Module 6 - Unit 5: Social Media
Creative Commons License
A Creative Commons license is based on five rights that copyright holders can grant or deny to others: Attribution, Share Alike (Copyleft), No Derivatives, Public Domain, and NonCommercial
Follower
A Twitter user who follows your tweets
Binary Adjacency Matrix
A binary adjacency matrix is simply a set of cells containing a 0 if there is no connection between two people and a 1 if there is a connection.
Blog
A blog (short for Web log) is similar to an online diary; it is maintained by a person, a company, or an organization, and it contains a series of entries on one or more topics. Blog entries are text based, but can also include graphics and video. They are usually displayed in reverse chronological order on a scrollable Web page.
Derivative Work
A derivative work modifies a copyrighted work but does not substantially change its content or purpose.
# hashtag
A hashtag such as #ipadgames that specifies a keyword that can be used to find and group tweets by topic, both in Twitter and across other social media; clicking a hashtag in a tweet displays all the other tweets with that hashtag (A directory of hashtags can be found at www.hashtags.org)
Twitter Stream
A list of tweets; a user's home page Twitter stream shows the user's own tweets and tweets from anyone the user is following
Metadata Tag
A metadata tag is simply a keyword that describes information, such as the content of a media element. In the context of content communities, tags are used to describe people and places in photos and videos.
@ mention
A person who is referred to in a tweet with his or her Twitter handle preceded by an @ symbol (e.g., mentioning @BillGates in a tweet broadcasts it to your followers and places it in Bill Gates' Mentions tab)
Online Identity
A person's presence on a social media service is referred to as an online identity. Each online identity is encapsulated in a profile.
Social Media Profile
A social media profile is the set of information provided to friends, contacts, and the public. A basic profile generally includes a user name, an image, and a few lines of descriptive text.
Social Networking Service
A social networking service revolves around personal profiles and interconnections among subscribers who want to share information about themselves.
Trademark
A trademark is any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another.
Transformative Work
A transformative work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work. Transformative works are considered fair use; they can be produced and distributed without the copyright holder's permission.
Retweet
A tweet that is forwarded from one Twitter user to others
Wiki
A wiki is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.
Intellectual Property
All of the creations that materialize from the mind or intellect are considered intellectual property. Inventors, artists, writers, and other creative individuals are the owners of their intellectual property. Like other property, intellectual property is protected by various laws and regulations. There are four categories of intellectual property: patents, trademarks, copyrights, and trade secrets. Some of the media in content communities can be classified as trademarks, but most of it is copyrighted material.
Email Message
An email message is an electronic document transmitted over a computer network.
Social Discovery
An emerging subset of geosocial networking called social discovery uses geolocation to meet with people who are nearby and have similar interests.
Online Reputation
An online reputation is the impression that is generated by an online persona. It relates to the way others perceive a person's online identity, as opposed to the way in which a person defines himself or herself.
Email Server
At the heart of a typical email system is an email server—a computer that essentially acts as a central post office for a group of people. Email servers run special email server software, which provides an electronic mailbox for each person, sorts incoming messages into these mailboxes, and routes outgoing mail over the Internet to other email servers.
Cell Tower Triangulation
Cellular telephone companies monitor the position of mobile phones relative to nearby cell towers. If a phone is turned on and within range of three towers, a process called cell tower triangulation can determine the position of a device to an area of about three-quarters of a mile.
Copyleft
Copyleft is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license. Copyleft works and their derivatives cannot be later licensed in a way that would restrict their use.
Copyright
Copyright is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work. Copyright applies to "works" such as photos, books, articles, plays, dance performances, videos, animations, sound effects, musical compositions, and audio recordings. Just about everything available on content communities is protected by copyright. It is not necessary for the work to carry a copyright notice, nor is it required that the work's creator register the work to obtain copyright protection. Any original work automatically becomes copyrighted as soon as it is created, and the rights in Figure 5-18 can only be exercised by the copyright holder.
Impersonation
Deliberately using the name or avatar of another person without his or her consent and with the intent to harm, defraud, or intimidate is called impersonation. Impersonators can carry out reputation-damaging activities, such as posting inflammatory comments.
