15,029 research outputs found

    Incentives for Quality over Time – The Case of Facebook Applications

    Get PDF
    We study the market for applications on Facebook, the dominant platform for social networking and make use of a rule change by Facebook by which high-quality applications were rewarded with further opportunities to engage users. We find that the change led to quality being a more important driver of usage while sheer network size became less important. Further, we find that update frequency helps applications maintain higher usage, while generally usage of Facebook applications declines less rapidly with age

    Modelling Requirements for Content Recommendation Systems

    Full text link
    This paper addresses the modelling of requirements for a content Recommendation System (RS) for Online Social Networks (OSNs). On OSNs, a user switches roles constantly between content generator and content receiver. The goals and softgoals are different when the user is generating a post, as opposed as replying to a post. In other words, the user is generating instances of different entities, depending on the role she has: a generator generates instances of a "post", while the receiver generates instances of a "reply". Therefore, we believe that when addressing Requirements Engineering (RE) for RS, it is necessary to distinguish these roles clearly. We aim to model an essential dynamic on OSN, namely that when a user creates (posts) content, other users can ignore that content, or themselves start generating new content in reply, or react to the initial posting. This dynamic is key to designing OSNs, because it influences how active users are, and how attractive the OSN is for existing, and to new users. We apply a well-known Goal Oriented RE (GORE) technique, namely i-star, and show that this language fails to capture this dynamic, and thus cannot be used alone to model the problem domain. Hence, in order to represent this dynamic, its relationships to other OSNs' requirements, and to capture all relevant information, we suggest using another modelling language, namely Petri Nets, on top of i-star for the modelling of the problem domain. We use Petri Nets because it is a tool that is used to simulate the dynamic and concurrent activities of a system and can be used by both practitioners and theoreticians.Comment: 28 pages, 7 figure

    User Perceptions of Smart Home IoT Privacy

    Full text link
    Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more households including Internet-connected devices that continuously monitor user activities. In this study, we conduct eleven semi-structured interviews with smart home owners, investigating their reasons for purchasing IoT devices, perceptions of smart home privacy risks, and actions taken to protect their privacy from those external to the home who create, manage, track, or regulate IoT devices and/or their data. We note several recurring themes. First, users' desires for convenience and connectedness dictate their privacy-related behaviors for dealing with external entities, such as device manufacturers, Internet Service Providers, governments, and advertisers. Second, user opinions about external entities collecting smart home data depend on perceived benefit from these entities. Third, users trust IoT device manufacturers to protect their privacy but do not verify that these protections are in place. Fourth, users are unaware of privacy risks from inference algorithms operating on data from non-audio/visual devices. These findings motivate several recommendations for device designers, researchers, and industry standards to better match device privacy features to the expectations and preferences of smart home owners.Comment: 20 pages, 1 tabl

    Honey Sheets: What Happens to Leaked Google Spreadsheets?

    Get PDF
    Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper, we present a system able to monitor user activity on Google spreadsheets. We populated 5 Google spreadsheets with fake bank account details and fake funds transfer links. Each spreadsheet was configured to report details of accesses and clicks on links back to us. To study how people interact with these spreadsheets in case they are leaked, we posted unique links pointing to the spreadsheets on a popular paste site. We then monitored activity in the accounts for 72 days, and observed 165 accesses in total. We were able to observe interesting modifications to these spreadsheets performed by illicit accesses. For instance, we observed deletion of some fake bank account information, in addition to insults and warnings that some visitors entered in some of the spreadsheets. Our preliminary results show that our system can be used to shed light on cybercriminal behavior with regards to leaked online documents

    How can we use mobile apps for disaster communications in Taiwan: Problems and possible practice

    Get PDF
    The growth rate of global smart phone in 2010 is as high as 78.1%, showing that smart phone gradually becomes the mainstream in the mobile phone market. Smart phone has the function of installing applications, provides users with more diversified mobile value-added services and will change users' communication habits in the future. Mobile communication follows the development trend of 3G and WiMAX, make users can link with mobile software stores through internet, downloading all kinds of applications, which has provided human beings with more diversified information, and gradually changed people's living habits. With the widespread of smart phone in Taiwan and many mobile applications start to go popular in market, people are crazy about downloading mobile applications, and different applications create different types of communications. Within a trend of smart phone and massive mobile apps go popular in Taiwan, what can we do to apply these tools for disaster communications? And compare to other infrastructure-level support, is mobile app a feasible route for disaster communications? What is the possible uses and challenges. --

    Incentives for quality over time - the case of Facebook applications

    Get PDF
    We study the market for applications on Facebook, the dominant platform for social networking and make use of a rule change by Facebook by which high-quality applications were rewarded with further opportunities to engage users. We find that the change led to quality being a more important driver of usage while sheer network size became less important. Further, we find that update frequency helps applications maintain higher usage, while generally usage of Facebook applications declines less rapidly with age

    Creating Social Contagion through Viral Product Design: A Randomized Trial of Peer Influence in Networks

    Get PDF
    We examine how firms can create word of mouth peer influence and social contagion by incorporating viral features into their products. Word of mouth is generally considered to more effectively promote peer influence and contagion when it is personalized and active. Unfortunately, econometric identification of peer influence is non-trivial. We therefore use a randomized field experiment to test the effectiveness of passive-broadcast and active-personalized viral messaging capabilities in creating peer influence and social contagion among the 1.4 million friends of 9,687 experimental users. Surprisingly, we find that passive-broadcast viral messaging generates a 246% increase in local peer influence and social contagion, while adding active-personalized viral messaging only generates an additional 98% increase in contagion. Although active-personalized messaging is more effective per message and is correlated with more user engagement and product use, it is used less often and therefore generates less total peer adoption in the network than passive-broadcast messaging
    • …
    corecore