scholarly journals THE STEAM PLATFORM ECONOMY: CAPITALISING FROM PLAYER-DRIVEN ECONOMIES ON THE INTERNET.

Author(s):  
Anne Mette Thorhauge

With this paper I aim to analyse and discuss the Steam game platform in a platform economic perspective. I will argue that Steam represents a special type of platform economy due to its roots in gaming economies: Steam’s platform economy can be seen as a specific way of capitalising on the player-driven economies that arise within and beyond key game titles offered on the platform. The API offered to third party developers on Steams websites can be described as a ‘palette of monetization strategies’ that run from simple retail models in the game store, over various ways of integrating user generated content in the Steam Workshop to the prospects of harnessing and capitalising from players’ economic action in the Community market. A look some of the most-played games titles shows that this gives rise to a variety of diverse monetization strategies. Many of those monetization strategies move beyond advertising and the attention economy, making players trades another potential source of income. In all cases, of course, Steam gets its share.

Author(s):  
Matthew Hindman

The Internet was supposed to fragment audiences and make media monopolies impossible. Instead, behemoths like Google and Facebook now dominate the time we spend online—and grab all the profits from the attention economy. This book explains how this happened. It sheds light on the stunning rise of the digital giants and the online struggles of nearly everyone else—and reveals what small players can do to survive in a game that is rigged against them. The book shows how seemingly tiny advantages in attracting users can snowball over time. The Internet has not reduced the cost of reaching audiences—it has merely shifted who pays and how. Challenging some of the most enduring myths of digital life, the book explains why the Internet is not the postindustrial technology that has been sold to the public, how it has become mathematically impossible for grad students in a garage to beat Google, and why net neutrality alone is no guarantee of an open Internet. It also explains why the challenges for local digital news outlets and other small players are worse than they appear and demonstrates what it really takes to grow a digital audience and stay alive in today's online economy. The book shows why, even on the Internet, there is still no such thing as a free audience.


Communicology ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 167-179
Author(s):  
E.S. Nadezhkina

The term “digital public diplomacy” that appeared in the 21st century owes much to the emergence and development of the concept of Web 2.0 (interactive communication on the Internet). The principle of network interaction, in which the system becomes better with an increase in the number of users and the creation of user-generated content, made it possible to create social media platforms where news and entertainment content is created and moderated by the user. Such platforms have become an expression of the opinions of various groups of people in many countries of the world, including China. The Chinese segment of the Internet is “closed”, and many popular Western services are blocked in it. Studying the structure of Chinese social media platforms and microblogging, as well as analyzing targeted content is necessary to understand China’s public opinion, choose the right message channels and receive feedback for promoting the country’s public diplomacy. This paper reveals the main Chinese social media platforms and microblogging and provides the assessment of their popularity, as well as possibility of analyzing China’s public opinion based on “listening” to social media platforms and microblogging.


Author(s):  
Brad J. Sagarin ◽  
Mary Lynn Miller Henningsen

This chapter reviews research on resistance to influence, active or passive processes that reduce the impact of a potential source of social influence. This chapter begins with a discussion of the antecedents of resistance: characteristics of the influence target (strong attitudes, demographics, and personality), perceived aspects of the influence attempt (manipulative intent, threats to freedoms), or counterinfluence messages from a third party (forewarning, inoculation, stealing thunder, the poison parasite defense, resistance to social engineering) that motivate resistance. The chapter proceeds to a discussion of internal mechanisms of resistance (counterarguing, bolstering initial attitudes, derogating the source, attributing negative affect to the message or source, attempting to correct for bias) and external mechanisms of resistance (interpersonal strategies of communicating resistance and issuing refusals) and concludes with a discussion of the consequences of resistance for attitudes and relationships.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


2015 ◽  
Vol 4 (1) ◽  
pp. 17-28
Author(s):  
Renée Ridgway

‘Cybercapitalism’, commonly termed ‘digital capitalism’, refers to the Internet, or ‘cyber- space’ and seeks to engage in business models within this territory in order to make financial profit. Cybercapitalism is structured by a highly intricate series of communication networks, which connect us through our participation on social platforms, but outside of these platforms how do we navigate and explore this information superhighway? We do so predominantly through search requests. Algorithms ostensibly know what we want before we even type them, as with Google’s ‘autocomplete’. Thus search is not merely an abstract logic but a lived practice that helps manage and sort the nature of information we seek as well as the direction of our queries. Nowadays it has become clear that users pay for such services with their data, which is increasingly the means to finance various corporations’ growth as they sell this data to third party advertisers. It is a transaction and in the exchange we get relevance. But is this really true? 


2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.


2021 ◽  
Author(s):  
William Urquhart

While copyright legally protects the ownership of created works, fair dealing with copyrighted content has become a problematic topic with the rise of user-generated content. User-generated content can be easily produced with modern technology and shared on the internet. This has resulted in websites having complicated processes for dealing with copyrighted content and many have introduced automated copyright detection systems to limit their liabilities of copyright infringement. Since automated copyright detection systems have been introduced, they have fundamentally changed the way copyright infringement is managed online. However, a problem arises with automated copyright detection systems as they are incapable of detecting fair dealing. Fair dealing is a provision under New Zealand’s Copyright Act 1994 that allows the use of copyrighted content in certain cases. Consequently, this has turned into a controversial area between content creators and copyright holders as most user-generated content usually contains copyrighted content. Copyright laws also favour mass media companies as they control significant copyright properties, and this plays a key role in the economy. For this reason, copyright genuinely tends to focus on the rights of copyright holders and not so much for users of copyrighted content. Furthermore, New Zealand's Copyright Act 1994 has not been updated since 2011 and has become unsuitable for modern forms of creation on the internet. This research portfolio investigates the problematic issues concerning New Zealand’s Copyright Act 1994 with its application to user-generated content and YouTube’s automated copyright detection system called ‘Content ID’. To express research findings, this research portfolio contains a user-generated documentary and several other proposed methods of bypassing Content ID.


2018 ◽  
Author(s):  
David D. Clark ◽  
Amogh D. Dhamdhere ◽  
Matthew Luckie ◽  
KC C. Claffy

Sign in / Sign up

Export Citation Format

Share Document