Unit 5 Social Networking - Cochise College

Unit 5 Social Networking - Cochise College

Unit 5 Social Networking Computer Concepts 2016 5 Unit Contents Section A: Social Networking Section B: Content Communities Section C: Blogs and More Section D: Online Communication Section E: Social Media Values Unit 5: Social Networking

2 5 Section A: Social Networking The Social Media Mix Social Networking Evolution Social Networking Basics Geosocial Networking Social Network Analytics Unit 5: Social Networking 3 5 The Social Media Mix

Social media are online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio Unit 5: Social Networking 4 5 The Social Media Mix The Social Media

Honeycomb provides a visual model for classifying and comparing various social media services Each hexagon in the honeycomb represents a social media building block Unit 5: Social Networking 5

5 The Social Media Mix In this unit, social media are categorized into four groups: Social networking Geosocial networking Content communities Online communications

Unit 5: Social Networking 6 5 Social Networking Evolution A social networking service revolves around personal profiles and interconnections among subscribers who want to share information about themselves Social networking can be traced back to online services, such

as CompuServe, Prodigy, and America Online (AOL), that were not part of the Internet Unit 5: Social Networking 7 5 Social Networking Basics A persons presence on a social media service is referred to as an online identity

Each online identity is encapsulated in a profile; a social media profile is the set of information provided to friends, contacts, and the public Unit 5: Social Networking 8 5 Social Networking Basics

Unit 5: Social Networking 9 5 Geosocial Networking Geosocial networking provides a platform for users to carry out interactions based on their current locations Some of the most popular and well-designed geosocial services include: Yelp, Foursquare, Banjo, and Google Maps An emerging subset of geosocial networking called social discovery, uses geolocation to

meet with people who are nearby and have similar interests Unit 5: Social Networking 10 5 Geosocial Networking Unit 5: Social Networking 11 5 Geosocial Networking

When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in crowdsourcing Yelp, Amazon, Zappos and other online merchants, provide ratings compiled from user reviews; this is an example of crowdsourcing Unit 5: Social Networking 12 5 Geosocial Networking

There are four ways that the location of a device can be determined: Unit 5: Social Networking 13 5 Geosocial Networking Presenting information about whats nearby requires places and landmarks to be tagged with

their location; geotagging and geocoding provide the necessary geographical information: Geocoding is the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of a location Geotagging is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages Unit 5: Social Networking 14 5 Social Network Analytics

Social networks are not exclusively online; sociologists use social network diagrams called sociograms to depict connections between people The circles in these diagrams are referred to as sociogram nodes The lines connecting nodes are referred to as sociogram edges Two-way edges exist when two people consider each other to be friends One-way edges exist when a relationship is not reciprocal, such as a Twitter follower who does not follow back Unit 5: Social Networking

15 5 Social Network Analytics Sociograms can get extremely complex, making connections difficult to trace and analyze An alternative method for depicting social connections is with an adjacency matrix A binary adjacency matrix is a set of cells containing a 0 if there is no connection between two people and a 1 if there is a connection Unit 5: Social Networking

16 5 Social Network Analytics Sociograms and other analytic tools help us to discover and understand the quality and quantity of our personal social networks One odd phenomenon that was discovered is called the class size paradox because it is related to the reason students feel that they are always in larger than average classes Unit 5: Social Networking

17 5 Social Network Analytics Heres how it works: Does it seem like most of your friends have more friends than you have? It turns out that is the case with more than 80% of Facebook users; the explanation is that people tend to choose popular classes and friends, and such popularity does indeed mean that the classes are larger and your friends will have more friends than you have Unit 5: Social Networking

18 5 Section B: Content Communities Evolution Media Content Communities Intellectual Property Creative Commons Unit 5: Social Networking 19 5 Evolution

Many social media sites, such as Wikipedia, YouTube, and Flicker, were designed as repositories for user-generated content These social media sites are sometimes called content communities These communities may focus on text-based information, or their focus may be on other media, such as photos, music, or video Unit 5: Social Networking 20 5 Evolution

