devoted to illegal substances, are meeting places to use prescription drugs in order to become intoxicated. Use of marijuana is also quite high.[citation needed] Members of this generation are facing higher costs for higher education than previous generations. Information from Wikipedia 47 3/7/2016 As members of Generation Y in the United States begin to enter colleges and universities in large numbers, some of their Baby Boomer parents are becoming helicopter parents. Many college advisors and administrators worry that this could have a negative effect on Generation Y's social progress, ego, and developing maturity. Business owners in Australia feel that members of Generation Y were found to be "demanding, impatient and bad at communicating," according to a 2007 survey. The survey found that almost 70% of those surveyed found their Generation Y workers to be dissatisfying, with poor spelling and grammar and no understanding of appropriate corporate behaviors. However, the survey also showed most employers praised the energy and charisma of their Generation Y workers. Gen Y represents more than 70 million consumers in the United States. They earn a total annual income of about $211 billion spend approximately $172 billion per year and considerably influence many adult consumer buying choices. They also face a greater degree of direct corporate predation than any other generation in history. Technology In their book, Connecting to the Net.Generation: What Higher Education Professionals Need to Know About Today's Students, Reynol Junco and Jeanna Mastrodicasa (2007) found that in a survey of 7,705 college students in the US: 97% own a computer 94% own a cell phone 76% use Instant Messaging. 15% of IM users are logged on 24 hours a day/7 days a week 34% use websites as their primary source of news 28% own a blog and 44% read blogs 49% download music using peer-to-peer file sharing 75% of college students have a Facebook account [15] 60% own some type of portable music and/or video device such as an iPod. Internet generation In his book Growing Up Digital, business strategist and psychologist Don Tapscott coined the term "Net Generation" for the group, pointing at the significance of being the first to grow up immersed in a digital—and Internet—driven world. The NetGen research conducted by Don's company New Paradigm follows those individuals born between 1977 and 1997. YouTube YouTube is a video sharing website where users can upload, view and share video clips. YouTube was created in mid-February 2005 by three former PayPal employees. The San Bruno-based service uses Adobe Flash technology to display a wide variety of video content, including movie clips, TV clips and music videos, as well as amateur content such as videoblogging and short original videos. In October 2006, Google Inc. announced that it had reached a deal to acquire the company for US$1.65 billion in Google stock. The deal closed on November 13, 2006. Information from Wikipedia 48 3/7/2016 Unregistered users can watch most videos on the site, while registered users are permitted to upload an unlimited number of videos. Some videos are available only to users of age 18 or older (e.g. videos containing potentially offensive content). The uploading of pornography or videos containing nudity is prohibited. Related videos, determined by title and tags, appear onscreen to the right of a given video. In YouTube's second year, functions were added to enhance user ability to post video 'responses' and subscribe to content feeds. Few statistics are publicly available regarding the number of videos on YouTube. However, in July 2006, the company revealed that more than 100 million videos were being watched every day, and 2.5 billion videos were watched in June 2006. 50,000 videos were being added per day in May 2006, and this increased to 65,000 by July. In August 2006, The Wall Street Journal published an article revealing that YouTube was hosting about 6.1 million videos (requiring about 45 terabytes of storage space), and had about 500,000 user accounts. As of January 6, 2008 , a YouTube search for "*" returns about 64,000,000 videos (the asterisk is a commonly used wildcard character in search engines, therefore showing all videos). On January 2, the number was 61.7 million, showing an average of 825,000 new videos every day the past 4 days. Domain name problem YouTube's immense success has unintentionally affected the business of an American company, Universal Tube & Rollform Equipment Corp., whose website, utube.com, was frequently overloaded and shut down by extremely high numbers of visitors unsure about the spelling of YouTube's domain name, but now utube.com is up and running again At the beginning of November 2006, Universal Tube filed suit in federal court against YouTube, requesting that the youtube.com domain be transferred to them. Recent events Political campaigning Political candidates for the 2008 U.S. Presidential election have been using YouTube as an outlet for advertising their candidacies. Voters can view candidate statements and make videos supporting (or opposing) presidential candidates (e.g., videos for Ron Paul, Hillary Clinton, Barack Obama, and Joe Biden). Third Party presidential candidates have also made extensive use of YouTube. Libertarian Steve Kubby's campaign debuted a short animated film, featuring the faces and voices of campaign contributors who financed its production, on YouTube on September 29th, 2007. The U.S. media has often commented that YouTube played a significant role in the 2006 defeat of Republican Senator George Allen due to a video clip of him making allegedly racist remarks that was continuously replayed by YouTube viewers during the campaign. Political commentators such as James Kotecki have also joined the YouTube world of politics. Many commentators make videos on YouTube critiquing a presidential candidate's YouTube videos, or simply using YouTube as a medium to get their opinions heard. Recently, French and Italian politicians, such as Antonio Di Pietro, have also been using the site as part of their campaigns. YouTube has also been used by Australian Prime Minister John Howard in the lead up to the 2007 federal election. In the run up to the 2008 Presidential elections, CNN aired a debate in which candidates fielded questions selected from a pool submitted by users of YouTube. Because of the use of technology to aggregate questions from a wide range of constituents, the forum has been referred to as "most democratic Presidential Debate ever”. Copyright infringement and controversial material Information from Wikipedia 49 3/7/2016 Copyright YouTube policy does not give permission for anyone to upload content not permitted by United States copyright law, the organisation frequently removing upon request a vast quantity of infringing content. Despite this, a large amount of potentially infringing content continues to be uploaded (e.g., television shows/clips, film clips, commercials, or music videos). This is despite a decision in October 2007 to allow media companies to block their copyrighted video content loaded onto YouTube without seeking any prior permission., You Tube does not 'pre-screen' videos uploaded to its site (This is partly due to such pre-screening creating additional liabilities in respect of infringing material). Until 2007, unless a copyright holder reported violation or infringement, YouTube generally discovered such content via indications within the YouTube community through self-policing. For a brief time, individual members could also report on one another. The flagging feature, intended as a means of reporting questionable content, has been subject to considerable abuse; for a time, some users were flagging other users' original content for copyright violations out of spite. YouTube proceeded to remove copyright infringement from the list of flaggable offenses. Since 2007, changes to the interface mean that only rights holders are able to directly report copyright violations, even if they are obvious to casual viewers. YouTube generally identifies video content through search terms that uploaders associate with clips. Some deceptive users create alternative search terms when uploading specific file types (similar to the deliberate misspelling of band names on MP3 filesharing networks). Hollywood remains divided on YouTube, as "'the marketing guys love YouTube and the legal guys hate it.'" Further, While lawyers are demanding filtering technology, many Hollywood execs actually enjoy the fact that YouTube only takes down clips when they request it. "If I found part of a successful show up on YouTube today, I'd probably pull it down immediately .... If I had a show that wasn't doing so well in the ratings and could use the promotion, I wouldn't be in a rush to do that." Content owners are not just targeting YouTube for copyright infringements, but are also targeting third party websites that link to infringing content on YouTube and other video-sharing sites, for example, QuickSilverScreen vs. Fox, Daily Episodes vs. Fox, and Columbia vs. Slashfilm. The liability of linking remains a grey area with cases for and against. The law in the U.S. currently leans towards website owners being liable for infringing linksalthough they are often protected by the DMCA providing they take down infringing content when issued with a take down notice. However, a recent court ruling in the U.S. found Google not liable for linking to infringing content (Perfect 10 v. Google, Inc.). Examples of infringement complaints On October 5, 2006, the Japanese Society for Rights of Authors, Composers and Publishers (JASRAC) finalized their copyright complaints regarding Japanese media on YouTube. Thousands of media from popular Japanese artists (such as Tokyo Jihen and other music including Jpop) were removed. When CBS and Universal Music Group signed agreements to provide content on YouTube, they announced a new technology to help them find and remove copyrighted material. Information from Wikipedia 50 3/7/2016 TV journalist Robert Tur filed the first lawsuit against the company in the summer of 2006, alleging copyright infringement for hosting a number of famous news clips without permission. The case has yet to be resolved. On November 9, 2006, Artie Lange said that his lawyers were in talks with YouTube, after Lange learned that his entire DVD, It's the Whiskey Talking, was available for free on the website. He added that he will either demand money from them, or will sue. Viacom and the British Broadcasting Corporation both demanded YouTube to take down more than 200,000 videos. Viacom announced it was suing YouTube, and its owner Google, for more than $1 billion in the United States District Court for the Southern District of New York. Viacom claims that YouTube posted over 160,000 of their videos on the website without their permission. In 2007 a 15-year-old Australian boy managed to get YouTube to delete over 200 YouTube videos belonging to the Australian Broadcasting Corporation using a fake DMCA take down notice. When the fake DMCA notice arrived, the ABC already had in place a long-standing deal with YouTube to freely share its videos. In his handwritten letter, the boy claimed that he was acting on behalf of the "Australian Broddcasting[sic] Corperation[sic]", giving his own Hotmail address as his business contact and demanded that hundreds of videos from ABC's The Chaser's War on Everything television program be deleted from YouTube's servers. Despite the boy not having any affiliation with the ABC and the spelling errors on his hand-written form, YouTube did delete all of the videos at the boy's request and replaced each with a message stating "This video is no longer available due to a copyright claim by Australian Broadcasting Corporation". Use of acoustic fingerprints On October 12, 2006, YouTube announced that because of recent agreements with high-profile content creators, they are now required to use antipiracy software, which uses an audio-signature technology that can detect a low-quality copy of licensed video. YouTube would have to substitute an approved version of any clip or remove the material immediately. Industry analysts speculated that removal of content with such a system might reduce overall user satisfaction. On April 16, 2007, Google's CEO Eric E. Schmidt presented a keynote speech at the NAB Convention in Las Vegas. During the Q&A session, Schmidt announced that YouTube was close to enacting a content filtering system to remove infringing content from the service. The new system, called "Claim Your Content", will automatically identify copyrighted material for removal. Google spokesperson Ricardo Reyes stated on June 13, 2007 that the company was seeking "a way to make video identification technology a reality" when they began to test the system in the next few days. Facebook Facebook is a social networking website, launched on February 4, 2004. Facebook was founded by Mark Zuckerberg, a former Harvard student. Initially the membership of Facebook was restricted to students of Harvard College. It was subsequently expanded to MIT, Boston University, Boston College, and all Ivy League schools within two months. Many individual universities were added in rapid succession over the next year. Eventually, people with a university (e.g .edu, .ac.uk, etc.) email address from institutions across the globe were eligible to join. Networks were then initiated for high schools on February 27, 2006 and some large companies. Since September 11, 2006, anyone 13 or older may join. Users can select to join one or more participating networks, such as a high school, place of employment, or geographic region. Information from Wikipedia 51 3/7/2016 The site has more than 58 million active users (including non-collegiate members) worldwide, with membership expected to surpass 60 million users by the end of 2007. From September 2006 to September 2007 the site's traffic ranking increased from 60th to 7th, according to Alexa. It is the number one site for photos in the United States with over 60 million photos uploaded weekly. The name of the site refers to the paper facebooks depicting members of the campus community that some U.S. colleges and preparatory schools give to incoming students, faculty, and staff as a way to get to know other people on campus. The site is free to users and generates revenue from advertising including banner ads and sponsored groups (in April 2006, revenue was rumored to be over $1.5 million per week). Users create profiles that often contain photos and lists of personal interests, exchange private or public messages, and join groups of friends. The viewing of detailed profile data is restricted to users from the same network or confirmed friends. According to TechCrunch, "about 85% of students in [previously] supported colleges have a profile [on the site]. [Of those who are signed up,] 60% log in daily. About 85% log in at least once a week, and 93% log in at least once a month." According to Chris Hughes, spokesman for Facebook, "People spend an average of 19 minutes a day on Facebook." In a 2006 study conducted by Student Monitor, a New Jersey-based limited liability company specialising in research concerning the college student market, Facebook was named as the second most "in" thing among undergraduates, tied with beer and sex and losing only to the iPod. Origins and expansion Mark Zuckerberg founded "The Facebook" in February 2004, while attending Harvard University, with support from Andrew McCollum and Eduardo Saverin. By the end of the month, more than half of the undergraduate population at Harvard were registered on the service. At that time, Zuckerberg was joined by Dustin Moskovitz and Chris Hughes for site promotion and Facebook expanded to Stanford, Columbia, and Yale.[12] This expansion continued in April of 2004 when it expanded to the rest of Ivy League and a few other schools. At the end of the school year, Zuckerberg and Moskovitz moved out to Palo Alto, California with McCollum, who had a summer internship at Electronic Arts. They rented a house near Stanford University where they were joined by Adam D'Angelo and Sean Parker. Soon McCollum decided to leave EA and help with the development of Facebook and a companion website, Wirehog, full-time. In September, Divya Narendra, Cameron Winklevoss and Tyler Winklevoss, the owners of the social networking website HarvardConnection, subsequently changed to ConnectU, filed a lawsuit against Facebook, alleging that Zuckerberg had illegally used source code intended for the website they asked him to build for them. Also at that time, Facebook received approximately $500,000 from PayPal co-founder Peter Thiel in an angel round. By December, Facebook's user base had exceeded one million. 2005 In May 2005, Facebook raised $12.8 million in venture capital from Accel Partners. On August 23, 2005, Facebook bought the domain name facebook.com from the Aboutface Corporation for $200,000 and dropped "the" from its name. At that time the site was overhauled, a change intended to make profile pages more userfriendly, according to Zuckerberg. Also that month McCollum went back to Harvard although he continued to serve as a consultant and returned to work on staff during the summers. As before, Hughes remained in Cambridge while he performed his duties as company spokesperson. Then, on September 2, 2005, Zuckerberg launched the high school iteration of Facebook, calling it the next logical thing to do. While initially described as separate "communities" to which users needed to be invited to participate, within only fifteen days most high school networks did not require a password to join (although registration with Facebook was still necessary.) By October, Facebook's expansion had trickled down to most small universities and junior colleges in the United States, Canada, and the UK, in addition to having expanded to twenty-one universities in the United Kingdom, Information from Wikipedia 52 3/7/2016 the entire Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) system in Mexico, the entire University of Puerto Rico network in Puerto Rico, and the whole University of the Virgin Islands network in the U.S. Virgin Islands. On December 11, 2005, universities in Australia and New Zealand were added to the Facebook network, bringing its size to more than 2,000 colleges and more than 25,000 high schools throughout the United States, Canada, Mexico, the United Kingdom, Australia, New Zealand, and Ireland. 2006 On February 27, 2006, Facebook began allowing college students to add high school students as friends due to requests from users. About a month later, on March 28, 2006, BusinessWeek reported that a potential acquisition of the site was under negotiation. Facebook reportedly declined an offer of $750 million, and it was rumored that the asking price was as high as $2 billion. In April, Peter Thiel, Greylock Partners, and Meritech Capital Partners invested an additional $25 million in the site. In May, Facebook's network extended into India, at Indian Institutes of Technology (IITs) and Indian Institutes of Management (IIMs). The following month Facebook threatened to seek costs of up to $100,000 from Quizsender.com for copyright infringement for allegedly copying the "look and feel" of Facebook.[20][21] On July 25, new services were offered in the site that would potentially produce additional revenue. A promotion was arranged between Facebook and iTunes, in which members of the Apple Students group would receive a free 25 song sampler each week until September 30 in various music genres. The promotion's purpose was to make students more familiar with and enthusiastic about each service as fall classes approached. In the early half of August, Facebook added universities in Germany and high schools in Israel, (Haifa, Jerusalem, and Qiryat Gat) to its network. On the 22nd of that month, Facebook introduced Facebook Notes, a blogging feature with tagging, embedded images, and other features, also allowing the importation of blogs from Xanga, LiveJournal, Blogger, and other blogging services. This newly added feature also included the common blog feature of allowing readers to comment on users' entries. On September 11, 2006, Facebook became open to all users of the Internet, prompting protest from its existing user base. Two weeks later, Facebook opened registration to anyone with a valid e-mail address. 2007 On May 10, 2007, Facebook announced a plan to add free classified advertisements to its website, making it a competitor with established online companies such as Craigslist. This feature, known as Facebook Marketplace, went live on May 14, 2007; Facebook launched an API that allows the development of applications to be used on the site, known as Facebook Platform. In June, the partnership begun the previous year between iTunes and Facebook continued, with the download service again offering free music samplers through the Apple Students group. In July, Facebook announced its first acquisition, purchasing Parakey, Inc. from Blake Ross and Joe Hewitt. In August, the company was featured in a Newsweek cover story by Steven Levy in the magazine's annual college edition. Facebook hired YouTube's former CFO Gideon Yu on July 24, 2007. Gideon Yu succeeded Michael Sheridan. In October Microsoft purchased a 1.6% share in the company for $240 million. An outright sale of Facebook is said to be unlikely as founder Mark Zuckerberg would like to keep it independent. On November 7, 2007, Facebook announced Facebook Ads; Facebook Beacon, a marketing initiative which includes a system for websites to allow users to share chosen information about their activities on the sites with their Facebook friends ; the capability of businesses to host pages on Facebook for various brands, products and services (Facebook Pages); a targeted ad serving program based on user and friend profile and activity data (Facebook Social Ads); and a service for providing businesses with advertisement analytic data including performance metrics (Facebook Insights). With respect to privacy, Facebook states that "no personally Information from Wikipedia 53 3/7/2016 identifiable information is shared with an advertiser in creating a Social Ad," and that "Facebook users will only see Social Ads to the extent their friends are sharing information with them".Facebook Ads replaces the site's previous Facebook Flyers program. On November 30, 2007, it was reported that Hong Kong billionaire Li Kashing had invested $60 million in Facebook. On 5 December 2007, Mark Zuckerberg publicly apologized for the way that Facebook launched the Beacon system, saying "The problem with our initial approach of making it an opt-out system instead of opt-in was that if someone forgot to decline to share something, Beacon still went ahead and shared it with their friends." Beacon can now be disabled through a new External websites section in Privacy. Site features The Wall The Wall is a space on each user's profile page that allows friends to post messages for the user to see. One user's wall is visible to anyone with the ability to see their full profile, and different users' wall posts show up in an individual's News Feed. Many users use their friend's walls for leaving short, temporal notes. More private discourse is saved for Messages, which are sent to a person's Inbox, and are visible only to the sender and recipient(s) of the Message, much like email. In July 2007, Facebook allowed users to post attachments to the wall, whereas previously the wall was limited to textual content only. Gifts In February 2007, Facebook added a new gift feature to the website. Friends could send "gifts" -- small icons of novelty items designed by former Apple designer Susan Kare -- to each other by selecting one from Facebook's virtual gift shop and adding a message. Gifts given to a user appear on the recipient's wall with the giver's message, unless the giver decided to give the gift privately, in which case the giver's name and message is not displayed to other users. Additionally, all gifts (including private gifts) received by a user are displayed in the recipient's "gift box" (right above their wall on their profile), marked with either the first name of the user (for public gifts) or the word "Private." An "Anonymous" option is also available, by which anyone with profile access can see the gift, but only the recipient will see the message. None will see the giver's name, and the gift will go in the recipient's gift box but not the wall. Facebook users are given one free gift to give upon account signup. Each additional gift given by a user costs USD $1.00. The initial selection of gifts was Valentine's Day themed, and 50% of the net proceeds (after credit card processing fees were taken out, etc.) received through February 2007 were donated to the charity Susan G. Komen for the Cure. After the month of February, the proceeds were no longer donated. Soon after, Facebook began making one new gift available each day, most of which had a limited supply or were available for a limited time. With the advent of Applications came a way to subvert the required US$1.00 payment; however, the gifts in the "Free Gifts" application, created by Zachary Allia, are not the same as the official gifts, as they are displayed in a different manner. Marketplace Information from Wikipedia 54 3/7/2016 In May 2007, Facebook introduced the Facebook Marketplace allowing users to post free classified ads within the following categories: For Sale, Housing, Jobs, and Other. Ads can be posted in either available or wanted format. The market place is available for all Facebook users and is currently free. Pokes Facebook includes a "poke" feature