![]() The study also resulted in developments of theory relating to social metadata and relationship maintenance. The analysis revealed the use of experimental profiles, clashes between work-and non-work-related social metadata usage and differences in users' social investment, causing social dilemmas. Three hundred and fifteen relevant comments on social metadata usage were extracted. Data were gathered from a variety of online forums by collecting and analyzing user discussions relating to social metadata supporting features in Facebook. The results of a study of end-user practices of social metadata usage are presented in this article. Few scholars have, however, taken the perspective of end users and examined how they utilize social metadata to enrich interpersonal communication. Social metadata are receiving interest from many domains, mainly as a way to aggregate various patterns in social networks. ![]() In specific, it explores the technical details, inter-dependencies and maturity of the available solutions. As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures. Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, features that are not addressed in other P2P surveys. Firstly, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Such networks support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. As a zero-trust alternative, peer-to-peer (P2P) technologies promise networks that are self organizing and secure-by-design, in which the final data sovereignty lies at the corresponding user. Even, federated privately run social networks require a few enthusiasts that serve the community and have, through that, access to the data they manage. While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store. ![]() Most, if not all, of these platforms are based on centralized computing systems, meaning that the control and management of the systems lies in the hand of one provider, which must be trusted to treat the data and communication traces securely. Online social networks, such as Facebook and twitter, are a growing phenomenon in today's world, with various platforms providing capabilities for individuals to collaborate through messaging and chatting as well as sharing of content such as videos and photos.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |