Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Journal

2014 | 47 | 4 | 219-230

Article title

The Prospects for Consumer-Oriented Social Media

Authors

Title variants

Languages of publication

EN

Abstracts

EN
Background and Purpose: The term ‘social media’ refers to a cluster of applications and online services that support human interaction and content broadcasting and sharing. Current services are isolated islands or ‘walled gardens’, and are based on a business model that is highly exploitative of individuals and their data. Design/Methodology/Approach: Surveys of the refereed literature have been undertaken on several occasions during the period 2012-13. Reviews were conducted of social media services that are reasonably described as ‘consumer-oriented’. Media reports on those services were uncovered. The available information was then subjected to analysis, including reflection based on prior research conducted by the author. Results: Required characteristics of consumer-oriented social media, and barriers to emergence and adoption of such services were identified. That provided a basis for proposing means to overcome those barriers. Key impediments to the emergence of such services were identified, and means of overcoming the impediments outlined. Conclusion: An alternative, consumer-oriented approach is feasible, involving open architecture, inter-operability and portability features, fair terms and privacy-sensitivity.

Publisher

Journal

Year

Volume

47

Issue

4

Pages

219-230

Physical description

Dates

published
2014-11-01
received
2014-09-21
revised
2014-09-29
accepted
2014-10-04
online
2014-12-30

Contributors

author
  • Xamax Consultancy Pty Ltd, Canberra, Australia, and Australian National University, Canberra, and

References

  • Bambury P. (1998). A Taxonomy of Internet Commerce. First Monday, 3(10) (October 5, 1998), at http://www.firstmonday.dk/issues/issue3_10/bambury/index.html
  • Bankston K. (2009). Facebook’s New Privacy Changes: The Good, The Bad, and The Ugly. Electronic Frontier Foundation, 9 December 2009, at https://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changesgood-bad-and-ugly
  • Barnes S.B. (2006). A privacy paradox: Social networking in the United States’ First Monday, 11(9) (September 2006), at http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/1394/1312%23
  • BBC (2011). Facebook U-turns on phone and address data sharing. BBC News, 18 January 2011, at http://www. bbc.com/news/technology-12214628
  • Bell E. (2012). The real threat to the open web lies with the opaque elite who run it. The Guardian, 16 April 2012, at http://www.guardian.co.uk/commentisfree/2012/apr/16/threat-open-web-opaque-elite
  • Berners-Lee T. (2010). Long Live the Web. Scientific American, December 2010, pp. 80-85, at http://www.cs.virginia.edu/~robins/Long_Live_the_Web.pdf
  • Bettini C., Jajodia S., Samarati P., & Wang X.S. (Eds.) (2009). Privacy in Location-Based Applications: Research Issues and Emerging Trends. Lecture Notes in Computer Science 5599, Springer-Verlag.
  • Bleicher A. (2011). The Anti-Facebook. IEEE Spectrum, June 2011, pp. 47-51, 74, http://dx.doi.org/10.1109/MSPEC.2011.5779793 [Crossref]
  • boyd d. (2008). Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. The International Journal of Research into New Media Technologies, 14(1), 13-20, http://dx.doi.org/10.1177/1354856507084416 [Crossref]
  • boyd d. (2012). The politics of “real names”. Communications of the ACM, 55(8) (August 2012) 29-31, http://dx.doi.org/10.1145/2240236.2240247 [Crossref]
  • boyd d., & Hargittai E. (2010). Facebook privacy settings: Who cares?. First Monday, 15, 8 (July 2010), at http:// firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/ article/view/3086/2589
  • Cabello F., Franco M.G., & Haché A. (2013). The Social Web beyond ‘Walled Gardens’: Interoperability, Federation and the Case of Lorea/n-1. PsychNology Journal, 11(1), 43 - 65, at http://www.psychnology.org/File/PNJ11(1)/PSYCHNOLOGY_JOURNAL_11_1_CABELLO.pdfCFP (2010). A Social Network Users’ Bill of Rights.
  • Computers, Freedom & Privacy Conference, June 2010, at http://www.cfp2010.org/wiki/index.php/A_Social_ Network_Users%27_Bill_of_Rights Clarke R. (1994). Information Infrastructure for The Networked Nation. Xamax Consultancy Pty Ltd, November 1994, at http://www.rogerclarke.com/II/NetNation.html, Extract from Section 2.4 at http://www.rogerclarke.com/II/NetN2.html
  • Clarke R. (1999). Person-Location and Person-Tracking: Technologies, Risks and Policy Implications. Proc. 21st International Conf. Privacy and Personal Data Protection, Hong Kong, September 1999. Revised version published in Information Technology & People 14, 1 (2001) 206-231, http://dx.doi.org/10.1108/09593840110695767[Crossref]
  • Clarke R. (2002). e-Consent: A Critical Element of Trust in e-Business. Proc. 15th Bled Electronic Commerce Conference, Bled, Slovenia, 17-19 June 2002, at https:// domino.fov.uni-mb.si/proceedings Clarke R. (2004a). Very Black ‘Little Black Books’. Xamax Consultancy Pty Ltd, February 2004, at http://www.rogerclarke.com/DV/ContactPITs.html
  • Clarke R. (2004b). Open Source Software and Open Content as Models for eBusiness. Proc. 17th International eCommerce Conference, Bled, Slovenia, 21-23 June 2004, https://domino.fov.uni-mb.si/proceedings
  • Clarke R. (2006). What’s ‘Privacy’?. Submission to the Australian Law Reform Commission, Xamax Consultancy Pty Ltd, July 2006, at http://www.rogerclarke.com/DV/Privacy.html
  • Clarke R. (2007). Business Models to Support Content Commons. SCRIPT-ed Special Issue on ‘Creating Commons’, 4(1), 59-71, http://dx.doi.org/10.2966/ scrip.040107.59[Crossref]
  • Clarke R. (2008a). B2C Distrust Factors in the Prosumer Er.’ Proc. CollECTeR Iberoamerica, Madrid, 25-28 June 2008, pp. 1-12, Invited Keynote Paper, at http://www.rogerclarke.com/EC/Collecter08.html
  • Clarke R. (2008b). Web 2.0 as Syndication. Journal of Theoretical and Applied Electronic Commerce Research, 3(2), 30-43, http://dx.doi.org/10.4067/S0718-18762008000100004[Crossref]
  • Clarke R. (2010a). An Evaluation of the Terms of Service and Privacy Policy of the LinkedIn Professional Networking Service. Xamax Consultancy Pty Ltd, at http://www.rogerclarke.com/EC/LinkedIn-1012.html