which allows one user to send a "poke" to another. According to Facebook's FAQ section on the Poke Feature, "a poke is a way to interact with your friends on Facebook. When we created the poke, we thought it would be cool to have a feature without any specific purpose. People interpret the poke in many different ways, and we encourage you to come up with your own meanings." In principle this is intended to serve as a "nudge" to attract the attention of the other user. However while many Facebook users, as intended, use the feature to attract attention or say hello, some users construe it as a sexual advance. This interpretation of the feature inspired a popular Facebook group titled "Enough with the Poking, Lets Just Have Sex", which, as of December 2007, has more than 340,000 members. There are several applications such as "X Me" and "SuperPoke!", that allow users to put any action in place of the word "poke." Status The "status" feature allows users to inform their friends and the Facebook community of their current whereabouts and actions. Facebook originally prompted the status update with "User name is..." and Facebook users filled in the rest. However, on December 13, 2007, the requirement to start a status update with "is" was removed, and all status updates read "User name ..." Status updates are noted in the "Recently updated" section of a users' friend list. Events Facebook events are a way for members to let friends know about upcoming events in their community and to organize social gatherings. Applications On May 24, 2007, Facebook launched the Facebook Platform, which provides a framework for developers to create applications that interact with core Facebook features. Even games such as chess and Scrabble are available. As of 5 December 2007, there are more than 10,000 applications. Third-party websites such as Adonomics, which provides application metrics, and blogs such as AppRate, Inside Facebook and Face Reviews have sprung up in response to the clamor for Facebook applications. On July 4, 2007, Altura Ventures announced the "Altura 1 Facebook Investment Fund," becoming the world's first Facebook-only venture capital firm. On August 29, 2007, Facebook changed the way in which the popularity of applications is measured, in order to give more attention to the more engaging applications, following criticism that ranking applications only by the number of users was giving an advantage to the highly viral, yet useless applications. Tech blog Valleywag has criticized Facebook Applications, labeling them a "cornucopia of uselessness." Others have called for limiting third-party applications so the Facebook "user experience" is not degraded. Information from Wikipedia 55 3/7/2016 Primarily attempting to create viral applications is a method that has certainly been employed by numerous Facebook application developers. Stanford University even offered a class in the Fall of 2007, entitled, Computer Science (CS) 377W: "Create Engaging Web Applications Using Metrics and Learning on Facebook". Numerous applications created by the class were highly successful, and ranked amongst the top Facebook applications, with some achieving over 3.5 million users in a month. Facebook Video During the time that Facebook released its platform, it also released an application of its own for sharing videos on Facebook. Users can add their videos with the service by uploading video, adding video through Facebook Mobile, and using a webcam recording feature. Additionally, users can "tag" their friends in videos they add much like the way users can tag their friends in photos. Technical details Facebook Markup Language Facebook Markup Language ("FBML") is a variant evolved subset of HTML with some elements removed. It allows Facebook application writers to customise the "look and feel" of their applications, to a limited extent. It is the specification of how to encode your content so that Facebook's servers can read and publish it, which you will need to use in your Facebook-specific feed so that Facebook's system can properly parse your content and publish it as specified. You set the FBML for a profile box by calling profile.setFBML through the API. The FBML is cached on Facebook's server until profile.setFBML is called again through a canvas page. The official FBML documentation is now hosted on the Facebook Developers Wiki. The FBML will expand to something like this: <input <input <input <input <input type="hidden" type="hidden" type="hidden" type="hidden" type="hidden" name="fb_sig_profile" value="1160"/> name="fb_sig_user" value="1160"/> name="fb_sig_session_key" value="b12d7f73fc47536b32e89e-1160"/> name="fb_sig_time" value="1176705186"/> name="fb_sig" value="773af1263c2b7bade7958e6b58d3152f"/> The fb_sig value is generated using all of the other fb_sig_ parameters (but without the "fb_sig_" prefix included in their names) identically to how it is generated in the API authentication scheme. The fb_sig_user and fb_sig_session_key parameters will only be included if the user has a valid session with the application. The diagram on the right, expressed using the UML standard notation for class diagrams, represents a subset of the information managed by Facebook. It gives a concise picture of the various entities, relations and fields stored in the database. For instance, the diagram shows what fields are associated with the notion of Job, School, CreditCard, ScreenName, and so on (see the corresponding yellow boxes representing classes). Note that this is a conceptual class diagram: it describes the concepts rather than the implementation and the detail of the database. For more information about technical models, see FQL - Facebook Query Language (SQL-like query language). Infrastructure For running its operations Facebook uses the software bundle known as LAMP. Information from Wikipedia 56 3/7/2016 Sale rumors In 2006, with the sale of social networking site MySpace to NewsCorp, rumors surfaced about the possible sale of Facebook to a larger media company. Zuckerberg, the owner of Facebook, had already said that he did not want to sell the company and denied rumors to the contrary. He had already rejected outright offers in the range of $975 million, and it was not clear who might be willing to pay a higher premium for the site. Steve Rosenbush, a technology business analyst, suspected Viacom might. In September 2006, serious talks between Facebook and Yahoo! took place for the acquisition of the social network, with prices reaching as high as $1 billion. In October 2007, after Google purchased video-sharing site YouTube, rumors circulated that Google had offered $2.3 billion to outbid Yahoo!. Peter Thiel, a board member of Facebook, indicated that Facebook's internal valuation is around $8 billion based on their projected revenues of $1 billion by 2015, comparable to that of Viacom's MTV brand and based on shared target demographic audience. In September 2007, Microsoft approached Facebook, proposing an investment in return for a 5% stake in the company. Microsoft would pay an estimated 300 to 500 million dollars for the share. Other companies such as Google had also expressed interest in buying a portion of Facebook. On October 24, 2007, Microsoft announced that it had bought a 1.6% share of Facebook for $246 million. Use in investigations The information students provide on Facebook has been used in investigations by colleges, universities, and local police. Facebook's Terms of Use specify that "the website is available for your personal, noncommercial use only", misleading some to believe that college administrators and police may not use the site for conducting investigations. Furthermore, some employers look at Facebook profiles of prospective employees or interns. Information posted on Facebook is potentially accessible to employers with faculty or alumni accounts. Blocking of Facebook in Syria In November of 2007, Facebook was blocked by the Syrian government on the premise that it promoted attacks on the authorities. No comment was made from the government that blocked it, which has started a crackdown on online political activism in that period. Responses Schools blocking access The University of New Mexico (UNM) in October 2005 blocked access to Facebook from UNM campus computers and networks, citing unsolicited e-mails and a similar site called UNM Facebook. After a UNM user signed into Facebook from off campus, a message from Facebook said, "We are working with the UNM administration to lift the block and have explained that it was instituted based on erroneous information, but they have not yet committed to restore your access." UNM, in a message to students who tried to access the site from the UNM network, wrote, "This site is temporarily unavailable while UNM and the site owners work out procedural issues. The site is in violation of UNM's Acceptable Computer Use Policy for abusing computing resources (e.g., spamming, trademark infringement, etc.). The site forces use of UNM credentials (e.g., NetID or email address) for non-UNM business." However, after Facebook created an encrypted login and displayed a precautionary message not to use university passwords for access, UNM unblocked access the following spring semester. Information from Wikipedia 57 3/7/2016 The Columbus Dispatch reported on June 22, 2006, that Kent State University's athletic director had planned to ban the use of Facebook by athletes and gave them until August 1 to delete their accounts.On July 5, 2006, the Daily Kent Stater reported that the director reversed the decision after reviewing the privacy settings of Facebook. Most school boards in North America that run elementary schools to high schools have the access to Facebook blocked. Organizations blocking Facebook Ontario government employees, MPPs, and cabinet ministers were blocked from access to Facebook on government computers in May 2007. When the employees tried to access Facebook, a warning message "The Internet website that you have requested has been deemed unacceptable for use for government business purposes". This warning also appears when employees try to access YouTube, gambling or pornographic websites. However, innovative employees have found ways around such protocols, and many claim to use the site for political or work-related purposes. The New South Wales Department of Education and Training has also blocked all users (students and staff) from accessing Facebook, as have many other government departments in Australia. Facebook memorials A notable ancillary effect of social networking websites, particularly Facebook, is the ability for participants to mourn publicly for a deceased individual. On Facebook, students often leave messages of sadness, grief, or hope on the individual's page, transforming it into a sort of public book of condolences. This particular phenomenon has been documented at a number of schools. Previously, Facebook had stated that its official policy on the matter was to remove the profile of the deceased one month after he or she has died, preventing the profile from being used for communal mourning, citing privacy concerns. Due to user response, Facebook amended its policy. Its new policy is to place deceased members' profiles in a "memorialization state". Additional usage of Facebook as a tool of remembrance is expressed in group memberships on the site. Now that groups are community-wide and available among all networks, many users create Facebook groups to remember not only a deceased friend or individual, but also as a source of support in response to an occurrence such as September 11, 2001 attacks or the Virginia Tech massacre in April 2007. Customization and security Facebook is often compared to MySpace but one significant difference between the two sites is the level of customization. MySpace allows users to decorate their profiles using HTML and CSS while Facebook only allows plain text. However, a number of users have tweaked their profiles by using "hacks." On February 24, 2006, a pair of users exploited a cross-site scripting (XSS) hole on the profile page and created a fast-spreading worm, loading a custom CSS file on infected profiles that made them look like MySpace profiles. Notably, both users are now employed by Facebook.[citation needed] On April 19, 2006, a user was able to embed an iframe into his profile and load a custom off-site page featuring a streaming video and a flash game from Drawball. He has since been banned from Facebook. On March 26, 2006, a user was able to embed JavaScript in the "Hometown" field of his profile which imported his custom CSS. In each case, Facebook quickly patched the holes, typically within hours of their discovery. In July 2007, Adrienne Felt, an undergraduate student at the University of Virginia, discovered a cross-site scripting (XSS) hole in the Facebook Platform that could inject JavaScript into profiles, which was used to import custom CSS and demonstrate how the platform could be used to violate privacy rules or create a worm. This hole took Facebook two and a half weeks to fix. Information from Wikipedia 58 3/7/2016 LinkedIn LinkedIn is a business-oriented networking site founded in December 2002 and launched in May 2003 (comparable to a social networking site), mainly used for professional networking. As of December 2007, it had more than 17 million registered users, spanning 150 industries and more than 400 economic regions (as classified by the service). Company info LinkedIn's CEO is Dan Nye, while former CEO and LinkedIn founder Reid Hoffman, previously an executive vice president of PayPal, remains as President of Product and Chairman of the Board. LinkedIn is located in Mountain View, California, and funded by Greylock, Sequoia Capital, Bessemer Venture Partners, and the European Founders Fund. LinkedIn reached profitability in March 2006. LinkedIn.com is a private firm operating an internet web portal to foster the development of social networking for professional development and career enhancement in the business community. As of December 2007, it had approximately 3.2 million visitors per month and an annual growth rate in visitors of about 485%. Features The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone (whether a site user or not) to become a connection. This list of connections can then be used in a number of ways: A contact network is built up consisting of their direct connections, the connections of each of their connections (termed second degree connections) and also the connections of second degree connections (termed third degree connections). This can be used to gain an introduction to someone you wish to know through a mutual, trusted contact. It can then be used to find jobs, people and business opportunities recommended by someone in one's contact network. Employers can list jobs and search for potential candidates. Job seekers can review the profile of hiring managers and discover which of their existing contacts can introduce them. The "gated-access approach" (where contact with any professional requires either a preexisting relationship, or the intervention of a contact of theirs) is intended to build trust among the service's users. LinkedIn participates in EU's International Safe Harbor Privacy Principles. The feature LinkedIn Answers, similar to Google Answers or Yahoo! Answers, allows users to ask questions for the community to answer. This feature is free and the main differences from the two previously mentioned services are that questions are potentially more business-oriented, and the identity of the people asking and answering questions is known. Information from Wikipedia 59 3/7/2016 Model of the domain The diagram on the right, expressed using the UML standard notation for class diagrams, represents a subset of the information managed by LinkedIn. It gives a global overview of the core entities, relations and fields stored by the system. For instance, the diagram shows what fields are associated with the notion of Position, RecommendationRequest, Education and so on (see the corresponding boxes representing classes). Note that this is only a conceptual class diagram; it describes the concepts rather than the implementation and the details of the database. Privacy issues Non-members can check whether or not a person is a member. As of August 2007, this feature can be disabled. There is no automated way to remove oneself from LinkedIn. The official method is to file a customer support ticket. Sites with comparable features There are several websites that offer online business networking, including ryze, XING, Plaxo, Yahoo! Kickstart and, increasingly Facebook. LinkedIn answers is comparable to Yahoo! Answers. Various websites such as CareerBuilder.com, Yahoo! HotJobs, GlobalPitch.com and Monster.com have job search functions. Many websites have reputation systems and online social networking. Plaxo Plaxo is an online address book service founded by Napster co-founder Sean Parker, Minh Nguyen, and two Stanford engineering students, Todd Masonis and Cameron Ring. Plaxo, based in Mountain View, California, is currently privately held and supported by venture capital. In October 