http://si410wiki.sites.uofmhosting.net/api.php?action=feedcontributions&user=Hillcm&feedformat=atomSI410 - User contributions [en]2024-03-29T10:44:11ZUser contributionsMediaWiki 1.25.2http://si410wiki.sites.uofmhosting.net/index.php?title=Online_shopping&diff=72746Online shopping2018-04-24T10:28:52Z<p>Hillcm: </p>
<hr />
<div>[[File:Shopping-sites-logo.jpg|thumb|400px|text-top|alt="Assorted online shopping sites"|]]<br />
'''Online shopping'' is a form of e-commerce (the buying of goods or services through sellers over the internet). There are various types of online shops that simulate "real life" shopping experiences including online auctioning ([[Ebay]]), site-hosted personal storefronts ([[Wiki:Etsy|Etsy]]), and physical stores that host their own online storefront. Through secure socket layer encryption, customers are able to communicate credit card information and other sensitive data safely and securely to purchase products. These products are then delivered to the indicated location using shipping services such as [[Wikipedia: United Parcel Service|United Parcel Service]] (UPS) or [[Wikipedia: FedEx|FedEx]].<br />
<br />
==History==<br />
Online shopping has been a bankable idea since the inception of end-user information systems. Videotex, a two-way messaging service displayed through television monitors, was the first medium for the idea of implementing "teleshopping". Companies in the UK ([[Wikipedia:Prestel|Prestel]] and [[Wikipedia: Viewdata|Viewdata]]) and companies in the USA ([[Wikipedia:The Source (online service)| The Source]] and [[Wikipedia: CompuServe | Compuserve]]) did much research in the field of videotex. The concept of "teleshopping" (shopping at a distance, not to be confused with infomercials, a form of television shopping) was introduced by English innovator [[Wikipedia: Michael Aldrich| Michael Aldrich]] in 1979. It was not referred to as "online shopping" because there was no Internet at the time. The original system developed by Aldrich's team was not based in computers but in telecoms and consumer electronics industries and was initially only used for business-to-business transactions (B2B). In the 1990s with the mass installation of home computers, business-to-consumer (B2C) commerce began.<ref>The Michael Aldrich Archive Website: "Inventor's Story" http://www.aldricharchive.com/inventors_story.html</ref><br />
<br />
[[Wikipedia: Tim Berners-Lee|Tim Berners-Lee]] invented the World Wide Web in 1990. This provided the avenue for business-to-consumer transactions, allowing the average consumer to browse content posted on the World Wide Web in their own homes. In 1994 the internet browser [[Wikipedia:Netscape (web browser)|Netscape]] introduced Secure Socket Layer encryptions, which allowed for the secure transmission of messages over the internet. This meant transactions were able to take place through the World Wide Web without risk of stolen information.<ref>Search Security Website: "Secure Sockets Layer (SSL)" http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL</ref> The same year Pizza Hut began to offer the online ordering services, with many companies after following suit.<ref>Instant Shift Website: "The History of Online Shopping in a Nutshell" http://www.instantshift.com/2010/03/26/the-history-of-online-shopping-in-nutshell/</ref><br />
<br />
==E-commerce==<br />
===Amazon===<br />
In 1995 [[Amazon.com]] began to package and sell books online. Amazon provided a larger and more complete selection through their online store that put pressure on local retailers who were unable to stock a selection as diverse as what was available to Amazon. While it initially only sold books, the company's endgame was to sell every product "from A-to-Z." In 4 and a half years, Amazon.com became the most recognized online retailer by online shoppers. <ref>Amazon starts free, 2-hour Whole Foods deliveries in a fresh test of grocery model: http://phx.corporate-ir.net/phoenix.zhtml?c=97664&p=irol-newsArticle&ID=70550&highlight=</ref> In 1999, Jeff Bezos, founder of Amazon.com, was named person of the year by Time Magazine for popularizing online shopping. Now, Amazon has taken over Whole Foods and is shutting down other bookstores and replacing them with their Amazon Books. They sell everything and adding very minimal shipping costs and times, there is no reason to not use this online shopping website. With various retail websites that allow customers in Europe, SouthEast Asia, and South America to also purchase goods, Amazon is able to slowly capture the entire world's e-commerce market. After acquiring Whole Foods in 2017, Amazon rolled out an initiative called AmazonFresh which allows customers to purchase fresh produce and other goods and have them delivered straight to their door. As part of this, Amazon is disrupting the grocery industry by making 2-hour grocery delivery a viable option for those living in Dallas, Cincinnati, and Virginia Beach <ref>Amazon: Press Release https://www.google.com/amp/s/amp.usatoday.com/amp/318337002</ref>. Initiatives like this are changing the way consumers buy groceries similar to how people altered the way they purchased books and popular electronics. With Amazon Prime, customers can pay a small fee of $99 dollars a year to receive benefits such as free 2-day shipping on select prime products, unlimited photo storage, and access to select movies, kindle books, and music. This deal also changed the shipping industry, as other distributors must compete with the 2-day shipping as this is a large convenience factor Amazon customers. Today, Amazon continues to acquire big players in the consumer goods market to provide goods and services to consumers at the most competitive price and delivery speed.<br />
<br />
===Online Auctioning===<br />
The same year Amazon began to sell books online, 1995, Pierre Omidyar and Jeff Skoll started an online auctioning company known as eBay. The company made a goal to connect people, and not to sell items in the same fashion as other online shops. Customers are able to browse through items by category and place bids on timed auctions. eBay started off only selling collectibles from customers, until they formed partnerships with companies such as Disney, GM, and Sun. eBay allowed these corporations to auction off items on their website. The wide variety, and repetition, of products, now allows buyers to find the lowest possible price they can. <br />
<br />
==Process of Online Shopping==<br />
===Payment===<br />
Customers generally pay for goods and services online through credit/debit cards. Other methods include PayPal (an online money transferring site), in person transactions (however this defeats the purpose of online shopping), or other money transferring websites (Skrill, Paymate). In addition to the cost of the products purchased, customers generally must pay for the shipping of the product as well, unless the shopper buys over a certain amount through a company that provides free shipping (however some companies, such as Zappos.com, exclusively offer free shipping). <ref>ebay: "Choosing a payment method (for buyers)" http://pages.ebay.com/help/pay/methods.html</ref> Customers can also user gift-cards online to complete their purchases. This option can be a more protected option as no personal credit card or debit card information is inputted on the website. Most transactions online are conducted through a credit card or debit card and websites have strong privacy settings to ensure that customer's personal data is protected. <br />
<br />
===Delivery===<br />
For physical items, customers need to provide their name and address for delivery. Shipping options are arranged by the speed of delivery. Next day and two-day shipping options are available, however, the cheapest and most common option is 3 to 5 business day shipping. The cost to ship an item also increases with weight and size. Items are generally shipped through United Parcel Service (UPS), however, items that can be packaged in envelopes can be sent through United States Postal Service. <ref>Amazon: "Shipping Rates for the Contiguous U.S." http://www.amazon.com/gp/help/customer/display.html/ref=hp_468520_continental?nodeId=468636</ref><br />
<br />
===Return===<br />
The return policies on items can vary from company to company. In most cases companies accept returns, but the customer will pay for the return shipping cost. Returns seem to be more of a hassle for online shopping compared to returning an item to a store because it requires work from the customer to pack the item, take it and pay for the shipping and then it is safe to get a tracking number, otherwise you will not know if your item arrives back to the vendor and then they are left without proof of having shipped it. Most companies provide free returns to customers if they claim the product was wrongly sent or damaged. In this case, the customer simply prints the pre-paid return label that the company sends them and sends back the items(s). In other cases where the customer must pay for their own return shipping, the company will deduct the shipping cost from the amount they are required to refund the customer. This part of the process also seems to be more cumbersome for the vendors also, because they can get all kinds of items shipped back to them and if an item was worn or damaged how are they to reject the return if it is just shipped to their door. In this case, the customer gets more benefit of the doubt. <br />
<br />
==Ethical concerns==<br />
Online shopping has taken the process of browsing and human interaction out of the business-consumer equation. Customers are generally not able to pay for shipped products with physical cash and must give their credit card information to websites from which they are purchasing. Customers usually place online orders from reputable sources, such as Amazon or Zappos.com. In addition to credit card information, full name, address, and phone number are also divulged to these companies. Though it is generally secure to trust the seller with sensitive information, certain hackers are also interested in this information and will target companies for it. This may not be as big of an issue with the advent of SSL before Netscape had implemented this security system online shopping was not a common practice.<ref>Blue Reef Virtual Servers: "Secure Sockets Layer (SSL)"http://www.bluereef.net/support/extensions/ecommerce/ssl/</ref><br />
<br />
===Wrong Product Delivery===<br />
There are several situations that could result in the customer receiving the wrong product. This often occurs when the orders are filled by hand and a human mistake is made in the online retailer's warehouse. A warehouse worker may ship the wrong item completely or may ship the correct item in the wrong size or color. Consumers will not know a mistake was made until the product arrives. In such cases, the online retailer will take responsibility for returning the incorrect item and will ship the correct item as soon as possible. However, this may not completely correct the problem. For example, a consumer who purchased an item for a specific event or as a gift, may not receive the replacement item on time.<ref>Yahoo! Voices: "Common Problems with Online Shopping" http://voices.yahoo.com/common-problems-online-shopping-8625383.html?cat=46</ref><br />
<br />
===PS3 credit card hacking scandal===<br />
In 2011, [[Wikipedia: Sony|Sony Corporation]] had to temporarily shut down it's PlayStation Network online services because an unauthorized person hacked their systems and had access to vital customer information. Credit card information, purchase history, and other profile information were all at possible risk. Sony shut down their online network for a month and hired an outside security firm in order to investigate the security breach. <ref>Wired Website: "PlayStation Network Hack Leaves Credit Card Info at Risk" http://www.wired.com/gamelife/2011/04/playstation-network-hacked/</ref>. Sony was initially hit with criticism after it was alleged that customer credit card data and other sensitive information was stored unencrypted on the network. Sony later said that such sensitive data was encrypted and not in plaintext. <ref name="Sony: Passwords not stored in plain text">One Hit Pixel Website: "'Password Not Stored in Plain Text' -Sony" http://onehitpixel.com/2011/05/03/password-not-stored-in-plain-text-sony/11876.</ref> Credit card hacking is a common problem, but the issue becomes more prominent online where hackers can hack a site and obtain private information with a click of a button. This is a concern for many online shoppers, as they are unsure if their credit card numbers and home addresses are protected from those searching to take advantage of such information. Although companies take extreme measures to protect their customer's information, security breaches still occur and are detrimental to a companies' reputations, as it was for Sony for a short period of time. <br />
<br />
===Quality Assurance===<br />
Many people feel insecure about online shopping because every online transaction they make runs the risk of getting scammed. Anonymous sellers can easily post a fake picture of a new item and after they've received payment, send a used or broken item. Additionally, shipping quality and return policies are also difficult for the buyer to ensure when dealing with online transactions. On the other hand, sellers also run the risk of receiving bad payments especially on auction sites like [[Ebay]]. On smaller shopping sites, it's difficult to tell how safe the transaction will be and what the quality is like. Sellers can also take a customer's money and refuse to ship the product that they bought. In these cases, customers began to distrust the website and seller and stop buying their products. Fortunately, larger sites like [[Ebay]] and [[Amazon.com]] use seller rating systems and customer reviews to help ensure both good and bad quality sellers are recognized. They also have buyer reviews which indicate how reliable the buyer is and how often they actually go through with a final transaction.<br />
<br />
===Negative Impact on Independent & Local Businesses===<br />
As a result of Online shopping, small businesses and local stores suffer as more and more people continue to shop online from major retailers like Amazon and Overstock.com. In the past years, physical foot traffic at malls has been on a rapid decline, causing many stores to close multiple locations. <ref>Blurt It: "What Impact Does Online Shopping Have in Traditional Stores and Shopping Malls?" http://www.blurtit.com/q3678846.html</ref>. Department stores like Macy's have had to shut down dozens of locations due to the decreasing mall traffic. Popular children's toy retailer, Toys R Us recently filed for bankruptcy and shut down online stores. Online stores are thriving because of its convenience. Stores like Walmart have offered services such as same-day pickup and price match to Amazon as a result of the prominence of online shopping. As a result of closings, many people lose their jobs as they were reliant on the store job. Thousands of jobs close as a result of store closings.<br />
<br />
===Dropshipping === <br />
Dropshipping is the use of the e-commerce website generator Shopify to create an online store that sells a curated selection of cheaply made products at marked up prices. These shops are advertised on social media accounts, often offering free or discounted products. <ref> Madrigal, Alexis C. "The Strange Brands On Your Instagram Feed." ''The Atlantic.'' 10 January 2018. https://www.theatlantic.com/technology/archive/2018/01/the-strange-brands-in-your-instagram-feed/550136/ </ref><br />
<br />
===Negative Impact on the Environment===<br />
The rise of online shopping has increased the number of products shipped around the worldwide. This has raised concerns about this phenomena’s environmental impact. According to the United States Environmental Protection Agency (EPA), transportation is the leading cause of greenhouse gas emissions.<ref name = "EPA">United States Environmental Protection Agency. “Fast Facts on Transportation Greenhouse Gas Emissions.” United States Environmental Protection Agency, United States Environmental Protection Agency, 26 Sept. 2017, www.epa.gov/greenvehicles/fast-facts-transportation-greenhouse-gas-emissions.</ref> 23% of greenhouse gas emissions are caused by medium and heavy-duty trucks - which are largely used for shipping.<ref name = "EPA">United States Environmental Protection Agency. “Fast Facts on Transportation Greenhouse Gas Emissions.” United States Environmental Protection Agency, United States Environmental Protection Agency, 26 Sept. 2017, www.epa.gov/greenvehicles/fast-facts-transportation-greenhouse-gas-emissions.</ref> Before online shopping was popular, goods would be shipped to brick-and-mortar stores, which were clustered close together allowed these shipping trucks to easily deliver goods while traveling less distance between stores.<ref name = "vox">Jaller, Miguel. “Online Shopping Is Terrible for the Environment. It Doesn't Have to Be.” Vox, Vox, 21 Dec. 2017, www.vox.com/the-big-idea/2017/12/21/16805324/online-shopping-instant-delivery-greenhouse-gas-amazon-environmental-problem.</ref> However, with the popularization of online shopping, shoppers have goods shipped directly to their residential address causing an inefficiency in shipping and an increase in greenhouse gasses.<ref name = "vox">Jaller, Miguel. “Online Shopping Is Terrible for the Environment. It Doesn't Have to Be.” Vox, Vox, 21 Dec. 2017, www.vox.com/the-big-idea/2017/12/21/16805324/online-shopping-instant-delivery-greenhouse-gas-amazon-environmental-problem.</ref> Furthermore, shipping goods to residential areas increases congestion, higher noise levels, and frequent wear on infrastructure.<ref name = "vox">Jaller, Miguel. “Online Shopping Is Terrible for the Environment. It Doesn't Have to Be.” Vox, Vox, 21 Dec. 2017, www.vox.com/the-big-idea/2017/12/21/16805324/online-shopping-instant-delivery-greenhouse-gas-amazon-environmental-problem.</ref><br />
<br />
==See Also==<br />
* [[Etsy]]<br />
* [[Ebay]]<br />
*[[Amazon.com]]<br />
*[[iTunes Store]]<br />
<br />
== References ==<br />
<references/><br />
[[Category:Services]]<br />
[[Category:Websites]]<br />
<br />
([[Topics|Back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Myspace&diff=72745Myspace2018-04-24T10:22:55Z<p>Hillcm: </p>
<hr />
<div>{{SoftwareInfoBox<br />
|HEIGHT=380<br />
|NAME=myspace.com<br />
|LOGO=Myspace_Black_Logotype.png<br />
|SCREENIMAGE=Myspacehome.png<br />
|CAPTION="Myspace's homepage as of February 2016"<br />
|IMAGEURL=https://myspace.com/<br />
|TEXT=Site<br />
|PLATFORM=Web and mobile<br />
|PRODUCT=Myspace Music<br />
|TYPE=Social Networking Site<br />
|SITEURL=https://myspace.com/<br />
|URLTEXT=www.myspace.com<br />
|STATUS=Active<br />
|LAUNCH= August 2003<br />
}}<br />
<br />
<br />
'''Myspace''' (formerly ''MySpace'') is a [[Social Networking | social-networking]] site that allows musicians, designers, artists, writers, photographers, and filmmakers to connect with one another and their fans to collaborate and share their work.<ref name="About">About Myspace https://myspace.com/pressroom/aboutmyspace</ref> Headquartered in Los Angeles, California, the site was founded in 2003 and became the most-visited website in the United States in 2006.<ref name="About">About Myspace https://myspace.com/pressroom/aboutmyspace</ref><ref>MySpace, America's Number One http://mashable.com/2006/07/11/myspace-americas-number-one/#m0jEZhHSSgq8</ref> It was the most popular social networking site in the world until [[Facebook]] overtook it in popularity in 2008. <ref name="PC">More Americans Go To Facebook Than MySpace http://www.pcmag.com/article2/0,2817,2348822,00.asp)</ref> Now, it is ranked as the 1,753rd most popular website globally and as the 1,549th most popular website in the United States. Most of its current users come from the United States, India, China, Russia, and the UK. <ref>Myspace Site Overview http://www.alexa.com/siteinfo/myspace.com</ref> Since its inception, the site has had many ethical issues, including cyberbullying, child and teen safety, privacy, and the "top friends" feature.<br />
<br />
==History of Myspace==<br />