  • Clarke R. (2010b). Internet Users’ Second-Party Exposure.
  • Xamax Consultancy Pty Ltd, http://www.rogerclarke.com/EC/IU-SPE-1012.html
  • Clarke R. (2011). The Cloudy Future of Consumer Computing. Proc. 24th Bled eConference, June 12-15, 2011, at http://www.rogerclarke.com/EC/CCC.html
  • Clarke R. (2013). Consumer-Oriented Social Media: The Identification of Key Characteristics. Working Paper, Xamax Consultancy Pty Ltd, at http://www.rogerclarke.com/II/COSM-1301.html
  • Clarke R. (2014). Privacy and Social Media: An Analytical Framework, Forthcoming. Journal of Law, Information and Science, 24 (March 2014), PrePrint at http://www.rogerclarke.com/DV/SMTD13.html
  • Clarke R., & Wigan M.R. (2011). You Are Where You’ve Been The Privacy Implications of Location and Tracking Technologies. Journal of Location Based Services, 5(3-4), 138-155, at http://www.rogerclarke.com/DV/YAWYB-CWP.html
  • Cohen J. (2013). A critical overview of the privacy debates regarding Facebook and an assessment of the ‘Anti- Facebook’ social network, Diaspora*, MA Thesis, University of the Witwatersrand, Johannesburg, February 2013, at http://mobile.wiredspace.wits.ac.za/bitstream/andle/10539/13131/Jenifer%20CohenThesis%20F.pdf?sequence=2
  • Cox J. (2007). Tim Berners-Lee Warns of ‘Walled Gardens’ for Mobile Internet. The New York Times, 15 November 2007, at http://www.nytimes.com/idg/IDG_002570DE00740E1800257394004818F5.html?ex=1352869200&en=d4abf597b593be42&ei=5088&partner=rssnyt&emc=rss
  • Enders A., Hungenberg H., Denker H.P., & Mauch S. (2008).The long tail of social networking: Revenue models of social networking sites. European Management Journal, 26, 199- 211, http://dx.doi.org/10.1016/j.emj.2008.02.002[Crossref]
  • Esguerra R. (2011). An Introduction to the Federated Social Network. Electronic Frontier Foundation, 21 March 2011, at https://www.eff.org/deeplinks/2011/03/introduction-distributed-social-network
  • Franchi E., & Tomaiuolo M. (2012). Software Agents for Distributed Social Networking. In De Paoli F. & Vizzari G. (eds.), Proc. 13th Workshop on Objects and Agents (WOA 2012), Milano, Italy, September 17-19, 2012, at http://ceur-ws.org/Vol-892/paper4.pdf
  • Gallagher R. (2013. Software that tracks people on social media created by defence firm. The Guardian, 10 February 2013, at http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence
  • GFW (2011). Who is harmed by a “Real Names” policy?. Geek Feminism Wiki, at http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F, accessed 3 August 2011.
  • Handel M. (2011). Privacy in Social Networks. In Asaj N. et al. (eds), Proc. Third Seminar on Research Trends in Media Informatics, Institute of Media Informatics, Ulm University, 7-8 February 2011, pp. 77-82, at http://d-nb.info/1016626320/34#page=77
  • Harris W. (2006). Why Web 2.0 will end your privacy. bit-tech.net, 3 June 2006, at http://www.bit-tech.net/columns/2006/06/03/web_2_privacy/
  • Helft M. (2010). Critics Say Google Invades Privacy With New Service. The New York Times, 12 February 2010, at http://www.nytimes.com/2010/02/13/technology/internet/13google.html?_r=1
  • Howe J. (2006). The Rise of Crowdsourcing. Wired 14.06 (June 2006), http://www.wired.com/wired/archive/14.06/crowds.html
  • Kaplan A.M., & Haenlein M. (2010). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), (Jan-Feb 2010) 59-68, slide-set at http://www.slideshare.net/studente1000/kaplan-andreas-m-haenlein-michael-2010-users-ofthe-orld-unite-the-challenges-and-opportunities-of-social-media-business-horizons-vol-53-issue-1-p-5968
  • Krotoski A. (2012). Online identity: is authenticity or anonymity more important?. The Guardian, April 2012, at http://www.guardian.co.uk/technology/2012/apr/19/online-identity-authenticity-anonymity/print
  • Lankton N., & McKnight D. H. (2011). What Does it Mean to Trust Facebook? Examining Technology and Interpersonal Trust Beliefs. ACM SIGMIS Database, 42(2), 32-54, http://dx.doi.org/10.1145/1989098.1989101[Crossref]
  • McKeon M. (2010). The Evolution of Privacy on Facebook. Self-Published, at http://mattmckeon.com/facebookprivacy/
  • Mann S. (2002). Cyborglogs (“glogs”). Wearcam.org, at http://wearcam.org/glogs.htm
  • Matlin C. (2010). With Google Buzz, your closest circle of friends is wide open. The Washington Post, 28 February 2010, at http://www.washingtonpost.com/wp-dyn/content/article/2010/02/26/AR2010022606639.html
  • Michael K., & Clarke R. (2013). Location and Tracking of Mobile Devices: Überveillance Stalks the Streets’ Forthcoming, Computer Law & Security Review, 29(2), PrePrint at http://www.rogerclarke.com/DV/LTMD.html
  • Moglen E. (2010). Freedom In the Cloud: Software Freedom, Privacy, and Security for Web 2.0 and Cloud Computing. Software Freedom Law Center, 5 February 2010, at http://www.softwarefreedom.org/events/2010/isoc-ny/FreedomInTheCloud-transcript.html
  • Musiani F. (2010). When social links are network links: The dawn of peer-to-peer social networks and its implications for privacy. Observatorio (OBS*) Journal, 4(39, 185-207, at http://halshs.archives-ouvertes.fr/docs/00/57/93/42/PDF/Musiani_2010_P2PPrivacy.pdf
  • Narayanan A., Barocas S., Toubiana V, Nissenbaum H., & Boneh D. (2012). A Critical Look at Decentralized Personal Data Architectures. arXiv: 1202.4503, 22 February 2012, at http://arxiv.org/abs/1202.4503
  • NYT (2010). Facebook Privacy: A Bewildering Tangle of Options. The New York Times, 12 May 2010, at http:// www.nytimes.com/interactive/2010/05/12/business/facebook-privacy.html
  • O’Connor R. (2012). Facebook is Not Your Friend. Huffington Post, 15 April 2012, at http://www.huffingtonpost.com/rory-oconnor/facebook-privacy_b_1426807.html
  • Opsahl K. (2010). Facebook’s Eroding Privacy Policy: A Timeline. Electronic Frontier Foundation, 28 April 2010, at https://www.eff.org/deeplinks/2010/04/facebooktimeline/
  • O’Reilly T. (2005). What Is Web 2.0? Design Patterns and Business Models for the Next Generation of Software.
  • O’Reilly, 30 September 2005, at http://www.oreillynet.com/lpt/a/6228
  • Osterwalder A., & Pigneur Y. (2002). An e-Business Model Ontology for Modeling e-Business. Proc. 15th Bled Electronic Commerce Conf., Bled, Slovenia, June 17 -19, 2002, at https://domino.fov.uni-mb.si/proceedings
  • Rappa M. (2003). Business Models on the Web. At http://digitalenterprise.org/models/models.html
  • Rheingold H. (1993). The virtual community: homesteading on the electronic frontier. New York: HarperPerrenial.
  • Shane D, (2010). Facebook is “deliberately killing privacy”, says Schneier. Information Age, 13 October 2010, at http://www.information-age.com/technology/security/1290603/facebook-is-%22deliberately-killingprivacy%22-says-schneier
  • Smarr J. et al. (2007). A Bill of Rights for Users of the Social Web. OpenSocialWeb, September 2007, at http:// www.opensocialweb.org/ , copy at http://www.template.org/?page_id=599/2007/09/05/bill-of-rights/
  • Smith G. (2004). Folksonomy: social classification.
  • Mendeley, 3 August 2004, at http://www.mendeley.com/research/folksonomy-social-classification/
  • Svantesson D., & Clarke R. (2010). Privacy and Consumer Risks in Cloud Computing. Computer Law & Security Review, 26( ), 391-397, http://dx.doi.org/10.1016/j.clsr.2010.05.005 [Crossref]
  • van Dijck J. & Nieborg D. (2009). Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos. New Media & Society, 11(4), 855-874, at http://www.gamespace.nl/content/Wikinomics_and_its_discontents_2009.pdf
  • Waugh R. (2012). Unfair and unwise: Google brings in new privacy policy for two billion users - despite EU concerns it may be illegal. Daily Mail, 2 March 2012, at http:// www.dailymail.co.uk/sciencetech/article-2108564/Google-privacy-policy-changes-Global-outcry-policyignored.html
  • Wilde W.D., & Swatman P.A. (1999). A Preliminary Theory of Telecommunications Enhanced Communities. Proc. 12th Int’l Bled Electronic Commerce Conf., Bled, Slovenia, June 7 - 9, 1999.
  • Wilson C., Steinbauer T., Wang G., Sala A., Zheng H. & Zhao B.Y. (2011). Privacy, Availability and Economics in the Polaris Mobile Social Network. Proc. ACM Workshop on Mobile Computing Systems and Applications (HotMobile 2011), at http://www.cs.ucsb.edu/~ravenben/publications/pdf/polaris-hotmobile11.pdf
  • Womack B. (2013). Facebook Seen Reporting Faster Sales Growth on Ad Demand. Bloomberg News, 31 January 2013, at http://www.bloomberg.com/news/2013-01-30/facebook-seen-reporting-faster-sales-growth-on-mobilead-demand.html
  • Yeung C.M.A., Liccardi I., Lu K., Seneviratne O., & Berners- Lee T. (2009). Decentralization: The Future of Online Social Networking, in: W3C Workshop on the Future of Social Networking, at http://www.w3.org/2008/09/msnws/papers/decentralization.pdf

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.doi-10_2478_orga-2014-0024
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.