2006, the website reported 15 million users. Plaxo provides automatic updating of contact information. Users and their contacts store their information on Plaxo's servers. When this information is edited by the user, the changes appear in the address books of all those who listed the account changer in their own books. Once contacts are stored in the central location, it is possible to list connections between contacts and access the address book from anywhere. A Plaxo plug-in supports major address books including Outlook/Outlook Express, Mozilla Thunderbird, and Mac OS X's Address Book, though other ones can be supported through an application programming interface. Additionally, Plaxo can also be maintained through an online version. Plaxo received criticism from technology journalist David Coursey, who was upset about receiving a number of requests from Plaxo users to update their contact information, and who wondered how the company was planning to make money from a free service that collects personal contact and network information. However after "changes at Plaxo and discussions with the company's remaining co-founders", Coursey reversed his stance. Plaxo also responded to these issues in a section of their website. Information from Wikipedia 60 3/7/2016 Plaxo 3.0 On June 24, 2007 Plaxo announced the public beta of a major new version of its service, called Plaxo 3.0. The service emphasizes "automated, multi-way sync." Plaxo Pulse On August 5, 2007 Plaxo announced the public beta of a social networking service called Plaxo Pulse. The service enables sharing of content from multiple different sources across the social web, including blogs, photos, social networking services, rating services, and others. Users can selectively share and view content according to either pre-determined categories (e.g. friends, family, business network) or customized groups. Plaxo Pulse was the first site to feature a working version of an OpenSocial container. MySpace is a social networking website offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music and videos internationally. Its headquarters are in Beverly Hills, California, USA, where it shares an office building with its immediate owner, Fox Interactive Media; in turn, the owner of Fox Interactive and therefore MySpace, News Corporation, has its headquarters in New York City. According to Alexa Internet, MySpace is currently the world's sixth most popular English-language website and the sixth most popular website in any language, and the third most popular website in the United States, though it has topped the chart on various weeks.The service has gradually gained more popularity than similar websites to achieve nearly 80 percent of visits to online social networking websites. The company employs 300 staff and does not disclose revenues or profits separately from News Corporation. With the 100 millionth account being created on August 9, 2006, in the Netherlands and a news story claiming 106 million accounts on September 8, 2006, the site reportedly attracts new registrations at a rate of 230,000 per day. As of December 18, 2007, there are over 300 million accounts. eUniverse (which in 2004 changed its name to Intermix Media) created and marketed the Myspace website in 1999, providing the division with a complete infrastructure of finance, human resources, technical expertise, bandwidth, and server capacity right out of the gate so the MySpace team wasn’t distracted with typical start-up issues. The project was overseen by Brad Greenspan (eUniverse's Founder, Chairman, CEO), who managed Chris DeWolfe (MySpace's current CEO), Josh Berman, Tom Anderson (MySpace's current president), and a team of programmers and resources provided by eUniverse. The very first MySpace users were eUniverse employees. The company held contests to see who could sign-up the most users. The company then used its resources to push MySpace to the masses. eUniverse used its 20 million users and e-mail subscribers to quickly breathe life into MySpace , and move it to the head of the pack of social networking websites. A key architect was tech expert Toan Nguyen who helped stabilize the MySpace platform when Brad Greenspan asked him to join the team. Shortly after launching MySpace, team member Chris DeWolfe in its first business plan suggested that they start charging a fee for the basic MySpace service. Brad Greenspan nixed the idea, believing that keeping MySpace free and open was necessary to make it a large and successful community. Some employees of MySpace including DeWolfe and Berman were later able to purchase equity in the property before MySpace, and its parent company eUniverse (now renamed ‘Intermix’), were bought in July 2005 for US$580 million by Rupert Murdoch's News Corporation (the parent company of Fox Broadcasting and other media enterprises). Of this amount, approx. US$327m has been attributed to the value of MySpace according to the financial adviser fairness opinion. Information from Wikipedia 61 3/7/2016 In January 2006, Fox announced plans to launch a UK version of MySpace in a bid to "tap into the UK music scene" which they have since done. They also released it in China and will possibly launch it in other countries The corporate history of MySpace as well as the status of Tom Anderson as a MySpace founder has been a matter of some public dispute. Contents of a MySpace profile Blurbs, blogs, multimedia Profiles contain two standard "blurbs:" "About Me" and "Who I'd Like to Meet" sections. Profiles also contain an "Interests" section and a "Details" section. However, fields in these sections will not be displayed if members do not fill them in. Profiles also contain a blog with standard fields for content, emotion, and media. MySpace also supports uploading images. One of the images can be chosen to be the "default image," the image that will be seen on the profile's main page, search page, and as the image that will appear to the side of the user's name on comments, messages, etc. Flash, such as on MySpace's video service, can be embedded. Also there is a "details" section which allows the user to provide personal information on the user such as his/her race, religion, sexual orientation. Comments Below the User's Friends Space (by default) is the "comments" section, wherein the user's friends may leave comments for all viewers to read. MySpace users have the option to delete any comment and/or require all comments to be approved before posting. If a user's account is deleted, every comment left on other profiles by that user will be deleted, and replaced with the comment saying "This Profile No Longer Exists." Some people leave comments such as "Thanks for the add!" if the person added him or her as a friend. Sometimes if they don't like each other anymore, they might say "You suck!" and block the person. Some people abuse the system so that they may add a person as a friend, only to say "You dumb ass!" and delete them as a friend. Profile customization (HTML) MySpace allows users to customize their user profile pages by entering HTML (but not JavaScript) into such areas as "About Me," "I'd Like to Meet," and "Interests." Videos, and flash-based content can be included this way. Users also have the option to add music to their profile pages via MySpace Music, a service that allows bands to post songs for use on MySpace. A user can also change the general appearance of his page by entering CSS (in a <style> ... </style> element) into one of these fields to override the page's default style sheet using MySpace editors. This is often used to tweak fonts and colors, but it has its limitations due to poorly-structured HTML used on the profile page. The fact that the user-added CSS is located in the middle of the page (rather than being located in the <head> element) means that the page will begin to load with the default MySpace layout before abruptly changing to the custom layout. A special type of modification is a div overlay, where the default layout is dramatically changed by hiding default text with <div> tags and large images. There are several independent web sites offering MySpace layout design utilities which let a user select options and preview what their page will look like with them. MySpace has recently added its own "Profile Customizer" to the site, allowing users to change their profile through MySpace. Using this feature bypasses the CSS loading delay issue, as the MySpace default code is changed for the customized profile. Information from Wikipedia 62 3/7/2016 Music MySpace profiles for musicians are different from