===Early History===<br />
Myspace was first founded by Tom Anderson and Chris DeWolfe in August of 2003. It officially launched in January 2004 and quickly had 1 million users by February. <ref name="Huff">Myspace History: A Timeline Of The Social Network's Biggest Moments http://www.huffingtonpost.com/2011/06/29/myspace-history-timeline_n_887059.html</ref> In July 2005, News Corp purchased eUniverse, Myspace's parent company, for $580 million. Myspace was valued at $327 million in this deal. <ref name="Crunch">MySpace https://www.crunchbase.com/organization/myspace#/entity</ref> In 2008, the site's "chaotic and disorganized interface" went through a redesign, but [[Facebook]] still managed to take over as the top social media dog<ref name="Crunch">MySpace https://www.crunchbase.com/organization/myspace#/entity</ref><ref name="PC">More Americans Go To Facebook Than MySpace http://www.pcmag.com/article2/0,2817,2348822,00.asp)</ref>. In 2011, the site was acquired by Specific Media for $35 million, which was a 99.3% decrease from its valuation of $327 million.<ref name="Crunch">MySpace https://www.crunchbase.com/organization/myspace#/entity</ref> This deal involved Tom Vanderhook, Chris Vanderhook, and Justin Timberlake.<ref name="About">About Myspace https://myspace.com/pressroom/aboutmyspace</ref> Later that year, Specific Media laid off about 500 employees from the company<ref name="Huff">Myspace History: A Timeline Of The Social Network's Biggest Moments http://www.huffingtonpost.com/2011/06/29/myspace-history-timeline_n_887059.html</ref>. The company now has approximately 150 employees.<ref name="About">About Myspace https://myspace.com/pressroom/aboutmyspace</ref><br />
<br />
===Recent History===<br />
On September 24, 2012, Justin Timberlake tweeted a link to a Vimeo video that featured a redesigned Myspace, called the "new Myspace."<ref>THIS IS MYSPACE https://twitter.com/jtimberlake/status/250309133369237505</ref> The video shows a website that utilizes a horizontal navigational layout instead of its old vertical layout and is highly focused on media, including videos, photos, and music.<ref>The new Myspace https://vimeo.com/50071857</ref><br />
<br />
In January 2013, Myspace launched the redesigned site as part of an open beta phase. Christian Parkes, the VP of Global Marketing, revealed that the site was redesigned with brands in mind due to its radio stations, music mixes, editorial content, and videos.<ref>Myspace's Pitch to Brands http://digiday.com/brands/myspaces-pitch-to-brands/</ref> The site is particularly appealing to artists who can utilize analytical listener data. This version of Myspace left its beta phase and launched on June 12, 2013. The launch of the redesigned site included a launch of an iOS app and a new mobile version of the site.<ref>The new, new Myspace leaves beta — launches a revised design, new features, & a mobile app http://venturebeat.com/2013/06/12/the-new-new-myspace-leaves-beta-launches-a-revised-design-new-features-a-mobile-app/</ref> Despite being timed to coincide with the release of Timberlake's single "Suit and Tie," the website's relaunch went mostly unnoticed. This was partially due to Facebook launching its graph search in California at the same time.<ref>Myspace publicly unveils its revamped site – to little excitement http://www.theguardian.com/technology/us-news-blog/2013/jan/15/myspace-justin-timberlake-facebook-announcement</ref><br />
<br />
With the launch of the "New Myspace" and the discontinuation of "Classic MySpace," the company deleted much of the user content that had been on the site prior to the redesign. With the removal of blogs, private messages, videos, comments, posts, and games, many users complained that they had lost priceless memories and personal communications between loved ones and friends. This was especially upsetting for users who lost art, journals, diaries, poetry, and conversations with people who had passed away. The company did not offer any warning to users that their content would be deleted, and they did not offer any solutions for people to retrieve their content.<ref>MySpace Deletes Your Stuff http://www.marketingpilgrim.com/2013/06/myspace-deletes-your-stuff.html</ref><br />
<br />
On February 11, 2016, Time Inc. acquired the assets of Viant, Specific Media's parent company. With the acquisition of Viant's assets (and consequently Myspace), Time hopes to use the site's data on its users to better target ads to specific audiences, link devices to specific people, and assist marketers in placing ads. Time will now have access to 1 million global Myspace accounts and email addresses.<ref>Time Inc. Acquires Viant, And It's All About The Data http://adexchanger.com/publishers/time-inc-acquires-viant-and-its-all-about-the-data/</ref> Viant CEO Tim Vanderhook has stated that he believes this merger with Time will allow them to compete with the likes of Google and Facebook by combining high-quality content with first-party data.<ref>The CEO of Myspace tells us why he just sold the company to Time Inc. http://www.businessinsider.com/myspace-owner-viant-ceo-tim-vanderhook-on-sale-to-time-inc-2016-2</ref><br />
<br />
==Tom Anderson==<br />
[[File:Tom Anderson.jpg|right|400px|thumb|Tom Anderson]]<br />
Co-founder Tom Anderson quickly became the face of the company because he was automatically added as a default friend of all new Myspace users.<ref>Tom Anderson https://www.crunchbase.com/person/tom-anderson#/entity</ref> After the site's launch, Anderson became the first president of Myspace.<ref name="Crunch">MySpace https://www.crunchbase.com/organization/myspace#/entity</ref> After the News Corp acquisition, he was replaced as president in April, 2009.<ref>Founders Step Aside at MySpace http://www.wsj.com/articles/SB124043324710044929</ref> By 2010, he was no longer the Myspace default friend. He was replaced by a new profile called "Today On Myspace," or T.O.M. Mike Jones, co-president at the time, said that this was done to leave new users with a better sense of what they can get on Myspace.<ref>MySpace outlines makeover after exec shakeup http://www.businessweek.com/ap/financialnews/D9EBU27G0.htm</ref><br />
<br />
Now, Anderson has a very active following on Facebook, [[Twitter]], and [[Instagram]]. On each of these sites, he boasts the username "myspacetom." After attending the Burning Man festival in 2011, he has now devoted his life and travels to photography<ref>Myspace Co-Founder Tom Anderson's New Life as a Landscape Photographer http://abcnews.go.com/Photos/myspace-founder-tom-andersons-life-landscape-photographer/story?id=25364138</ref> He posts to Instagram daily, and will sometimes post photos to Facebook as well. Although once rivals with Facebook, he now uses the site freely. On September 18, 2011, he made the following post about the site<ref>Tom Anderson on Facebook https://www.facebook.com/myspacetom/posts/273023736055760</ref>: <br />
<blockquote>People seem very confused why I'm on Facebook. I've had a profile since 2005 and a "fan page" since 2009. FB just created a feature where you can "subscribe" to profiles. They asked me if I wanted to convert my "page" into a simpler profile. Complicated? I suppose. Why am I not on MySpace? Because, I left the company in early 2009, and like most of you, I don't like using it anymore.. not a fan of what the new folks have done with MySpace.</blockquote><br />
<br />
==Ethical Implications==<br />
===Cyberbullying=== <br />
Myspace has come under attack for instances of [[Cyberbullying | cyberbullying]]. Most notably, thirteen-year-old Megan Meier committed suicide after being cyberbullied on Myspace. In 2006, Megan began receiving Myspace messages from "Josh Evans," a sixteen-year-old boy who allegedly lived in the area but was homeschooled. Their friendship blossomed for six weeks, but on October 15, 2006, Megan received a message from Josh that stated: "I don't know if I want to be friends with you anymore because I've heard that you are not very nice to your friends." The next day, he messaged her and said something to the effect of, "Everybody in O'Fallon knows how you are. You are a bad person and everybody hates you. Have a shitty rest of your life. The world would be a better place without you." Megan then hung herself in her closet, committing suicide. She died the next day.<ref>Megan's Story http://www.meganmeierfoundation.org/megans-story.html</ref> It was later revealed that Josh Evans did not exist. The profile was created by Lori Drew, the mother of a former friend of Megan's, and then eighteen-year-old Ashley Grills. The Drews and Grills created the account to get close to Megan to see what she had been saying about Drew's daughter. Grills admitted to sending the final message as "Josh" to Megan to end their relationship so that the "cruel joke" could end.<ref>Exclusive: Teen Talks About Her Role in Web Hoax That Led to Suicide http://abcnews.go.com/GMA/story?id=4560582&page=1</ref><br />
<br />
===Top Friends===<br />
The concept of Top Friends was a concept that Myspace used ever since it was created. This allowed users to place their 'favorite' friends, whose pictures and profile links would be featured on the page of the user. This would often result in controversies among users on Myspace and who would be on their top friends. Sure, these may seem like a minimal problem (a simple feature that causes distress among children), but it does question the ethics behind this feature. A feature like this is a rating system, and publicly displays the opinions of one against others on their page. This could be considered unethical because implications are there to make someone feel less important than another based on their position on a top friends list.<br />
===Privacy=== <br />
After Facebook overtook Myspace as the most popular social media website, Myspace tried to poise itself as the safer and more private alternative to Facebook. In 2010, a user ID was exposed after another Myspace clicked on an ad while browsing a profile, revealing the identity of the page where the ad was clicked. It did not reveal any data that was not made "public" through the site's security features but it proved that the Myspace was not as safe and private as users had hoped.<ref>It's Not Just Facebook: MySpace Transmitted Personal Data http://mashable.com/2010/10/23/myspace-privacy/#deaVrGU9_qqr</ref><br />