Unit 5: Social Networking Content communities typically have these characteristics: 21 5 Evolution The bulletin board systems (BBSs) of the 1970s contained user-generated content and could be considered forerunners of todays content communities and social networks In 2001 a text-based collaborative called Wikipedia was

launched and a community of contributors quickly formed around it Video content communities launched with the founding of YouTube in 2005; that same year was the first instance of an online video going viral In the context of social media, viral refers to media elements that quickly infiltrate popular culture via social media Unit 5: Social Networking 22 5 Media Content Communities Media content communities are so popular that

most people with an Internet connection have logged in to take a look at videos from YouTube and images from Flickr Although many content communities allow open access to media, most require registration before files can be uploaded Content communities offer simple tools for uploading media files from a computer, and most offer apps that handle uploads from mobile devices Unit 5: Social Networking 23

5 Media Content Communities A metadata tag is simply a keyword that describes information, such as the content of a media element Formal tagging methods add information to a tag according to

a set of tagging standards Unit 5: Social Networking 24 5 Intellectual Property All of the creations that materialize from the mind or intellect are considered intellectual property Inventors, artists, writers, and other creative individuals are the owners of their intellectual property There are four categories of intellectual property:

Patents Trademarks Copyrights Trade secrets A trademark is any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another Unit 5: Social Networking

25 5 Intellectual Property Copyright is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, and sell Public domain refers to the status of works with expired copyrights or whose creators have forfeited their copyright; the works of Shakespeare are in the public domain Unit 5: Social Networking

26 5 Creative Commons A Creative Commons license is based on five rights that copyright holders can grant or deny to others: Unit 5: Social Networking

27 5 Creative Commons Whereas copyright is designed to limit the use of a work, copyleft is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license

Unit 5: Social Networking 28 5 Creative Commons Fair use allows for the limited use of copyrighted material without obtaining permission from the copyright holder United states copyright regulations include four factors that characterize fair use: Unit 5: Social Networking 29

5 Creative Commons A derivative work modifies a copyrighted work but does not substantially change its content or purpose; translations and adaptations are examples of derivative work A transformative work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work; parodies are considered transformative Unit 5: Social Networking

30 5 Section C: Blogs and More Blogs Microblogs Wikis Unit 5: Social Networking 31 5 Blogs A blog (short for Web

log) is similar to an online diary; it is maintained by a person, a company, or an organization, and it contains a series of entries on one or more topics Unit 5: Social Networking 32

5 Blogs Blogger and WordPress are the most popular blogging platforms You can use an RSS reader or blog aggregator to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them The blogosphereall the blogs and their interconnectionsis influential; blogs and other Internet-based news outlets have the potential to reach mass audience Unit 5: Social Networking

33 5 Blogs Professional journalists and the media companies they represent are guided by a code of ethics that encourages seeking truth, reporting it, minimizing harm, resisting outside influences, and

maintaining accountability Unit 5: Social Networking 34 5 Microblogs Twitter was modeled as a Web-based version of the text messaging services offered on mobile phones; it is an example of a microblogging service A microblogging service is essentially a

short blog post Twitter messages, called tweets, are limited to 140 characters Unit 5: Social Networking 35 5 Microblogs Twitter has a vocabulary all its own, and some of its terminology has spilled over to other

social media Unit 5: Social Networking 36 5 Wikis A wiki is a collaborative Web application that provides tools that enable contributors to post, read, and modify content Participants are encouraged

to register with the Wikipedia community and become Wikipedians As of 2014, more than 75,000 participants were regular contributors Unit 5: Social Networking 37 5 Wikis

Unit 5: Social Networking 38 5 Wikis Unit 5: Social Networking 39 5 Wikis Unit 5: Social Networking

40 5 Section D: Online Communication Communication Matrix Email Online Chat Voice and Video over IP Unit 5: Social Networking 41

5 Communication Matrix The Internet offers many tools for communicating and collaborating; more are appearing every day Unit 5: Social Networking 42 5 Communication Matrix Synchronous communication interchanges happen in real time while all parties are online; these communications have the advantage of immediacy

