Module 6 - Unit 5: Social Media

Ace your homework & exams now with Quizwiz!

Creative Commons License

A Creative Commons license is based on five rights that copyright holders can grant or deny to others: Attribution, Share Alike (Copyleft), No Derivatives, Public Domain, and NonCommercial

Follower

A Twitter user who follows your tweets

Binary Adjacency Matrix

A binary adjacency matrix is simply a set of cells containing a 0 if there is no connection between two people and a 1 if there is a connection.

Blog

A blog (short for Web log) is similar to an online diary; it is maintained by a person, a company, or an organization, and it contains a series of entries on one or more topics. Blog entries are text based, but can also include graphics and video. They are usually displayed in reverse chronological order on a scrollable Web page.

Derivative Work

A derivative work modifies a copyrighted work but does not substantially change its content or purpose.

# hashtag

A hashtag such as #ipadgames that specifies a keyword that can be used to find and group tweets by topic, both in Twitter and across other social media; clicking a hashtag in a tweet displays all the other tweets with that hashtag (A directory of hashtags can be found at www.hashtags.org)

Twitter Stream

A list of tweets; a user's home page Twitter stream shows the user's own tweets and tweets from anyone the user is following

Metadata Tag

A metadata tag is simply a keyword that describes information, such as the content of a media element. In the context of content communities, tags are used to describe people and places in photos and videos.

@ mention

A person who is referred to in a tweet with his or her Twitter handle preceded by an @ symbol (e.g., mentioning @BillGates in a tweet broadcasts it to your followers and places it in Bill Gates' Mentions tab)

Online Identity

A person's presence on a social media service is referred to as an online identity. Each online identity is encapsulated in a profile.

Social Media Profile

A social media profile is the set of information provided to friends, contacts, and the public. A basic profile generally includes a user name, an image, and a few lines of descriptive text.

Social Networking Service

A social networking service revolves around personal profiles and interconnections among subscribers who want to share information about themselves.

Trademark

A trademark is any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another.

Transformative Work

A transformative work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work. Transformative works are considered fair use; they can be produced and distributed without the copyright holder's permission.

Retweet

A tweet that is forwarded from one Twitter user to others

Wiki

A wiki is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.

Intellectual Property

All of the creations that materialize from the mind or intellect are considered intellectual property. Inventors, artists, writers, and other creative individuals are the owners of their intellectual property. Like other property, intellectual property is protected by various laws and regulations. There are four categories of intellectual property: patents, trademarks, copyrights, and trade secrets. Some of the media in content communities can be classified as trademarks, but most of it is copyrighted material.

Email Message

An email message is an electronic document transmitted over a computer network.

Social Discovery

An emerging subset of geosocial networking called social discovery uses geolocation to meet with people who are nearby and have similar interests.

Online Reputation

An online reputation is the impression that is generated by an online persona. It relates to the way others perceive a person's online identity, as opposed to the way in which a person defines himself or herself.

Email Server

At the heart of a typical email system is an email server—a computer that essentially acts as a central post office for a group of people. Email servers run special email server software, which provides an electronic mailbox for each person, sorts incoming messages into these mailboxes, and routes outgoing mail over the Internet to other email servers.

Cell Tower Triangulation

Cellular telephone companies monitor the position of mobile phones relative to nearby cell towers. If a phone is turned on and within range of three towers, a process called cell tower triangulation can determine the position of a device to an area of about three-quarters of a mile.

Copyleft

Copyleft is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license. Copyleft works and their derivatives cannot be later licensed in a way that would restrict their use.

Copyright

Copyright is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work. Copyright applies to "works" such as photos, books, articles, plays, dance performances, videos, animations, sound effects, musical compositions, and audio recordings. Just about everything available on content communities is protected by copyright. It is not necessary for the work to carry a copyright notice, nor is it required that the work's creator register the work to obtain copyright protection. Any original work automatically becomes copyrighted as soon as it is created, and the rights in Figure 5-18 can only be exercised by the copyright holder.

Impersonation

Deliberately using the name or avatar of another person without his or her consent and with the intent to harm, defraud, or intimidate is called impersonation. Impersonators can carry out reputation-damaging activities, such as posting inflammatory comments.