<br />
===Child and Teen Safety===<br />
Myspace has been frequently criticized for being a platform that compromises the safety of children and teens. There have been many notable cases of this.<br />
====Katherine Lester====<br />
In June 2006, sixteen-year-old Katherine Lester fled her home in Michigan to fly to Jericho, a city in the West Bank of Palestine. Lester planned to meet her Myspace boyfriend, twenty-year-old Abdullah Jinzawi. Lester managed to make it out of the country all the way to Amman, Jordan. There, she was intercepted by U.S. authorities, who persuaded her to fly back to Michigan. Lester then dumped Jinzawi in 2007 while appearing on "Dr. Phil." <ref>Teen Dumps Foreign Beau On "Dr. Phil" http://www.cbsnews.com/news/teen-dumps-foreign-beau-on-dr-phil/</ref><br />
===="Kiki Kannibal"====<br />
"Kiki Kannibal" was the pseudonym for fourteen-year-old Kristen "Kiki" Ostrenga. "Kiki Kannibal," Ostrenga's online persona, was a "scene kid" who became famous on Myspace, and later Stickam.com. Ostrenga's fame led to her romantic involvement with Danny "Mr. MySpace" Cespedes. Cespedes later raped Ostrenga and many other underage girls who he had met on Myspace. Cespedes later died after falling into a coma while attempting to flee from police officers attempting to arrest him for seven felony counts of statutory rape. After receiving threats and many counts of online harassment, the Ostrenga family eventually moved and lost their home. She still has an active online presence today.<ref>Kiki Kannibal: The Girl Who Played With Fire http://www.rollingstone.com/culture/news/kiki-kannibal-the-girl-who-played-with-fire-20110415#ixzz40YlBZgHy</ref><br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
==External Links==<br />
{{resource|<br />
*[https://myspace.com/ Myspace's Official Website]<br />
}}<br />
[[Category:Social Networking]]<br />
[[Category:Websites]]<br />
[[Category: Media Content]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Geographic_Information_Systems&diff=72744Geographic Information Systems2018-04-24T10:18:20Z<p>Hillcm: </p>
<hr />
<div>{{Box|<br />
{{width|224}}<br />
{{height|24}}<br />
{{multiBox\layout\lightShadow}}<br />
{{padding|5|0|0|10}}<br />
{{box\radius|15}}<br />
|←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[Topics#Topics|Topics]]'' • ↑''[[Topics#Categories|Categories]]''<br />
}}<br />
<br />
[[File:gis_layers.gif|right|thumb|250px| GIS layers of different types of geographical land]]<br />
'''Geographic Information Systems''' (GIS) is a data analysis method that integrates hardware, software, and data for the analysis of geographically-concerned data.<ref> what-gis http://www.gis.com/content/what-gis</ref> GIS can be used to capture, store, check, and display data that is related to positions on Earth’s surface. By storing all of this information in one map, GIS enables people to more easily analyze and understand geographic patterns and relationships. While GIS is an essential and prominent aspect of modern mapmaking, or cartography, it also contains a large variety of data that cannot be displayed in a printed or onscreen map.<ref> http://www.nationalgeographic.org/encyclopedia/geographic-information-system-gis/ </ref> GIS can also be used for a diverse amount of functions beyond mapping, such as: accident and hot spot analysis, urban planning, transportation planning, environmental impact analysis, disaster management and mitigation, and navigation services for example.<ref> http://grindgis.com/blog/gis-applications-uses </ref> The main concepts behind GIS can be related as these 4 simple ideas: ''create it, manage it, analyze it, and display it''.<ref> http://gisgeography.com/what-gis-geographic-information-systems/ </ref> The birth of GIS has also led to discussions regarding the privacy, property, accuracy, and accessibility of information.<br />
<br />
==History of GIS==<br />
The history of geographic information systems can be broken down into three primary stages<ref name="history">http://gisgeography.com/history-of-gis/ </ref>:<br />
:*Pioneering and Development<br />
:*GIS Software Commercialization<br />
:*User Adoption<br><br><br />
;Mid-1800s to 1960<ref name="history"/>:<br />
:The start of GIS practices can be traced back to London in the mid-1800s where the city was in the midst of cholera epidemic due to rapid urbanization and poor sanitation methods. An anesthesiologist by the name of John Snow created maps charting these deaths caused by cholera. Not only was Snow able to stop the epidemic by removing the handle on a water pump but he was able to confirm that cholera was a disease that was transmitted through the consumption of contaminated water and that it was not an airborne disease. This also prompted a renewed effort to improve sanitation and the sewage infrastructure of London. By mapping the disease mortality of cholera, Snow applied the basics of geographic information systems.<ref> https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3174470/</ref> <br><br><br />
:It should be noted that geographic information systems can be created both through computer programs and on paper.)<ref name="history" /><br><br><br />
;1960-1975<ref name="history" />:<br />
:GIS visualizations continued to be done on paper up until the 1960s when desires from cartographers and spatial users pushed to explore newly invented computing options for handling geographic data. Between the years of 1960 and 1975, there were several major technological advances that also allowed for the increased development of GIS. Those advancements included: ''map graphics as outputs using line printers, advances in data storage with mainframe computers, and recording coordinates as data input.'' <ref name="history" /><br><br><br />
:Within this period of time we see the introduction of Roger Tomlinson who is widely regarded to be the father of GIS. During Tomlinson’s tenure with the Canadian government throughout the 1960s he was directly responsible for initiating, planning, and directing the development of the Canadian Geographic System (CGIS). (''CGIS is considered by many to be the roots of modern geographic information systems.'') The development of the system began in 1964 but was not fully functional until 1971.<ref name="history" /> <br><br><br />
:However, the CGIS group was not the only organization adopting GIS. The US Census Bureau was also an early adopter of the core principals behind GIS. It was the work down by the US Census Bureau that ultimately led to the data format GBF-DIME ''(Geographic Base File – Dual Independent Map Encoding)'' being used. This data format allowed for digital data input, error fixing, and even [[wikipedia:Choropleth_map|choropleth]] mapping and also allowed for the US Census Bureau to begin digitizing roads, urban areas, and Census boundaries.<ref name="history" /><br><br><br />
;1975-1990<ref name="history" />:<br />
:During the mid-1970s, Harvard Laboratory for Computer graphics developed the first vector based GIS called the ODYSSEY GIS. This development played a critical role in the technical framework of what would lead into a period of software commercialization. With memory size and graphics capabilities improving, new cartography software was created which led to the 1980s seeing an increasing amount of GIS software vendors. One of those vendors was Esri – which would later become the largest GIS software company in the world and who would come to play a key role in the further development of GIS software.<br><br><br />
:By this point in time GIS had gained notoriety through the holding of conferences and its use in published work. The first GIS conference was held in the UK in 1975 and only included a very small group of academics. The first conference held by the preeminent Esri was held in 1981 and had 18 participants. From there, GIS consultancy firms began to sprout.<br><br><br />
;1990-2010<ref name="history" />:<br />
:During this time period, GIS experiences rapid user adoption and proliferation. The three main reasons for this phenomenon are: cheaper, faster, and more powerful computers, multiple software options and data availability, and the launch of new satellites and integration of remote sensing technology. However, the advancements in technology soon surpassed the capabilities of average users who did not know how to take full advantage of the software. This made many users and companies hesitant to adopt the software. <br><br><br />
:Eventually, the importance of spatial analysis for decision-making was recognized and GIS began to be introduced into companies and classrooms. With increasing amounts of different data types being able to be processed by GIS software along with the availability of global position systems, users had more tools at their disposal than ever and the accuracy of these systems was greatly increased. These two factors led to further rampant development of geographic information and global positioning systems. <br><br><br />
<br />
;2010-Present<ref name="history" />:<br />
:GIS software and data has now become virtually ubiquitous. There are massive online repositories of GIS that can be downloaded for free by anyone and there is also a nearly endless range of GIS software products. One of the biggest developments has been the fact that many GIS users are building their own GIS software in an open and collaborative way online that is available to the general public. QGIS is one of the best examples of open source GIS software.<br><br><br />
:As of today, we have barely scratched the surface of what GIS is capable of.<br />
<br />
==Applications of GIS==<br />
