15,029 research outputs found
Incentives for Quality over Time – The Case of Facebook Applications
We study the market for applications on Facebook, the dominant platform for social networking and make use of a rule change by Facebook by which high-quality applications were rewarded with further opportunities to engage users. We find that the change led to quality being a more important driver of usage while sheer network size became less important. Further, we find that update frequency helps applications maintain higher usage, while generally usage of Facebook applications declines less rapidly with age
Modelling Requirements for Content Recommendation Systems
This paper addresses the modelling of requirements for a content
Recommendation System (RS) for Online Social Networks (OSNs). On OSNs, a user
switches roles constantly between content generator and content receiver. The
goals and softgoals are different when the user is generating a post, as
opposed as replying to a post. In other words, the user is generating instances
of different entities, depending on the role she has: a generator generates
instances of a "post", while the receiver generates instances of a "reply".
Therefore, we believe that when addressing Requirements Engineering (RE) for
RS, it is necessary to distinguish these roles clearly.
We aim to model an essential dynamic on OSN, namely that when a user creates
(posts) content, other users can ignore that content, or themselves start
generating new content in reply, or react to the initial posting. This dynamic
is key to designing OSNs, because it influences how active users are, and how
attractive the OSN is for existing, and to new users. We apply a well-known
Goal Oriented RE (GORE) technique, namely i-star, and show that this language
fails to capture this dynamic, and thus cannot be used alone to model the
problem domain. Hence, in order to represent this dynamic, its relationships to
other OSNs' requirements, and to capture all relevant information, we suggest
using another modelling language, namely Petri Nets, on top of i-star for the
modelling of the problem domain. We use Petri Nets because it is a tool that is
used to simulate the dynamic and concurrent activities of a system and can be
used by both practitioners and theoreticians.Comment: 28 pages, 7 figure
User Perceptions of Smart Home IoT Privacy
Smart home Internet of Things (IoT) devices are rapidly increasing in
popularity, with more households including Internet-connected devices that
continuously monitor user activities. In this study, we conduct eleven
semi-structured interviews with smart home owners, investigating their reasons
for purchasing IoT devices, perceptions of smart home privacy risks, and
actions taken to protect their privacy from those external to the home who
create, manage, track, or regulate IoT devices and/or their data. We note
several recurring themes. First, users' desires for convenience and
connectedness dictate their privacy-related behaviors for dealing with external
entities, such as device manufacturers, Internet Service Providers,
governments, and advertisers. Second, user opinions about external entities
collecting smart home data depend on perceived benefit from these entities.
Third, users trust IoT device manufacturers to protect their privacy but do not
verify that these protections are in place. Fourth, users are unaware of
privacy risks from inference algorithms operating on data from non-audio/visual
devices. These findings motivate several recommendations for device designers,
researchers, and industry standards to better match device privacy features to
the expectations and preferences of smart home owners.Comment: 20 pages, 1 tabl
Honey Sheets: What Happens to Leaked Google Spreadsheets?
Cloud-based documents are inherently valuable, due to the volume and nature
of sensitive personal and business content stored in them. Despite the
importance of such documents to Internet users, there are still large gaps in
the understanding of what cybercriminals do when they illicitly get access to
them by for example compromising the account credentials they are associated
with. In this paper, we present a system able to monitor user activity on
Google spreadsheets. We populated 5 Google spreadsheets with fake bank account
details and fake funds transfer links. Each spreadsheet was configured to
report details of accesses and clicks on links back to us. To study how people
interact with these spreadsheets in case they are leaked, we posted unique
links pointing to the spreadsheets on a popular paste site. We then monitored
activity in the accounts for 72 days, and observed 165 accesses in total. We
were able to observe interesting modifications to these spreadsheets performed
by illicit accesses. For instance, we observed deletion of some fake bank
account information, in addition to insults and warnings that some visitors
entered in some of the spreadsheets. Our preliminary results show that our
system can be used to shed light on cybercriminal behavior with regards to
leaked online documents
How can we use mobile apps for disaster communications in Taiwan: Problems and possible practice
The growth rate of global smart phone in 2010 is as high as 78.1%, showing that smart phone gradually becomes the mainstream in the mobile phone market. Smart phone has the function of installing applications, provides users with more diversified mobile value-added services and will change users' communication habits in the future. Mobile communication follows the development trend of 3G and WiMAX, make users can link with mobile software stores through internet, downloading all kinds of applications, which has provided human beings with more diversified information, and gradually changed people's living habits. With the widespread of smart phone in Taiwan and many mobile applications start to go popular in market, people are crazy about downloading mobile applications, and different applications create different types of communications. Within a trend of smart phone and massive mobile apps go popular in Taiwan, what can we do to apply these tools for disaster communications? And compare to other infrastructure-level support, is mobile app a feasible route for disaster communications? What is the possible uses and challenges. --
Incentives for quality over time - the case of Facebook applications
We study the market for applications on Facebook, the dominant platform for social networking and make use of a rule change by Facebook by which high-quality applications were rewarded with further opportunities to engage users. We find that the change led to quality being a more important driver of usage while sheer network size became less important. Further, we find that update frequency helps applications maintain higher usage, while generally usage of Facebook applications declines less rapidly with age
Creating Social Contagion through Viral Product Design: A Randomized Trial of Peer Influence in Networks
We examine how firms can create word of mouth peer influence and social contagion by incorporating viral features into their products. Word of mouth is generally considered to more effectively promote peer influence and contagion when it is personalized and active. Unfortunately, econometric identification of peer influence is non-trivial. We therefore use a randomized field experiment to test the effectiveness of passive-broadcast and active-personalized viral messaging capabilities in creating peer influence and social contagion among the 1.4 million friends of 9,687 experimental users. Surprisingly, we find that passive-broadcast viral messaging generates a 246% increase in local peer influence and social contagion, while adding active-personalized viral messaging only generates an additional 98% increase in contagion. Although active-personalized messaging is more effective per message and is correlated with more user engagement and product use, it is used less often and therefore generates less total peer adoption in the network than passive-broadcast messaging
- …