normal profiles in that artists are allowed to upload up to six MP3 songs. The uploader must have rights to use the songs (e.g their own work, permission granted, etc). Unsigned musicians can use MySpace to post and sell music, which has proven popular among MySpace users. MySpace features Bulletins Bulletins are posts that are posted on to a "bulletin board" for everyone on a MySpace user's friends list to see. Bulletins can be useful for notifying an entire, but usually a portion of the friends list (depending on how many friends are added), without resorting to messaging users individually. Some users choose to use Bulletins as a service for delivering chain messages about politics, religion, or anything else and sometimes these chain messages are considered threatening to the users, especially the ones that mention bad luck, death, or topics similar to that.They have also become the primary attack point for phishing. Bulletins are deleted after ten days. Groups MySpace has a Groups feature which allows a group of users to share a common page and message board. Groups can be created by anybody, and the moderator of the group can choose for anyone to join, or to approve or deny requests to join. MySpaceIM In early 2006, MySpace introduced MySpaceIM, an instant messenger that uses one's MySpace account as a screen name. A MySpace user logs in to the client using the same e-mail associated with his or her MySpace account. Unlike other parts of MySpace, MySpaceIM is stand-alone software for Microsoft Windows. Users who use MySpaceIM get instant notification of new MySpace messages, friend requests, and comments. MySpaceTV In early 2007, MySpace introduced MySpaceTV, not a YouTube look-alike video sharing website. MySpace Mobile There are a variety of environments in which users can access MySpace content on their mobile phone. American mobile phone provider Helio released a series of mobile phones in early 2006 that can utilise a service known as MySpace Mobile to access and edit one's profile and communicate with, and view the profiles of, other members. Additionally, UIEvolution and MySpace developed a mobile version of MySpace for a wider range of carriers, including AT&T, Vodafone and Rogers Wireless. MySpace News In the month of April 2007, MySpace launched a news service called MySpace News which displays news from RSS feeds that users submit. It also allows users to rank each news story by voting for it. The more votes a story gets, the higher the story moves up the page. Information from Wikipedia 63 3/7/2016 MySpace Classifieds Full service classifieds listing offered beginning in August 2006. Has grown by 33 percent in one year since inception. Controversy over corporate history Spam/Tom Anderson PR In September 2006, a lengthy article written by web journalist Trent Lapinski, "MySpace: The Business of Spam 2.0", was published by the Silicon Valley gossip blog, Valleywag (a Gawker Media property). The article recounted a detailed corporate history of MySpace, alleging that MySpace was not organically grown from Tom Anderson's garage, but rather was a product developed by eUniverse aimed at overtaking Friendster, and that had initially gained popularity through an intensive mass internet campaign and not by word of mouth. Amongst other claims was the assertion that Tom Anderson had originally been hired as a copyeditor and his "founder" and "first friend" status was a public relations invention. Lapinski suggested that News Corp. had attempted to suppress the publication of the history by threatening his original publisher. Brad Greenspan / The MySpace Report In October 2006, Brad Greenspan (the former Chairman, CEO and largest individual shareholder of Intermix Media, who claims to be the true "founder of MySpace") launched a website and published "The MySpace Report" that called for the Securities and Exchange Commission, the United States Department of Justice and the U.S. Senate Committee on Finance to investigate News Corp's acquisition of MySpace as "one of the largest merger and acquisition scandals in U.S. history." The report's main allegation is that News Corp. should have valued MySpace at US$20 billion rather than US$327 million, and had, in effect, defrauded Intermix shareholders through an unfair deal process.The report received a mixed response from financial commentators in the press.An initial lawsuit led by Greenspan challenging the acquisition was dismissed by a judge. Greenspan's report also states that the MySpace program code had originally been the brainchild of an Intermix/eUniverse programmer named Toan Nguyen who made the breakthrough technical contributions to the project. Valleywag speculated that Greenspan was likely a key source for Lapinski's September article, "MySpace founder accuses company of defrauding investors of $20 billion." Criticism Customer Service To compound potential issues, MySpace has no customer service telephone number readily available for the public,and contacting them for help via any other available corporate phone numbers rarely yields substantial results. Accessibility and reliability Because most MySpace pages are designed by individuals with little HTML experience, a very large proportion of pages do not satisfy the criteria for valid HTML or CSS laid down by the W3C. Poorly formatted code can Information from Wikipedia 64 3/7/2016 cause accessibility problems for those using software such as screen readers. The MySpace home page, as of December 27, 2007, fails HTML validation with 117 errors, using the W3C's validator. Furthermore, MySpace is set up so that anyone can customise the layout and colors of their profile page with virtually no restrictions, provided that the advertisements are not covered up by CSS or using other means. As MySpace users are usually not skilled web developers, this can cause further problems. Poorly constructed MySpace profiles could potentially freeze up web browsers due to malformed CSS coding, or as a result of users placing many high bandwidth objects such as videos, graphics, and Flash in their profiles (sometimes multiple videos and sound files are automatically played at the same time when a profile loads). PC World cited this as its main reason for naming MySpace as #1 in its list of twenty-five worst web sites ever. In addition, new features have been gradually added (see featuritis). This, and the increasing number of MySpace members, leads to an increase in bandwidth used. This increase in usage often slows down the servers and may result in a "Server Too Busy" error message for some users who are on at peak hours, "Sorry! an unexpected error has occurred. This error has been forwarded to MySpace's technical group," or a variety of any other error messages throughout the day. Security In October 2005, a flaw in MySpace's site design was exploited by 'Samy' to create the first self-propagating cross-site scripting (XSS) worm. MSNBC has reported that "social-networking sites like MySpace are turning out to be hotbeds for spyware", with "[i]nfection rates are on the rise, in part thanks to the surging popularity of social-networking sites like MySpace.com." In addition to this, the customization of user pages currently allows the injection of certain HTML which can be crafted to form a phishing user profile, thus keeping the myspace.com domain as the address. More recently, there has been spam on bulletins that has been the result of phishing.Users find their MySpace homepage with bulletins they didn't post, realizing later they had been phished. The bulletin consists of an advertisement that provides a link to a fake login screen, tricking people into typing in their MySpace e-mail and password. Other security fears regarding profile content itself are also present. For example, the embedding of videos inherently allows all of the format's abilities and functions to be used on a page. A prime example of this surfaced in December 2006, when embedded QuickTime videos were shown to contain hyperlinks to JavaScript files, which would be run simply by a user visiting a 'phished' profile page, or even in some cases by simply viewing a user's 'about me' elsewhere on the site. Users who entered their login information into a fake login bar that appeared would also become 'phished', and their account would be used to spam other members, thus spreading this security problem. In April 2007, a house in the United Kingdom was wrecked by gatecrashers storming a party after reading an invite for it on MySpace. The party caused an estimated £20,000-£25,000 worth of damage, forcing the family to move