GIS is useful for any spatial analysis, and therefore has a wide range of uses. Two examples of such uses are academic researchers in archaeology or biology can utilize GIS to create 3d models of archaeological dig sites or to picture species distribution in an area.<ref> who-uses-gis http://www.gis.com/content/who-uses-gis</ref> There is a high demand for experts in GIS in a multitude of public and private sectors<ref> careers http://www.gis.com/content/careers-gis</ref> due to the ability of GIS to utilize diverse types of datasets for the mapping and analysis of any spatial phenomena<ref> Colorado.edu http://www.colorado.edu/geography/gcraft/notes/datacon/datacon_f.html</ref>.<br />
<br />
====Archaeology====<br />
[[File:archeologysite.jpg|200px|thumb|left|A Picture of an Archaeological Excavation Site]]<br />
Due to the inherently destructive nature of archaeology, archaeologists find it helpful to plot their site in GIS, utilizing careful measurements to plot a 3d model of the artifacts they recover in the positions they were in before the dig. In doing this, they have a complete model to utilize year-round in research. This is helpful, because many conclusions made about a site of habitation depend on the relative location of artifacts to one another, e.g. many types of charred bones could indicate a hearth or a trash pile, while concentrations of domestic items could suggest a home or workspace.<ref> Stanford.edu http://www-sul.stanford.edu/depts/gis/Archaeology.htm</ref><br />
<br />
===Utility Companies===<br />
[[File:utilities_image.jpg|200px|thumb|right]]<br />
Utility companies deal with the distribution of electricity, water, etc. along networks. By mapping these networks in GIS, one is able to do spatial analysis to determine coverage deficiencies or best practices for expansion. The applications of GIS in this context have been referred to as the 4Ms: modeling, mapping, maintenance, and monitoring.<ref>Google http://books.google.com/books?vid=ISBN0849320976&id=ctWXJrDRf_AC&pg=PA1&lpg=PA1&ots=XxCU2Dm_0M&dq=GIS+Applications&sig=6whvFAGVG4SejGA9-Ys0HXddOqc#v=onepage&q&f=false</ref><br />
<br />
==Ethical Implications==<br />
===GIS Code of Ethics===<br />
Due to the fact that GIS is a multidisciplinary technical field, and that ethical codes are typically meant to serve only a single discipline or society, many ethical issues were not addressed. Mason and Collins pinpointed issues of privacy, property, accuracy, and accessibility to be the four main concerns regarding information sciences that need to be ethically acknowledged. In order to address these concerns, the Urban and Regional Information Systems Association (URISA) adopted a GIS code of ethics in 2003. The philosophy of the ethical code stems from the teachings of philosopher Emanuel Kant (1724-1804), who was a geographer in his day and was very familiar with maps as a form of communication. Kant’s basic moral ideas were to always treat others with respect and never as means to an end. He encouraged individuals to consider the impact of their actions on other people and to modify their actions accordingly. The main points of thef the GIS Code of Ethics that developed out of Kant's moral philosophy is summarized below: <br />
<br />
*Do the best work possible.<br />
*Contribute to the community.<br />
*Speak out about issues.<br />
*Have a professional relationship.<br />
*Respect others.<ref>Snow, M., Snow, R. Campus-Wide Information Systems. Ethics in the information exploitation and manipulation age (2007). 24.3 pg. 207-16. </ref><br />
<br />
===Issues of Social Concern===<br />
<br />
Social phenomena that are measured like crime rates, poverty, education levels, segregation, etc. can be mapped spatially to serve as a tool for analysis. By providing a visual representation of geographic concentrations of various phenomena, correlations can be drawn and efforts can be focused on microcommunity-specific problems in order to affect maximum change<br />
<br />
==See Also==<br />
*[[Data aggregation and public information]]<br />
*[[Data Aggregation Online]]<br />
*[[Data Mining]]<br />
<br />
== External Links ==<br />
*[[Wikipedia:Geographic_information_system|Geographic Information System]]<br />
<br />
==References==<br />
<references/><br />
<br />
<br />
[[Category:Concepts]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Overwatch&diff=72743Overwatch2018-04-24T10:14:38Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#B}}<br />
{{SoftwareInfoBox<br />
|NAME=Overwatch<br />
|HEIGHT=680<br />
|LOGO=Overwatch_Logo.png<br />
|SCREENIMAGE=Overwatch_Cover.jpg<br />
|CAPTION="Overwatch Cover"<br />
|IMAGEURL=http://si410ethics11.projects.si.umich.edu/images/6/6d/Overwatch_Cover.jpg<br />
|TEXT=<br />
|TYPE=Video Game<br />
|GENRE=First Person Shooter<br />
|DEVELOPER=[[Blizzard Entertainment]]<br />
|LAUNCH=May 24, 2016<br />
|STATUS=Active<br />
|PLATFORM=Microsoft Windows, Xbox One, PlayStation 4<br />
|SITEURL=https://playoverwatch.com/en-us/<br />
|URLTEXT=https://playoverwatch.com/en-us/<br />
}}<br />
<br />
'''''Overwatch''''' is a video game created by [[Blizzard Entertainment]] and was released on May 24, 2016. Overwatch is a first-person shooter genre game, with 24 different heroes to choose from to play. Each hero has a different style of play, and each player picks a hero based off of their preferred style of play. There are 6 players on each team in the standard game mode, with 2 teams per match total. There are four main categories of hero play styles: tank characters, offensive characters (often referred to as DPS, which stands for damage per second), defensive characters, and support characters. Different combinations of these heroes can lead to different strategies within the game. Overwatch is often praised for its diverse cast of characters, representing all sorts of body types and ethnicities.<br />
<br />
== Gameplay ==<br />
A standard Overwatch game consists of 2 teams and 12 players--6 players on each team. Each player must select a hero from the hero pool and wait in a holding area until the match starts, at which point the gates to the holding area for each team are released. Each team races towards an objective in order to contest the objective. Objectives range from payloads (which the attacking team must escort, and the defending team must ensure that the attacking team does not escort the payload) to holding points. Matches last until the objective is completed, or until the time runs out.<br />
<br />
There are other non-standard game modes, such as 3v3 matches, or fun holiday-themed campaigns. These are listed under the "Arcade" game modes, where you can win up to 3 matches a week to obtain a loot box.<br />
<br />
=== Loot Boxes ===<br />
Overwatch has a vanity system in which players can obtain skins for their heroes from loot boxes. Loot boxes are obtained either from leveling up your account (done by completing games) or by purchasing with real money. In each loot box, there are 4 items. Items can be skins (appearance changes for heroes), sprays (art you can put on walls and floors in the middle of matches), voice lines for heroes, victory poses (a pose your chosen hero strikes at the end of a won match), highlight intros (an animation that plays if you are selected for the play of the game during each match), or in-game currency. There are tiers of vanity items--common, rare, epic, and legendary. Vanity items can either be looted from loot boxes or purchased with in-game currency. Common items are worth the least, rare items are worth the second-least, epic items are worth the second-most, and legendary items are worth the most. If a player receives a duplicate item, the player is automatically refunded a set amount of in-game currency.<br />
<br />
=== Heroes ===<br />
{|border="1" cellpadding="5" cellspacing="0" align="center"<br />
|-<br />
! scope="col" style="background:#efefef;" | Portrait<br />
! scope="col" style="background:#efefef;" | Name<br />
! scope="col" style="background:#efefef;" | Role<br />
! scope="col" style="background:#efefef;" | Portrait<br />
! scope="col" style="background:#efefef;" | Name<br />
! scope="col" style="background:#efefef;" | Role<br />
! scope="col" style="background:#efefef;" | Portrait<br />
! scope="col" style="background:#efefef;" | Name<br />
! scope="col" style="background:#efefef;" | Role<br />
! scope="col" style="background:#efefef;" | Portrait<br />
! scope="col" style="background:#efefef;" | Name<br />
! scope="col" style="background:#efefef;" | Role<br />
|-<br />
|[[File:OWAna.png|100px]]<br />
|Ana<br />
|Support<br />
|[[File:OWBastion.png|100px]]<br />
|Bastion<br />
|Defense<br />
|[[File:OWDVa.png|100px]]<br />
|D.Va<br />
|Tank<br />
|[[File:OWGenji.png|100px]]<br />
|Genji<br />
|Offense<br />
|-<br />
|[[File:OWHanzo.png|100px]]<br />
|Hanzo<br />
|Defense<br />
|[[File:OWJunkrat.png|100px]]<br />
|Junkrat<br />
|Defense<br />
|[[File:OWLucio.png|100px]]<br />
|Lucio<br />
|Support<br />
|[[File:OWMcCree.png|100px]]<br />
|McCree<br />
|Offense<br />
|-<br />
|[[File:OWMei.png|100px]]<br />
|Mei<br />
|Defense<br />
|[[File:OWMercy.png|100px]]<br />
|Mercy<br />
|Support<br />
|[[File:OWOrisa.png|100px]]<br />
|Orisa<br />
|Tank<br />
|[[File:OWPharah.png|100px]]<br />
|Pharah<br />
|Offense<br />
|-<br />
|[[File:OWReaper.png|100px]]<br />
|Reaper<br />
|Offense<br />
|[[File:OWReinhardt.png|100px]]<br />
|Reinhardt<br />
|Tank<br />
|[[File:OWRoadhog.png|100px]]<br />
|Roadhog<br />
|Tank<br />
|[[File:OWSoldier_76.png|100px]]<br />
|Soldier: 76<br />
|Offense<br />
|-<br />
|[[File:OWSombra.png|100px]]<br />
|Sombra<br />
|Offense<br />
|[[File:OWSymmetra.png|100px]]<br />
|Symmetra<br />
|Support<br />
|[[File:OWTorbjorn.png|100px]]<br />
|Torbjorn<br />
|Support<br />
|[[File:OWTracer.png|100px]]<br />
|Tracer<br />
|Offense<br />
|-<br />
|[[File:OWWidowmaker.png|100px]]<br />
|Widowmaker<br />
|Defense<br />
|[[File:OWWinston.png|100px]]<br />
|Winston<br />
|Tank<br />
|[[File:OWZarya.png|100px]]<br />
|Zarya<br />
|Tank<br />
|[[File:OWZenyatta.png|100px]]<br />
|Zenyatta<br />
|Support<br />
|}<br />
<br />
== Professional Scene ==<br />
[[Blizzard Entertainment]] is sometimes criticized for a lack of proper management over their competitive Overwatch scene. As it stands, there is currently no Blizzard-sponsored Overwatch tournament that exists. Instead, tournaments are created by third-party sponsors. It is unknown whether or not Blizzard has any plans to change this at this time.<br />