Asynchronous communication messages are held until the recipient is ready to view them; it offers convenience because information can be gathered whenever you want it Unit 5: Social Networking 43 5 Communication Matrix Public communications can be accessed by individuals unknown to the person who created a message; the word posting is associated with

this type of communication because it is similar to posting a billboard, sign, or poster Private communications communications for which you specify one or more recipients; text messaging is a popular type of private communication Unit 5: Social Networking 44 5 Email The term email can refer to a single message or to the entire system of computers and software that transmits,

receives, and stores email messages An email message is an electronic document transmitted over a computer network The computers and software that provide email services form an email system At the heart of a typical email system is an email server a computer that essentially acts as a central post office for a group of people Email messages have a standard format that consists of a message header and the message body; the message header contains the sender and recipient addresses, date, and subject line Unit 5: Social Networking

45 5 Email Webmail is typically a free service accessed using a browser Unit 5: Social Networking 46 5 Email Pros and Cons of Webmail: Affordable most Webmail is free; you can easily

establish additional accounts Access from mobile devices it can be accessed from mobile devices when your computer is not handy Access anywhere its ideal for people who travel because messages can be accessed from any computer connected to the Internet Security risks your email messages are stored on Web servers that can be hacked into Advertising free Webmail is supported by advertising, so expect to see ads Unit 5: Social Networking 47

5 Email When you use local email, an Internet based email server stores your incoming messages until you launch your email client and get your mail This telecommunications technique is sometimes referred to as store-and-forward The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage incoming mail SMTP (Simple Mail Transfer Protocol) handles outgoing mail Unit 5: Social Networking

48 5 Email Keep these protocols in mind when setting up local email because the server you specify for outgoing mail might be different from the server for incoming mail

Unit 5: Social Networking 49 5 Email Pros and Cons of Local Email: Offline access you can compose and read mail offline; you only need to go online to transfer outgoing mail from your Inbox to the email server and to receive incoming messages Control when you use POP3 to collect your mail, your messages are transferred to your computers hard disk, where you can control who

has access to them Unit 5: Social Networking 50 5 Online Chat Online chat services are used when you want to establish two-way communication Instant messaging (IM) is a synchronous, realtime technology for two or more people to type messages back and forth while online As the Internet grew, online services, such as Yahoo!, MSN, and AOL developed IM systems Today, IM is popular for customer service at

ecommerce sites Unit 5: Social Networking 51 5 Voice and Video over IP VoIP (Voice over Internet Protocol) is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls Skype, Google Talk, and Snapchat are examples of VoIP VoIPs work when software converts voice communications and video images into data packets using digitized techniques similar to those presented in Unit 1

Unit 5: Social Networking 52 5 Section E: Social Media Values Identity Reputation Privacy Unit 5: Social Networking 53

5 Identity An online identity consists of far more than a photo and a brief autobiographical sketch; the elements that constitute a social media identity include a biographical profile, the set of peole who form connections, and the information supplied as posts By some estimates, nearly 40% of all online identities are fake False identities are used for nefarious purposes by cyberbullies, criminals, and stalkers Unit 5: Social Networking

54 5 Identity The use of sockpuppetsany online identity created and used for purposes of deception is widespread Unit 5: Social Networking 55 5 Identity

Most social media sites provide a generic profile image for users who do not upload a personal photo Users who retain the generic image tend to be newcomers or spammers Most social media profiles include a short, publicly viewable tagline Detailed biographical information is generally viewable only by designated connections, depending on the users privacy settings Unit 5: Social Networking 56

5 Identity Some things to consider when selecting a profile picture: Unit 5: Social Networking 57 5 Reputation An online reputation is the impression that is generated by an online persona Many factors can have a negative effect on an individuals

online reputation Mistakes you may inadvertently post messages, comments, or photos that could be misinterpreted; these can affect public opinion of you Defamation communicating false statements that damage the reputation of another individual is referred to as defamation Cont Unit 5: Social Networking 58 5 Reputation

Impersonation deliberately using the name or avatar of another person without his or her consent and with the intent to harm, defraud, or intimidate is called impersonation Doppelgangers Online doppelgangers are two or more online personas with the same name or username; the personas of doppelgangers are sometimes mistaken for each other, and their reputations may become intertwined Unit 5: Social Networking 59