DM

Direct, email-like messages sent by Twitter users to any of their followers using the Messages option on the navigation bar

Fair Use

Earlier units touched on the concept of fair use, which allows for the limited use of copyrighted material without obtaining permission from the copyright holder. United States copyright regulations include four factors that characterize fair use: 1) The purpose and character of the use. The use of copyrighted materials without permission is more likely to be "fair" when the materials are transformed and used for a purpose different from that of the original work. 2) The nature of the copyrighted work. Guidelines for fair use of photos may differ from guidelines for music, videos, or written works. 3) The amount of the copyrighted work that is used. Quoting a paragraph from a book is more likely to be fair use than reproducing an entire chapter. 4) The effect on the value of the copyrighted work. Uses that deprive the copyright holder of income are not generally considered fair use.

Message Header

Email messages have a standard format that consists of a message header and the message body. The message header contains the sender and recipient addresses, date, and subject line. When you view an email message, this information is a simplified version of a more complex header that contains a huge amount of routing information, which traces the path of the message and reveals how it was treated by various servers.

Formal Tagging

Formal tagging methods add information to a tag according to a set of tagging standards. These standards make it possible to create generalized media search engines that can locate media from multiple locations.

Geocoding

Geocoding is the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of Cathy's Cafe.

Geotagging

Geocoding is the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of Cathy's Cafe. Geotagging is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages.

Geosocial Networking

Geosocial networking provides a platform for users to carry out interactions based on their current locations.

IP Address Lookup

IP addresses can provide a rough estimate of a device's location based on information in the WHOIS database. The country in which a device is located can be determined with 99% accuracy. However, the accuracy of pinpointing the region or city dwindles to about 50%.

Instant Messaging (IM)

Instant messaging (IM) is a synchronous, real-time technology for two or more people to type messages back and forth while online. It has the vibe of a phone call except that instead of talking, the parties are typing. With some IM systems, both parties can see messages character by character as they are typed. More typically, however, the recipient does not see the message as it is typed, but rather must wait until it is completed.

Tweets

Just as those services were limited to 140 characters, Twitter messages, called tweets, also carry such a limit.

Tagline

Most social media profiles include a short, publicly viewable tagline. Taglines not only reveal biographical information, but also can offer insights into a person's personality. Taglines are not dependable, however. They can be total fiction.

Privacy Policy

Most social media services have a written privacy policy that states how PII data is handled, including how it is accessed and how long it is stored. Privacy policies can be several pages long, and they are worth reading to discover if your expectations of privacy correspond to the privacy protections offered by the service.

Generic Profile Image

Most social media sites provide a generic profile image for users who do not upload a personal photo. Users who retain the generic image tend to be newcomers or spammers.

NPOV

Neutral point of view: Content for Wikipedia articles should be phrased and presented in neutral language and with unbiased intent.

NOR

No original research: Articles should be based on existing recognized knowledge. Personal views and original research are not appropriate.

One-Way Edges

One-way edges exist when a relationship is not reciprocal, such as a Twitter follower who does not follow back.

Doppelgangers

Online doppelgangers are two or more online personas with the same name or user name. The personas of doppelgangers are sometimes mistaken for each other, and their reputations may become intertwined.

Public Domain

Public domain refers to the status of works with expired copyrights or whose creators have forfeited their copyright.

RS

Reliable sources: The sources for Wikipedia content must conform to a set of guidelines designed to help contributors determine whether a source is acceptable.

Social Media

Social media are online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio.

Online Services

Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online (AOL), that were not part of the Internet. The popularity of those services decreased as a new generation of Internet-based services emerged.

Sociograms

Sociologists use social network diagrams called sociograms to depict connections between people.

Follow

Specifying a Twitter user whose tweets you want to receive

Social Media Honeycomb

The Social Media Honeycomb provides a visual model for classifying and comparing various social media services. Each hexagon in the honeycomb represents a social media building block.

Blogosphere

The blogosphere—all the blogs and their interconnections—is influential. Some bloggers have been tapped to be commentators for headline news shows on CNN and FOX.

Bulletin Board Systems

The bulletin board systems (BBSs) of the 1970s contained user-generated content and could be considered forerunners of today's content communities as well as today's social networks. Bulletin boards were popular for about 20 years before other efforts to gather and archive meaningful collections of online content emerged.

Sociogram Nodes

The circles in these diagrams are referred to as sociogram nodes.

Email System

The computers and software that provide email services form an email system.

Sociogram Edges

The lines connecting nodes are referred to as sociogram edges.

IMAP (Internet Message Access Protocol)

The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage your incoming mail. POP3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mail Transfer Protocol) handles outgoing mail.

