Education and the social Web: Connective learning and the commercial imperative

Author(s):  
Norm Friesen

In recent years, new socially-oriented Web technologies have been portrayed as placing the learner at the centre of networks of knowledge and expertise, potentially leading to new forms of learning and education. In this paper, I argue that commercial social networks are much less about circulating knowledge than they are about connecting users (“eyeballs”) with advertisers; it is not the autonomous individual learner, but collective corporate interests that occupy the centre of these networks. Looking first at Facebook, Twitter, Digg and similar services, I argue their business model restricts their information design in ways that detract from learner control and educational use. I also argue more generally that the predominant “culture” and corresponding types of content on services like those provided Google similarly privileges advertising interests at the expense of users. Just as commercialism has rendered television beyond the reach of education, commercial pressures threaten to seriously limit the potential of the social Web for education and learning.

2018 ◽  
pp. 978-1003
Author(s):  
Asmae El Kassiri ◽  
Fatima-Zahra Belouadha

The Online Social Networks (OSN) have a positive evolution due to the diversity of social media and the increase in the number of users. The revenue of the social media organizations is generated from the analysis of users' profiles and behaviors, knowing that surfers maintain several accounts on different OSNs. To satisfy its users, the social media organizations have initiated projects for ensuring interoperability to allow for users creating other accounts on other OSN using an initial account, and sharing content from one media to others. Believing that the future generations of Internet will be based on the semantic web technologies, multiple academic and industrial projects have emerged with the objective of modeling semantically the OSNs to ensure interoperability or data aggregation and analysis. In this chapter, we present related works and argue the necessity of a unified semantic model (USM) for OSNs; we introduce a kernel of a USM using standard social ontologies to support the principal social media and it can be extended to support other future social media.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Author(s):  
Margherita Pagani ◽  
Charles F. Hofacker

Managers are increasingly interested in the social web, as it provides numerous opportunities for strengthening and expanding relationships with customers, but the network processes that lead to these user-based assets are poorly understood. In this paper, the authors explore factors influencing use and participation in virtual social networks. They also discuss unusual drivers and inhibitors present with virtual social networks—highlighted by the presence of positive network externalities and fears that the content will be misused. The authors offer hypotheses stemming from a model of how these factors work together, test the model with a dataset collected from two different virtual social networks, and discuss the implications of this work. The findings offer managers insights on how to nurture Web 2.0 processes.


Author(s):  
Nitin Agarwal ◽  
Huan Liu ◽  
Jianping Zhang

In Golbeck and Hendler (2006), authors consider those social friendship networking sites where users explicitly provide trust ratings to other members. However, for large social friendship networks it is infeasible to assign trust ratings to each and every member so they propose an inferring mechanism which would assign binary trust ratings (trustworthy/non-trustworthy) to those who have not been assigned one. They demonstrate the use of these trust values in e-mail ?ltering application domain and report encouraging results. Authors also assume three crucial properties of trust for their approach to work: transitivity, asymmetry, and personalization. These trust scores are often transitive, meaning, if Alice trusts Bob and Bob trusts Charles then Alice can trust Charles. Asymmetry says that for two people involved in a relationship, trust is not necessarily identical in both directions. This is contrary to what was proposed in Yu and Singh (2003). They assume symmetric trust values in the social friendship network. Social networks allow us to share experiences, thoughts, opinions, and ideas. Members of these networks, in return experience a sense of community, a feeling of belonging, a bonding that members matter to one another and their needs will be met through being together. Individuals expand their social networks, convene groups of like-minded individuals and nurture discussions. In recent years, computers and the World Wide Web technologies have pushed social networks to a whole new level. It has made possible for individuals to connect with each other beyond geographical barriers in a “flat” world. The widespread awareness and pervasive usability of the social networks can be partially attributed to Web 2.0. Representative interaction Web services of social networks are social friendship networks, the blogosphere, social and collaborative annotation (aka “folksonomies”), and media sharing. In this work, we brie?y introduce each of these with focus on social friendship networks and the blogosphere. We analyze and compare their varied characteristics, research issues, state-of-the-art approaches, and challenges these social networking services have posed in community formation, evolution and dynamics, emerging reputable experts and in?uential members of the community, information diffusion in social networks, community clustering into meaningful groups, collaboration recommendation, mining “collective wisdom” or “open source intelligence” from the exorbitantly available user-generated contents. We present a comparative study and put forth subtle yet essential differences of research in friendship networks and Blogosphere, and shed light on their potential research directions and on cross-pollination of the two fertile domains of ever expanding social networks on the Web.


2010 ◽  
pp. 1012-1029
Author(s):  
Pankaj Kamthan

The discipline of software engineering has been gaining significance in computer science and engineering education. The technological environment in which software engineering education (SEE) resides and thrives has also been changing over the past few years. A technological revitalization of SEE requires a considerate examination from human and social perspectives. This chapter studies the impact of integrating Social Web technologies and applications based on these technologies in collaborative activities pertaining to SEE. In particular, teacher–student and student–student collaborations, both inside and outside the classroom, are highlighted. In doing so, the feasibility issues in selection and adoption of technologies/applications are emphasized and the use of pedagogically-inclined patterns is made. The potential prospects of such an integration and related concerns are illustrated by practical examples


Author(s):  
Nitin Agarwal ◽  
Huan Liu ◽  
Jianping Zhang

In (Golbeck and Hendler, 2006), authors consider those social friendship networking sites where users explicitly provide trust ratings to other members. However, for large social friendship networks it is infeasible to assign trust ratings to each and every member so they propose an inferring mechanism which would assign binary trust ratings (trustworthy/non-trustworthy) to those who have not been assigned one. They demonstrate the use of these trust values in email filtering application domain and report encouraging results. Authors also assume three crucial properties of trust for their approach to work; transitivity, asymmetry, and personalization. These trust scores are often transitive, meaning, if Alice trusts Bob and Bob trusts Charles then Alice can trust Charles. Asymmetry says that for two people involved in a relationship, trust is not necessarily identical in both directions. This is contrary to whatwas proposed in (Yu and Singh, 2003). They assume symmetric trust values in the social friendship network. Social networks allow us to share experiences, thoughts, opinions, and ideas. Members of these networks, in return experience a sense of community, a feeling of belonging, a bonding that members matter to one another and their needs will be met through being together. Individuals expand their social networks, convene groups of like-minded individuals and nurture discussions. In recent years, computers and the World Wide Web technologies have pushed social networks to a whole new level. It has made possible for individuals to connect with each other beyond geographical barriers in a “flat” world. The widespread awareness and pervasive usability of the social networks can be partially attributed to Web 2.0. Representative interaction Web services of social networks are social friendship networks, the blogosphere, social and collaborative annotation (aka “folksonomies”), and media sharing. In this work, we briefly introduce each of these with focus on social friendship networks and the blogosphere. We analyze and compare their varied characteristics, research issues, state-of-the-art approaches, and challenges these social networking services have posed in community formation, evolution and dynamics, emerging reputable experts and influential members of the community, information diffusion in social networks, community clustering into meaningful groups, collaboration recommendation, mining “collective wisdom” or “open source intelligence” from the exorbitantly available user-generated contents. We present a comparative study and put forth subtle yet essential differences of research in friendship networks and Blogosphere, and shed light on their potential research directions and on cross-pollination of the two fertile domains of ever expanding social networks on the Web.


Author(s):  
Athanasios Kokkos ◽  
Theodoros Tzouramanis

Online social networking services have come to dominate the dot com world: Countless online communities coexist on the social Web. Some typically characteristic user attributes, such as gender, age group, sexual orientation, are not automatically part of the profile information. In some cases user attributes can even be deliberately and maliciously falsified. This paper examines automated inference of gender on online social networks by analyzing written text with a combination of natural language processing and classification techniques. Extensive experimentation on LinkedIn and Twitter has yielded accuracy of this gender identification technique of up to 98.4 percent.


2016 ◽  
Vol 18 (5) ◽  
pp. 459-477
Author(s):  
Sarah Whitcomb Laiola

This article addresses issues of user precarity and vulnerability in online social networks. As social media criticism by Jose van Dijck, Felix Stalder, and Geert Lovink describes, the social web is a predatory system that exploits users’ desires for connection. Although accurate, this critical description casts the social web as a zone where users are always already disempowered, so fails to imagine possibilities for users beyond this paradigm. This article examines Natalie Bookchin’s composite video series, Testament, as it mobilizes an alt-(ernative) social network of vernacular video on YouTube. In the first place, the alt-social network works as an iteration of “tactical media” to critically reimagine empowered user-to-user interactions on the social web. In the second place, it obfuscates YouTube’s data-mining functionality, so allows users to socialize online in a way that evades their direct translation into data and the exploitation of their social labor.


Sign in / Sign up

Export Citation Format

Share Document