<br />
One of the tournaments in place for Overwatch as of right now is [[Tespa]], although this is only at a collegiate level. Over $100,000 worth of scholarship prizing was offered by Tespa in a tournament in Fall of 2016.<ref>Tespa Collegiate Series - Overwatch https://compete.tespa.org/tournament/27</ref> However, in November 2016 it was announced that a new esports league was forming called Overwatch League. This is a professional esports league completely funded by Blizzard Entertainment. After a year or so Blizzard announced the first twelve teams involved in this league split between two divisions.<ref>[https://overwatchleague.com/en-us/ Overwatch League Information]Retrieved on 14 Apr 2018.</ref> The league started around December 6th, 2017 to December 9th, 2017 with preseason play before kicking off it's inaugural season on January 10th, 2018 where it's continuing until June 16th, 2018.<ref>[https://overwatchleague.com/en-us/about Details for Overwatch League]Retrieved on 14 Apr 2018</ref> Overwatch League offers it's players a $50,000 guaranteed minimum based salary with healthcare, retirement savings plans, and housing during the season. <br />
===Pacific Division===<br />
#Dallas Fuel<br />
#Los Angeles Gladiators<br />
#Los Angeles Valiant<br />
#San Francisco Shock<br />
#Seoul Dynasty<br />
#Shanghai Dragons<br />
===Atlantic Division===<br />
#Boston Uprising<br />
#Florida Mayhem<br />
#Houston Outlaws<br />
#London Spitfire<br />
#New York Excelsior<br />
#Philadelphia Fusion<br />
== Ethical Concerns ==<br />
Overwatched has faced concerns regarding the presentation and portrayal of their characters. Mei is a female character with vanity skin with a non-normative body shape. Undergoing an update, her skin appeared to be lighter. Mei has been appreciated by many members of the community for her body type; it provides better representation for female body types in video games. When Mei's Lunar New Year skin was released, it made her appear to look thinner. The gaming community was outraged. Blizzard has since responded and said that it was an unintentional bug and fixed the issue. <ref>Blizzard Says Overwatch Skins Accidentally Made Mei Look Thinner http://kotaku.com/overwatch-skin-accidentally-made-mei-look-thinner-1791596606</ref><br />
<br />
Some characters in Overwatch appear to be oversexualized when developed. There was once a player complaining in the game forum that the victory pose of a female character named Tracer was overly sexualized and there was nothing to do with the identity and personality of that character. Following that, more feedbacks about the sexualized pose and apparel of female characters rose and the players complained that such designs were stereotypic and disrespectful to females and intentional to manifest the sexual differences of male and female characters. To respond these feedbacks, the Blizzard removed the controversial poses and apologized to those who felt uncomfortable because of that. "We want everyone to feel strong and heroic in our community.” The game director, Jeff Kaplan, claimed. <ref>Blizzard is removing a sexualized pose from Overwatch, citing player feedback http://www.polygon.com/2016/3/28/11321138/overwatch-tracer-pose-removal</ref><br />
<br />
==References==<br />
<references/><br />
<br />
<br />
([[Topics|back to index]])<br />
<br />
[[Category: Video Games]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Clash_of_Clans&diff=72742Clash of Clans2018-04-24T10:02:31Z<p>Hillcm: /* Freemium */</p>
<hr />
<div>{{SoftwareInfoBox<br />
|NAME=''Clash of Clans''<br />
|HEIGHT=450<br />
|LOGO=Clashofclanslogo.jpg<br />
|SCREENIMAGE=Clashofclansfighting.jpg<br />
|CAPTION="Clash of Clans Loading Screen"<br />
|IMAGEURL=https://play.google.com/store/apps/details?id=com.supercell.clashofclans&hl=en<br />
|TEXT=Clash of Clans<br />
|TYPE=Video Game<br />
|LAUNCH=2012<br />
|STATUS=Active<br />
|PLATFORM=iOS, Android<br />
|PRODUCT=Clash of Clans v8.116.2<br />
|DEVELOPER=Supercell<br />
|SITEURL=https://clashofclans.com/?gclid=CPvjuJex2soCFYTGGwodvvUEKQ<br />
|URLTEXT= Clash of Clans Official Site<br />
}}<br />
<br />
'''{{initial|C}}lash of Clans''' is a [[wikipedia:Freemium|freemium]] [[wikipedia:Massive multiplayer online game|MMO]] (massive multiplayer online) [[wikipedia:strategy game|strategy game]] developed for mobile devices by [[wikipedia:Supercell video game company|Supercell]]. The game was released for [[wikipedia:iOS|iOS]] platforms in 2012, and later on [[wikipedia:Google play|Google Play]] for Android in 2013. Players build their own villages and engage in warfare against other players. In 2015, ''Clash of Clans'' was the top grossing app on both the App Store and Google Play, generating an estimated 1.5 million dollars per day.<ref> The top-grossing iPhone app makes a whopping $1.5 million a day, Nathan McAlone, 12 June 2015 http://www.businessinsider.com/clash-of-clans-earns-15-million-a-day-as-top-grossing-app-2015-6 </ref> Despite its success, however, the game is not without its own ethical concerns such as violence, bullying, and video game addiction.<br />
[[File:clashofclansbattle.png|right|250px|thumb|A key component of ''Clash of Clans'' is attacking another player's village.]]<br />
<br />
__TOC__<br />
==Gameplay==<br />
Players can construct a village, set up necessary defenses for protection, gather resources in the form of gold and elixir, and create a powerful army. The object of the game is to build defenses that protect the players' village and resources from other players' attacks, as well as to train and upgrade troops for offensive maneuvers. Players must earn resources in order to build and upgrade buildings, which can be used for a variety of purposes such as storage, training new troops, carrying out research in the laboratory, and defending a player's village. Once they reach a certain level, players can join clans, which are groups of players that pool their resources in order to compete and fight against other clans in battles. While the game revolves around playing with and against other people, the ''Clash of Clans'' also features a single player campaign mode in which the player battles against a number of computer-generated goblin villages.<br />
<br />
==Clans==<br />
Clans are groups of players who join together to support each other and fight against other clans. Players can join clans once they rebuild the special Clan Castle building. Players can request and donate a certain amount of troops once they have built the Clan Castle building. Clans have four different ranks within them: leader, co-leader, elder, and member. Clan leads and co-leaders can begin wars against other clans, change clan settings, and kick lower tier members from the clan, which can potentially lead to bullying and discrimination. During a war against another clan, each clan is given a "preparation day" and a "war day." Each player is limited to two attacks per war, and can earn up to three stars based on the amount of destruction caused to the opposing clan player's village in each attack. At the end of the war, the clan with the higher amount of stars wins, with players receiving bonus war loot and the clan receiving one more war win in their record. Clans are seen as a status symbol and are ranked based on a weighted percentage of clan players' trophies.<br />
<br />
==Publicity==<br />
[[File:clashofclanstakenad.jpg|right|200px|thumb|Image from ''Revenge'' ad featuring Liam Neeson.]]<br />
Supercell has released numerous television and Internet advertisements for the game, including an ad for the [[wikipedia:Super Bowl XLIX|Super Bowl XLIX]], featuring [[wikipedia:Liam Neeson|Liam Neeson]] parodying his character from [[wikipedia:Taken|''Taken'']]. This ad, titled ''Revenge'', has over 100 million views on Youtube, and was the most viewed Super Bowl Ad in 2015.<ref> Clash of Clans mobile game was most popular Super Bowl ad in 2015, Stuart Dredge, 9 February 2015 http://www.theguardian.com/technology/2015/feb/09/clash-of-clans-super-bowl-ad-2015 </ref> ''Clash of Clans'' also has a Youtube channel with over 4 million subscribers and over 650 million total views on their channel.<br />
<br />
==Related Games==<br />
In 2014, Supercell released [[wikipedia:Boom Beach|Boom Beach]] on iOS and Android worldwide. ''Boom Beach'' is also a freemium strategy video game for mobile devices in which players can build and upgrade their base to attack other players's bases or computer-generated bases. The game has received generally positive ratings. Similar to ''Clash of Clans'', the game offers premium purchasable currency in the form of diamonds. While the two games share many of the same strategy aspects, ''Boom Beach'' has a more attack oriented nature and offers more control over troops. The other aspect of these games that is completely different is the matchmaking process for attacks. ''Clash of Clans'' offers a completely random matchmaking model, while ''Boom Beach'' gives you five to ten possible opponents to choose from.<br />
<br />
On January 4th, 2016, Supercell released [[wikipedia:Clash Royale|Clash Royale]] on iOs and Android. Although it is not a strategy game about building a base or attacking other player's bases, Supercell uses many familiar units that are used in ''Clash of Clans''. In this strategy game, players collect cards that represent units they can place down on a battlefield. The objective of each battle is to destroy the other player's castle in order to win. Besides the tutorial, the entirety of the fights are against other players to gain "trophies". The more "trophies" a player procures through battling, the higher "arena" they are bumped up to. ''Clash Royale'' also offers plenty of opportunities for players to make purchases in order to better prepare themselves for battle, utilizing the same freemium strategy model.<br />
<br />
==Supercell Controversy==<br />