DM
Direct, email-like messages sent by Twitter users to any of their followers using the Messages option on the navigation bar
Fair Use
Earlier units touched on the concept of fair use, which allows for the limited use of copyrighted material without obtaining permission from the copyright holder. United States copyright regulations include four factors that characterize fair use: 1) The purpose and character of the use. The use of copyrighted materials without permission is more likely to be "fair" when the materials are transformed and used for a purpose different from that of the original work. 2) The nature of the copyrighted work. Guidelines for fair use of photos may differ from guidelines for music, videos, or written works. 3) The amount of the copyrighted work that is used. Quoting a paragraph from a book is more likely to be fair use than reproducing an entire chapter. 4) The effect on the value of the copyrighted work. Uses that deprive the copyright holder of income are not generally considered fair use.
Message Header
Email messages have a standard format that consists of a message header and the message body. The message header contains the sender and recipient addresses, date, and subject line. When you view an email message, this information is a simplified version of a more complex header that contains a huge amount of routing information, which traces the path of the message and reveals how it was treated by various servers.
Formal Tagging
Formal tagging methods add information to a tag according to a set of tagging standards. These standards make it possible to create generalized media search engines that can locate media from multiple locations.
Geocoding
Geocoding is the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of Cathy's Cafe.
Geotagging
Geocoding is the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of Cathy's Cafe. Geotagging is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages.
Geosocial Networking
Geosocial networking provides a platform for users to carry out interactions based on their current locations.
IP Address Lookup
IP addresses can provide a rough estimate of a device's location based on information in the WHOIS database. The country in which a device is located can be determined with 99% accuracy. However, the accuracy of pinpointing the region or city dwindles to about 50%.
Instant Messaging (IM)
Instant messaging (IM) is a synchronous, real-time technology for two or more people to type messages back and forth while online. It has the vibe of a phone call except that instead of talking, the parties are typing. With some IM systems, both parties can see messages character by character as they are typed. More typically, however, the recipient does not see the message as it is typed, but rather must wait until it is completed.
Tweets
Just as those services were limited to 140 characters, Twitter messages, called tweets, also carry such a limit.
Tagline
Most social media profiles include a short, publicly viewable tagline. Taglines not only reveal biographical information, but also can offer insights into a person's personality. Taglines are not dependable, however. They can be total fiction.
Privacy Policy
Most social media services have a written privacy policy that states how PII data is handled, including how it is accessed and how long it is stored. Privacy policies can be several pages long, and they are worth reading to discover if your expectations of privacy correspond to the privacy protections offered by the service.
Generic Profile Image
Most social media sites provide a generic profile image for users who do not upload a personal photo. Users who retain the generic image tend to be newcomers or spammers.
NPOV
Neutral point of view: Content for Wikipedia articles should be phrased and presented in neutral language and with unbiased intent.
NOR
No original research: Articles should be based on existing recognized knowledge. Personal views and original research are not appropriate.
One-Way Edges
One-way edges exist when a relationship is not reciprocal, such as a Twitter follower who does not follow back.
Doppelgangers
Online doppelgangers are two or more online personas with the same name or user name. The personas of doppelgangers are sometimes mistaken for each other, and their reputations may become intertwined.
Public Domain
Public domain refers to the status of works with expired copyrights or whose creators have forfeited their copyright.
RS
Reliable sources: The sources for Wikipedia content must conform to a set of guidelines designed to help contributors determine whether a source is acceptable.
Social Media
Social media are online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio.
Online Services
Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online (AOL), that were not part of the Internet. The popularity of those services decreased as a new generation of Internet-based services emerged.
Sociograms
Sociologists use social network diagrams called sociograms to depict connections between people.
Follow
Specifying a Twitter user whose tweets you want to receive
Social Media Honeycomb
The Social Media Honeycomb provides a visual model for classifying and comparing various social media services. Each hexagon in the honeycomb represents a social media building block.
Blogosphere
The blogosphere—all the blogs and their interconnections—is influential. Some bloggers have been tapped to be commentators for headline news shows on CNN and FOX.
Bulletin Board Systems
The bulletin board systems (BBSs) of the 1970s contained user-generated content and could be considered forerunners of today's content communities as well as today's social networks. Bulletin boards were popular for about 20 years before other efforts to gather and archive meaningful collections of online content emerged.
Sociogram Nodes
The circles in these diagrams are referred to as sociogram nodes.
Email System
The computers and software that provide email services form an email system.
Sociogram Edges
The lines connecting nodes are referred to as sociogram edges.