POP3 (Post Office Protocol version 3)

The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage your incoming mail. POP3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mail Transfer Protocol) handles outgoing mail.

SMTP (Simple Mail Transfer Protocol)

The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage your incoming mail. POP3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mail Transfer Protocol) handles outgoing mail.

Email

The term email can refer to a single message or to the entire system of computers and software that transmits, receives, and stores email messages.

Sockpuppets

The use of sockpuppets—any online identity created and used for purposes of deception—is widespread

Content Communities

These social media sites are sometimes called content communities. Although it can be said that just about every social media site is populated with user-generated content, content communities emphasize the content itself, unlike social networking sites that revolve around user identities.

GPS Trilateration

This service locates smartphones and other devices containing GPS chips. It is accurate to within about three square yards.

Hotspot Triangulation

This technique can gauge the location of a Wi-Fi router based on its signal strength relative to nearby routers. Desktop and laptop computers connected to the router can be assumed to be operating within a circle of about 50 feet.

Trending

Tweet hashtags that are popular for a period of time

Promoted Tweet

Tweets that contain paid advertising and are labeled to distinguish them from non-commercial tweets

Twitter Handle

Twitter User name

Microblogging Service

Twitter is an example of a microblogging service because a Twitter message is basically a short blog post.

Two-way Edges

Two-way edges exist when two people consider each other to be friends.

Cyberbullying

Using information technology, such as the Internet, to deliberately harm or harass someone is called cyberbullying. The intent of cyberbullying is often to damage the reputation of the targeted person.

V

Verifiability: Readers must be able to verify all content against credible external sources based on citations included within the text and listed at the conclusion.

Viral

Viral refers to videos, music tracks, blog posts, and other media elements that quickly infiltrate popular culture via social media.

VoIP (Voice over Internet Protocol)

VoIP (Voice over Internet Protocol) is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls. Today's VoIP systems use a variety of communication protocols. Some of these protocols are open standards, while others, such as those used by Skype, Google Talk, Snapchat, and FaceTime, are proprietary.

Webmail

Webmail is typically a free service accessed using a browser. In a classic Webmail configuration, incoming messages are stored in an Inbox on the Web. When you want to read or send mail, use a browser to go to your email provider's Web site and log in. The controls for reading, composing, and managing messages are all presented in the browser window. While reading and composing mail, you generally must remain online

Follow Back

When Twitter users mutually follow each other (e.g., Sue follows Joe, and then Joe follows Sue back)

Asynchronous

When communication is asynchronous, messages are held until the recipient is ready to view them. Asynchronous communication offers convenience because information can be gathered whenever you want it. That information can, however, be out of date by the time you obtain it. Email is an example of asynchronous communication.

Synchronous

When communication is synchronous, interchanges happen in real time while all parties are online. Synchronous communications have the advantage of immediacy. They can convey your thoughts as you speak and events as they happen. Telephone calls are synchronous as are video conferences.

Crowdsourcing

When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in crowdsourcing.

Local Email

When you use local email, an Internet-based email server stores your incoming messages until you launch your email client and get your mail.

Store-and-forward

When you use local email, an Internet-based email server stores your incoming messages until you launch your email client and get your mail. Messages are then downloaded to a folder on a local storage device that serves as your email Inbox. This telecommunications technique is sometimes referred to as store-and-forward.

Blog Aggregator

You can use an RSS reader or blog aggregator to set up a "feed" that monitors your favorite blogs, collects the latest posts, and displays them.

RSS Reader

You can use an RSS reader or blog aggregator to set up a "feed" that monitors your favorite blogs, collects the latest posts, and displays them.

Defamation

ommunicating false statements that damage the reputation of another individual is referred to as defamation. In most countries, defamation is illegal.

Personally Identifiable Information (PII)

privacy is the "right to be let alone." Commonly held expectations of privacy include freedom from intrusive surveillance and the expectation that individuals can control their own personally identifiable information (PII) to limit when they can be identified, tracked, or contacted.

Privacy

privacy is the "right to be let alone." Commonly held expectations of privacy include freedom from intrusive surveillance and the expectation that individuals can control their own personally identifiable information (PII) to limit when they can be identified, tracked, or contacted.


Related study sets

Chapter 18: Social Psychology (Study Guide)

View Set

Epie - numbers (1-10) (proper spelling in parenthesis)

View Set

Cardiology:: Cardiac Output Module

View Set