In December of 2015, Supercell released a much anticipated update to the game, infamously known as the "Town Hall 11" Update. This update included allowing players to upgrade to a new level of the town hall, the central building of each village. Supercell also promised a new hero, new long range artillery, an increased map size, increased storage units, and other troop and building upgrades. However, new rules in the update regarding shield timers, farming, and personal breaks generated a lot of controversy, especially among the most invested and elite players. This update raised the incentive to use real-world money to purchase protection that used to be accessible to players for free in the previous version of the game. In response, thousands of players took to Reddit and the Apple and Android app stores to voice their opinions and concerns. In just three days after the game's update, ''Clash of Clans'' received twenty-one thousand ratings which averaged out to 3 stars, compared to its average 4.5 star rating before the update out of a total of 1.7 million reviews.<br />
<br />
==Ethical Concerns==<br />
===Violence===<br />
While there is no graphic violence, ''Clash of Clans'' contains frequent battles with cartoon-style weapons, explosions, and cries of defeated soldiers. The game's core component is attacking and raiding other villages in order to pillage the resources of other players. Thus, there are some ethical concerns with young children playing the game and being exposed to such violence. Commonsense Media, a website that provides information on family-friendly and safe media and games, states that ''Clash of Clans'' is appropriate for those 13+. Both the violence rating and the inappropriate language rating of the game are 2/5. There is no explicit language or sexual references in the game.<ref> Commonsense Media: Clash of Clans https://www.commonsensemedia.org/app-reviews/clash-of-clans </ref><br />
<br />
===Bullying & Cyberbullying===<br />
In 2014, a group of students at Ogden International School in Chicago created a clan called the "Jew Incinerator Clan" to bully another student because he was Jewish.<ref> Latest Jr High Rage: “Jew Incinerator," Lori Marcus, 25 May 2014 http://www.jewishpress.com/news/breaking-news/jew-incinerator-clan-played-to-taunt-chicago-jewish-8th-grader/2014/05/25/ </ref> The students wrote, “Heil! Throw Jews into ovens for a cause. We are a friendly group of racists with one goal – put all Jews into an army camp until disposed of. Sieg! Heil!”<ref> Anti-Semitism Erupts at Chicago Public School with Jew Incinerator Game, Warner Huston, 3 June 2014 http://www.breitbart.com/big-government/2014/06/03/anti-semitism-erupts-at-chicago-public-school-with-jew-incinerator-game/ </ref><br />
New York Times released an article in 2015 on how ''Clash of Clans'' provokes bullying on the playground as a result of the exclusionary nature of the game. Middle school students who played the game formed cliques to exclude certain classmates, and the power structures that were created were cast even further than in the game itself. This scenario reveals the negative consequences that can occur when ''Clash of Clans'' players form and enforce hierarchical bullying both online and in real life.<ref> How Clash of Clans Is Taking Bullying to the Virtual Playground, Nick Bilton, 27 May 2015 http://www.nytimes.com/2015/05/28/fashion/clash-of-clans-makes-playground-battles-digital.html?_r=1 </ref><br />
<br />
===Video Game Addiction===<br />
Due to its addictive nature, ''Clash of Clans'' raises ethical issues concerning time-wasting and distraction.<ref> Why 'Clash Of Clans' Is So Incredibly Popular, According To A Guy Who Plays 16 Hours A Day, Steven Tweedie, 25 September 2014 http://www.businessinsider.com/why-clash-of-clans-is-so-popular-2014-9 </ref> The game follows a model that enables players to make quick upgrades at low costs when they are on the lower level of the game. As a player increases in levels, the upgrades become much more expensive and take a great deal of time to complete, but at this point many players are already hooked to the improved success of their home base in comparison to their fellow clan-mates. The game also ensures that the home base is under protection from enemy raids while a player is logged on, raising incentive for the game's top players to stay logged on for hours at a time. <br />
[[File:Addicted.png|thumbnail|left]]<br />
One ''Clash of Clans'' addiction that received very much attention in the media was when the professional baseball team, the Kansas City Royals, reportedly attributed their poor athletic performance to the game.<ref> A Clash Of Clans Addiction Nearly Sank The Royals' Season, Barry Petchesky, 12 October 2014 http://deadspin.com/a-clash-of-clans-addiction-nearly-sank-the-royals-seaso-1648848299 </ref> This was not the first case of video game addiction in baseball, as players often seek ways to pass idle time in the clubhouse. Royals player Lorenzo Cain was the most notorious for his ''Clash of Clans'' obsession and many other players followed suit. Their on-field performance ultimately worsened, and several coaches saw the game as a detrimental obstacle. It got to the point when a coach entered the locker room after a particularly bad loss, and most of the team was checking their progress on their iPads. Coaches later called a meeting regarding their obsessive play time and how it was damaging the team. While this may not be causation for poor performance, it proved to serve as a distraction towards their careers. The situation with the Royals provides an example as to how multiplayer video game addiction can cause a snowball effect consequence where there is a potential for many players to become consumed with a game as its popularity increases amongst a group.<br />
<br />
===Freemium===<br />
There are many options that players can make purchases in order to advance in the game. It gives the notion of "pay to win" game which is highly frowned upon by the general population. The temptation to purchase more in-game currency increases once the players reach higher levels. Players have the opportunity to use actual currency in exchange for gems, Clash of Clan's premium currency.[[File:clashofclansbuygems.jpg|right|380px|right|thumb|The game offers large quantities of gems for relatively low prices.]]<ref> Clash of Clans Addiction: Players Beware the Mobile Game Money Pit, Melissa Loomis, May 2015 http://gamerant.com/clash-of-clans-addiction/ </ref> Gems can be earned through different milestones in the game, but the primary way to acquire gems is through a credit card purchase. Players can speed up the construction time of a building or boost other resources for only a small amount of gems, creating low-cost yet addictive in-app purchasing behavior. Players spend a considerable amount of money and time into the game in order to get an edge over other players. <br />
<br />
The accessibility to make these purchases also raises ethical concerns. For example, in 2013 a pair of 7-year-old twins spent $3,000 iTunes unknowingly playing ''Clash of Clans'' without their parents' knowledge and consent.<ref> 7-Year-Old Twins Rack Up $3,000 iTunes Bill Playing 'Clash Of Clans', Catherine Taibi, 23 July 2013 http://www.huffingtonpost.com/2013/07/23/3000-itunes-bill_n_3640842.html </ref><br />
<br />
==External Links==<br />
{{resource|<br />
*[http://supercell.com/en/ Supercell's Official Website]<br />
*[http://clashofclans.wikia.com/wiki/Clash_of_Clans_Wiki Clash of Clans Wikia]<br />
*[[wikipedia:Supercell|Supercell Wikipedia]]<br />
*[[wikipedia: Clash of Clans|Clash of Clans Wikipedia]]<br />
}}<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Game Addiction]]<br />
*[[Ethics in Computer & Video Games]]<br />
}}<br />
<br />
== References ==<br />
{{resource|<br />
<references/><br />
}}<br />
<br />
[[Category:Video Games]]<br />
[[Category:Software]]<br />
[[Category:Mobile Application]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Location_targeted_advertising&diff=72741Location targeted advertising2018-04-24T09:55:57Z<p>Hillcm: </p>
<hr />
<div>[[File:Ads.jpg|framed|right|Location based advertising is an increasing phenomenon.]]<br />
'''Location targeted advertising''' is a method that uses the location of a user in order to provide tailored marketing. Locations can be gathered through mobile tracking, IP address tracing or user inputted location settings. The purpose of tailored advertisements through location is to provide users with content that is relevant to their city and demographic. Restaurants and local businesses may use this form of advertising to provide local deals and coupons to potential customers. Other companies may use the information gathered from the user to gauge their types of customers. <br />
<br />
== Types == <br />
<br />
'''User Permitted Location Sharing''' <br />
<br />
Mobile phone users download apps with features that require the use of location tracking in order to properly function. At least 78% of smartphone users use real-time location tracking.<ref> http://www.pewinternet.org/2012/05/11/three-quarters-of-smartphone-owners-use-location-based-services/ </ref> With this feature, applications are allowed to gather information about the different locations in which the user travels to. Once a complete profile is created, advertisements can be tailored in order to provide specific details related to nearby businesses. <br />
<br />
'''IP address Location Tracking''' <br />
<br />
The IP address of a computer can be used in order to pin-point a specific user. Companies can pay to have their targeted ads shown directly to a specific household based on the location of a certain IP address. <ref> https://www.vicimediainc.com/ip-targeting-direct-mail-internet/ </ref> This method also keeps track of the number of views and clicks that are registered by an online advertisement. Modern search engines use IP address tracking in order to find the current location of the user. Local businesses can pay to have their advertisements displayed when a user performs searches in that location boundary. Advertisements can also be tailored to show users services and products that are specifically from businesses nearby. When using these search engines, users may be unaware that their location can automatically be populated.<ref>http://carnival.io/mobile-insights/mobile-marketing-and-geolocation-up-your-effectiveness-with-location-targeting/</ref> <br />