out after graffiti was sprayed on walls and light fixtures were ripped out. Rachel Bell, the organizer of the party, claimed that her account was hacked and she only expected a small number of people to turn up. The resulting situation required several police cars and a dog-handling unit in order to restore peace. Child safety The minimum age to register an account on MySpace is 14. Profiles with ages set to 14 or 15 years are automatically private. Users whose ages are set at 16 or over have the option to restrict their profiles and the option of allowing certain personal data to be restricted to people other than those on their friends list. Accessing the full profile of, or messaging someone when their account is set to "private" (or if under sixteen) is restricted to a MySpace user's direct friends. Information from Wikipedia 65 3/7/2016 MySpace will delete these profiles if the victim verifies their identity and points out the profile via e-mail. Recently, MySpace has been the focus of a number of news reports stating that teenagers have found ways around the restrictions set by MySpace, and have been the target of online predators. In response, MySpace has given assurances to parents that the website is safe for people of all ages. Beginning in late June 2006, MySpace users whose ages are set over 18 could no longer be able to add users whose ages are set from 14 to 15 years as friends unless they already know the user's full name or email address. Some third party Internet safety companies like Social Shield have launched online communities for parents concerned about their child's safety on MySpace. In June 2006, 16-year-old American Katherine Lester flew to the Middle East, to Tel Aviv, Israel, after having tricked her parents into getting her a passport in order to be with a 20-year-old man she met through MySpace. U.S. officials in Jordan persuaded the teen to turn around and go home. In December 2006, MySpace announced new measures to protect children from known sex offenders. Although precise details were not given they said that "tools" would be implemented to prevent known sex offenders from the USA creating a MySpace profile. In February 2007, a U.S. District Judge in Texas dismissed a case when a family sued MySpace for negligence, fraud and misrepresentation; a girl in the family had been sexually assaulted by a man she met through MySpace, after she had misrepresented her age as 18 when she was 13. Regarding his dismissal of the case, U.S. District Judge Sam Sparks wrote: "If anyone had a duty to protect Julie Doe, it was her parents, not MySpace." In July 2007, the company found and deleted 29000 profiles belonging to registered sex offenders.Hardline anti-pedophile organization Perverted Justice has praised Myspace for its efforts to combat pedophiles using their service. In October 2007, a study published in the Journal of Adolescence conducted by Sameer Hinduja (Florida Atlantic University) and Justin W. Patchin (University of Wisconsin-Eau Claire) concluded that most adolescents use MySpace responsibly: "When considered in its proper context, these results indicate that the problem of personal information disclosure on MySpace may not be as widespread as many assume, and that the overwhelming majority of adolescents are responsibly using the website," they say. Social and cultural Dave Itzkoff, in the June 2006 Playboy magazine, related his experiences of experimentation with membership in MySpace. Among his other criticisms, one pertains to the distance afforded by the Internet that emboldens members, such as females who feature photos of themselves in scant clothing on their profile pages or behave in ways they would not in person, and he indicated that this duplicity undercuts the central design of MySpace, namely, to bring people together. Itzkoff also referenced the addictive, time-consuming nature of the site, mentioning that the Playboy Playmate and MySpace member Julie McCullough, who was the first to respond to his add-friend request, pointedly referred to the site as "cybercrack". Itzkoff argued that MySpace gives many people access to a member’s life, without giving the time needed to maintain such relationships and that such relationships do not possess the depth of in-person relationships. Furthermore, in terms of MySpace's potential for underhanded commercial exploitation, Itzkoff is particularly critical of the disturbing and fraudulent behavior of people who can contact a member, unsolicited, as when he was contacted by someone expressing a desire to socialize and date, but whose blog (to which Itzkoff was directed via subsequent emails) was found to be a solicitation for a series of commercial porn sites. Itzkoff is similarly critical of the more subtle commercial solicitations on the site, such as the banner ads and links to Information from Wikipedia 66 3/7/2016 profiles and video clips that turn out to be, for example, commercials for new 20th Century Fox films. He also observed that MySpace’s much-celebrated music section is heavily weighted in favor of record labels rather than breakthrough musicians. In relating criticism from another person, whom Itzkoff called "Judas," he illustrated that, while the goal of attempting to bring together people who might not otherwise associate with one another in real life may seem honorable, MySpace inherently violates a social contract only present when people interact face-to-face, rendering, in his opinion, the website nothing more than a passing fad: “There will come a moment when, like deer quivering and flicking up their ears toward a noiseless noise in the woods, the first adopters will suddenly realize they’re spending their time blogging, adding, and gawking at the same alarming photos as an army of 14-year olds, and quick as deer, they’ll dash to the next trend. And before you know it, we’ll all follow.” Politics Many political organizations have created Myspace accounts to keep in touch with and expand their membership base. These range from larger organizations like Greenpeace and the ACLU to smaller locally focused environmentalist groups and Food Not Bombs activists. Several historical political figures (from Napoleon to George Washington to Herbert Marcuse) have had accounts created to either raise awareness about their role in history or perhaps sometimes to behave more in jest as if those historical figures were actually posting messages and adding friends, etc. Many hopeful 2008 presidential candidates have set up MySpace profiles, presumably in an effort to snare younger voters. Most profiles feature photos, blogs, videos, and ways for viewers to get involved with campaigning. MySpace features these politicians' profiles on its front page in the "Cool New People" section, on what appears to be a random rotation. Censorship Activist group MoveOn.org has criticized MySpace, claiming that the website practices censorship by not showing anti-media ads, removing fake profiles for high-profile media executives like Rupert Murdoch, and allegedly attempting to force users away from using third-party flash applications on their profiles. Stalking According to Alison Kiss, program director for Security on Campus, social networking websites such as MySpace and Facebook have made it easier for stalkers who target women on college campuses. MySpace China The Chinese version of MySpace, launched in April of 2007, has many censorship-related differences from other international versions of the service. Discussion forums on topics such as religion and politics are absent, and a filtering system that prevents the posting of content about Taiwan independence, the Dalai Lama, Falun Gong, and other "inappropriate topics" has been added. Users are also given the ability to report the "misconduct" of other users for offenses including "endangering national security, leaking state secrets, subverting the government, undermining national unity, and spreading rumors or disturbing the social order." Information from Wikipedia 67 3/7/2016 International sites Since early 2006, MySpace has offered the option to access the service in different regional versions. The alternative regional versions present automated content according to locality (e.g. UK users see other UK users as "Cool New People," and UK oriented events and adverts, etc.), offer local languages other than English, or accommodate the regional differences in spelling and conventions in the English-speaking world (e.g. United States: "favorites," mm/dd/yyyy; the rest of the world: "favourites," dd/mm/yyyy). Information from Wikipedia 68 3/7/2016