5 Reputation Unit 5: Social Networking 60 5 Reputation Unit 5: Social Networking 61

5 Privacy Privacy is the right to be left alone Individuals can control their own personally identifiable information (PII) to limit when they can be identified, tracked, or contacted Most social media services have a written privacy policy that states how PII data is handled and how long it is stored Unit 5: Social Networking 62 5 Privacy

Key steps in maintaining online privacy include awareness of the different types of data collected by social media services and the level of privacy appropriate for each type Unit 5: Social Networking

63 5 Privacy Data gone rogue escapes its appropriate privacy setting and somehow goes public The most common causes of rogue data include: A user changes his or her global privacy setting to Public A user designates an item as public when it is posted Changes in the social media services privacy policy result in previously private information becoming public A user ignores changes in the social media services privacy policy

Posted information is reposted publicly Third-party social networking apps redistribute information collected as the user works with an app Unit 5: Social Networking 64 5 Privacy Hundreds of third-party social media apps are available and they all collect information from social media profiles, including contact lists The following aspects of third-party apps may affect your privacy:

Collected data might not be transmitted over secure channels An excessive amount of personal data could be collected Data about your contacts might be collected Unit 5: Social Networking 65 5 Privacy Unit 5: Social Networking

66 5 Privacy Unit 5: Social Networking 67 Unit 5 Complete Computer Concepts 2016

Recently Viewed Presentations

  • Telecommunications Information Penetration

    Telecommunications Information Penetration

    SMN: 0.007 Level of Bulgaria and Slovakia (0.01) Source [13] Location of Access SMN: at home: 33% at the workplace 30% at home & workplace 23% other 13% Use Internet 12% Source [15], sample 1515, Serbia, Nov. 2001 Proposal: Information...
  • The Tariff Debate (pages 328-329) - Lincoln Park

    The Tariff Debate (pages 328-329) - Lincoln Park

    The Tariff Debate (pages 328-329) ... Cartoon of The Tariff of Abominations. In 1828, Congress passed the highest tariff in the nation's history. The tariff helped northern manufacturers by protecting them from foreign competition, but hurt southern planters who sold...
  • Hades - Mrs. Macemore

    Hades - Mrs. Macemore

    Hades is a Greek god who runs the Underworld. Hades is also known as The Unseen God. The name Hades is generally applied to the realm of the Underworld: Hades = Hades' realm. Hades was a son of the Titans...
  • NWSL 2013 Officials webinar Welcome PRO General Manager

    NWSL 2013 Officials webinar Welcome PRO General Manager

    Uniforms. OSI, button-up jerseys, latest style. Match jersey sleeve-length and socks. Black shoes. Avoid warm-up with "USA" on back. Black OSI or Nike t-shirt for warm-up. Avoid "Skittles", try to match each other for off-field attire if possible
  • WRITING - Queen Eleanor's C of E Junior School

    WRITING - Queen Eleanor's C of E Junior School

    Punctuation within writing - basic punctuation needs to be accurate with evidence of more advanced punctuation being used. Spelling within writing - most words spelt correctly including Year 5 and 6 Statutory Spelling List words. Handwriting - needs to be...
  • How Do Stalks Wither? An Interactive Case Series on Bilateral ...

    How Do Stalks Wither? An Interactive Case Series on Bilateral ...

    Attributed to damage of bilateral dentate nuclei or cerebellar output pathways (SCPs) SCPs vulnerable during resection due to their close relationship to the 4th ventricle. Ojemann JG, et . al., showed that diffusion tensor imaging of SCPs can identify patients...
  • Treatment of Mental Disorders Whats difference between a

    Treatment of Mental Disorders Whats difference between a

    (treats phobias) if you are afraid of snakes, start with worms, calm down, then graduate to having a snake in the next room, calm down, then look at pictures, calm down, then watch movies, calm down, then be in the...
  • Name: Jarrett-Unit 2: Review Sheet Classical EraWestPersia, Greece,

    Name: Jarrett-Unit 2: Review Sheet Classical EraWestPersia, Greece,

    d.Sparta (cont)5. Stressed absolute loyalty, courage, strength and endurance! 6. No major contribution achieved because intelligence achievements were not