IMAP (Internet Message Access Protocol)
The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage your incoming mail. POP3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mail Transfer Protocol) handles outgoing mail.
POP3 (Post Office Protocol version 3)
The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage your incoming mail. POP3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mail Transfer Protocol) handles outgoing mail.
SMTP (Simple Mail Transfer Protocol)
The protocols POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) can be used to manage your incoming mail. POP3 deletes messages from the server after they are downloaded, whereas IMAP leaves messages on the server until you specifically delete them. SMTP (Simple Mail Transfer Protocol) handles outgoing mail.
The term email can refer to a single message or to the entire system of computers and software that transmits, receives, and stores email messages.
Sockpuppets
The use of sockpuppets—any online identity created and used for purposes of deception—is widespread
Content Communities
These social media sites are sometimes called content communities. Although it can be said that just about every social media site is populated with user-generated content, content communities emphasize the content itself, unlike social networking sites that revolve around user identities.
GPS Trilateration
This service locates smartphones and other devices containing GPS chips. It is accurate to within about three square yards.
Hotspot Triangulation
This technique can gauge the location of a Wi-Fi router based on its signal strength relative to nearby routers. Desktop and laptop computers connected to the router can be assumed to be operating within a circle of about 50 feet.
Trending
Tweet hashtags that are popular for a period of time
Promoted Tweet
Tweets that contain paid advertising and are labeled to distinguish them from non-commercial tweets
Twitter Handle
Twitter User name
Microblogging Service
Twitter is an example of a microblogging service because a Twitter message is basically a short blog post.
Two-way Edges
Two-way edges exist when two people consider each other to be friends.
Cyberbullying
Using information technology, such as the Internet, to deliberately harm or harass someone is called cyberbullying. The intent of cyberbullying is often to damage the reputation of the targeted person.
V
Verifiability: Readers must be able to verify all content against credible external sources based on citations included within the text and listed at the conclusion.
Viral
Viral refers to videos, music tracks, blog posts, and other media elements that quickly infiltrate popular culture via social media.
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol) is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls. Today's VoIP systems use a variety of communication protocols. Some of these protocols are open standards, while others, such as those used by Skype, Google Talk, Snapchat, and FaceTime, are proprietary.
Webmail
Webmail is typically a free service accessed using a browser. In a classic Webmail configuration, incoming messages are stored in an Inbox on the Web. When you want to read or send mail, use a browser to go to your email provider's Web site and log in. The controls for reading, composing, and managing messages are all presented in the browser window. While reading and composing mail, you generally must remain online
Follow Back
When Twitter users mutually follow each other (e.g., Sue follows Joe, and then Joe follows Sue back)
Asynchronous
When communication is asynchronous, messages are held until the recipient is ready to view them. Asynchronous communication offers convenience because information can be gathered whenever you want it. That information can, however, be out of date by the time you obtain it. Email is an example of asynchronous communication.
Synchronous
When communication is synchronous, interchanges happen in real time while all parties are online. Synchronous communications have the advantage of immediacy. They can convey your thoughts as you speak and events as they happen. Telephone calls are synchronous as are video conferences.
Crowdsourcing
When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in crowdsourcing.
Local Email
When you use local email, an Internet-based email server stores your incoming messages until you launch your email client and get your mail.
Store-and-forward
When you use local email, an Internet-based email server stores your incoming messages until you launch your email client and get your mail. Messages are then downloaded to a folder on a local storage device that serves as your email Inbox. This telecommunications technique is sometimes referred to as store-and-forward.
Blog Aggregator
You can use an RSS reader or blog aggregator to set up a "feed" that monitors your favorite blogs, collects the latest posts, and displays them.
RSS Reader
You can use an RSS reader or blog aggregator to set up a "feed" that monitors your favorite blogs, collects the latest posts, and displays them.
Defamation
ommunicating false statements that damage the reputation of another individual is referred to as defamation. In most countries, defamation is illegal.
Personally Identifiable Information (PII)
privacy is the "right to be let alone." Commonly held expectations of privacy include freedom from intrusive surveillance and the expectation that individuals can control their own personally identifiable information (PII) to limit when they can be identified, tracked, or contacted.
Privacy
privacy is the "right to be let alone." Commonly held expectations of privacy include freedom from intrusive surveillance and the expectation that individuals can control their own personally identifiable information (PII) to limit when they can be identified, tracked, or contacted.