<br />
[[File:Geofencing.jpg|370px|thumbnail|left|Geo-fencing allows advertisers to target specific users by outlined locations. ]]<br />
'''Geo-fencing''' <br />
<br />
Advertisements may be automatically displayed to users once they pass through a geo-fence (https://en.wikipedia.org/wiki/Geo-fence), a virtual line that outlines a real-world location. Geo-fences allow advertisers to pinpoint a specific location on a map, in which their business may be located or a certain demographic of people are gathering. For example, a store that sells baseball equipment may create a geo-fence around a baseball stadium in order to target people interested in baseball. Using geo-fencing to track customers, givers advertisers automatic information regarding number of visits, costs per visit, number of views, number of clicks and more.<ref> https://www.simpli.fi/display-advertising/geo-fencing/ </ref> User location and information is gathered through mobile devices, often times without the consent of the user. <br />
<br />
<br />
<br />
<br />
<br />
== Ethical Issues ==<br />
<br />
'''Lack of Privacy''' <br />
<br />
Location-based advertisements gain the location and personal data of users at a constant rate. Even when users provide permission for their location to be tracked, they may be unaware of the extent to which this information is being used and the amount of information that is being gathered. Using location, city demographics, type of products and services being purchased and more, “different data dimensions captured on location-based social networks can be combined to represent views of user profiles”.<ref> http://www.thinkmind.org/ </ref> This lack of privacy becomes almost impossible for users to avoid and by simply holding a smartphone in their pocket, they are subject to data capturing and breaches of their privacy.<br />
<br />
'''Abuse of Power''' <br />
<br />
With this technology, the abuse of power from marketing agencies becomes simple in that they may share this information with external companies. Kuebler mentions that in the future, it would be possible for insurance agencies to raise the price of car insurance on the spot because a users location showed that they had been a bar for an extended amount of time<ref>http://www.ethicapublishing.com/confronting/5CH5.pdf</ref>. He goes on to mention that with this information, police offers could conduct a breathalyzer test because they were also informed that the user had been at a bar. Location gathering for advertisements makes it possible for agencies to extend their business, selling the information of their users or the users in a specific location to a number of people.<br />
<br />
== Benefits == <br />
<br />
As this technology becomes more prevalent in advertising, users are able to find and connect with businesses near them that attract their interests. This may be helpful when spending time abroad, moving to a different city, or just trying to find a new place to go eat. Users may also benefit from receiving advertisements that pertain to their interests, providing them with new opportunities or products that they could find useful. The targeted ads allow for less spam messages or mail when users are receiving notifications on their device or emails. For a business, they would benefit from the success in amount of business these advertisements are bringing them. For companies that don't have a stable target audience (for example, a pregnancy product is only useful to someone for 9 months), this is a great way to get a loyal customer, and continuously be obtaining new customers as they enter a time in their life that the product is of use to them. These companies are now teaming up with social justice organizations to utilize their targeting technology to make a positive impact in the community. <br />
YouTube and Valassis, for example, are working together with National Center for Missing & Exploited Children (NCMEC) to ask specific areas of people if they've seen a certain missing child. <ref>Valassis. “Valassis Calls on Businesses and Consumers To Help Locate and Recover Missing Children.” Valassis, Valassis, 25 May 2016, www.valassis.com/about-us/newsroom/item/160525/valassis-calls-on-businesses-and-consumers-to-help-locate-and-recover-missing-children.</ref> Advertisers are able to pinpoint the location and specific demographic of people so that their marketing is more impactful and brings more potential customers.<br />
<br />
==References==<br />
<br />
[[Category:Services]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Pandora&diff=72740Pandora2018-04-24T09:54:28Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#A}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=580<br />
|NAME=Pandora<br />
|LOGO=Pandora.jpg<br />
|SCREENIMAGE=pandora_page.png<br />
|CAPTION=User's homepage<br />
|IMAGEURL=www.pandora.com<br />
|TEXT=<br />
|PLATFORM=Cloud Service<br>iOS App<br>Android <br />
|PRODUCT=Pandora<br />
|TYPE=Online Radio <br />
|SITEURL=http://pandora.com<br />
|URLTEXT=www.pandora.com<br />
|STATUS=Active<br />
|LAUNCH=January, 2009 <ref>"Pandora Radio." Wikipedia. http://en.wikipedia.org/wiki/Pandora_Radio</ref><br />
}}<br />
'''Pandora Radio''' is a free, personalized internet radio service in which users can listen to music with similar musical attributes (rhythm syncopation, key tonality, vocal harmonies, etc). Pandora's mission is to "play music that the user loves".<ref>"About." Pandora. http://www.pandora.com/about </ref> The site began in 2000 and, since then, music analysts have continued to develop methods of playing songs that have similar qualities. Pandora has restrictions in place to keep the costs of the site down and offers a subscription method where users can pay for unique features of the site. Pandora has a popular mobile app available on many platforms. Current issues surrounding Pandora include copyright issues dealing with the creators and owners of the music on the site, privacy about the type of music users listen to, and explicit content featured on the site. <br />
<br />
== History ==<br />
===Music Genome Project===<br />
In 1999, [[Wiki:Tim_Westergren|Tim Westergren]] formed a company called Savage Beast Industries with his friends Jon Kraft and Will Glaser.<ref name ="musicgenome_inc_pg2">Clifford, Stephanie. “Pandora's Long Strange Trip.” Inc.com, Inc., www.inc.com/magazine/20071001/pandoras-long-strange-trip_pagen_2.html.</ref> Westergren worked with his friends to build a company around categorizing and recommending music through a system he named the [[Wiki:Music_Genome_Project|Music Genome Project]].<ref name="musicgenome_inc_pg2"/> Initially, he came up with roughly 600 qualities or "genes" describing music characteristics, but narrowed this pool down to around 400 qualities or "genes" after hiring a professional musicologist to assist him.<ref name="musicgenome_inc_pg2"/><br />
<br />
By March of 2000, Westergren raised $1.5 million by marketing the Music Genome Project as venture capital project to create a music recommendation service.<ref name="musicgenome_inc_pg2"/> In 2001, he had acquired $20,000 from Barnes & Noble as an investment. Westergren landed contracts with AOL Music and Best Buy by the end of 2002 to provide licensing and data services.<ref name="musicgenome_inc_pg2"/> Despite facing a lawsuit over deferring employee that ended in bankruptcy, Westergren and a few others continued working on the project without funds until 2004 when the company received $8 million from Walden Venture Capital, allowing salaries to be paid again.<ref name="musicgenome_inc_pg2"/> In 2005, Joe Kennedy was hired as CEO and contracts to provide services to large companies fell through, forcing a rethink of Pandora's business model.<ref name="musicgenome_inc_pg2"/><br />
<br />
===Pandora Radio===<br />
Pandora launched as a web radio service in September of 2005 using a yearly subscription model with a limited trial.<ref name="musicgenome_nyt_pg3">Clifford, Stephanie. "Pandora's Long Strange Trip." Inc. http://www.inc.com/magazine/20071001/pandoras-long-strange-trip_pagen_3.html</ref> However, they faced problems with capacity and low subscription rates due to users signing up for additional free trials through new email addresses.<ref name="musicgenome_nyt_pg3"/> The company responded by switching to an advertisement-supported business model where users would be served new advertisements.<ref name="musicgenome_nyt_pg3"/> In May of 2007 the Company was forced to block radio access outside of the US, UK, and Canada, but still gave users with subscription accounts access to a form of the music recommendation service.<ref>"Breaking Pandora's Heart..." Pandora. http://blog.pandora.com/pandora/archives/2007/05/breaking-pandor.html</ref><br />
<br />
By 2008, Pandora had become of the top 10 mobile applications on [[WikiApple_Inc.|Apple]]'s [[Wikipedia:iPhone|iPhone]] and had upwards of 1 million users a day.<ref name="dailypost_possibledecline_p1">Whoriskey, Peter. "Giant of Internet Radio Nears Its 'Last Stand.'" The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/08/15/AR2008081503367.html</ref> In the same year Westergren acknowledged that the company faced possible collapse due to an increase in royalty fees for web radio services, which did not affect traditional radio stations.<ref name="dailypost_possdecline_p3">Whoriskey, Peter. "Giant of Internet Radio Nears Its 'Last Stand.'" The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/08/15/AR2008081503367_3.html</ref><br />
<br />
===International Use===<br />
On December 10, 2012, Pandora went fully live in Australia and New Zealand. It can be accessed via smartphone apps for [[iOS]] and [[Android]] devices, in addition to the Web-based [http://www.pandora.com/ player]. Pandora has curated genre stations of Australian- and New Zealand-specific music across a variety of genres including today's hits, singer-songwriter, roots and reggae dub, indigenous, classic pub rock and more. Pandora has hired a local Managing Director for the Australia and New Zealand markets.<ref>"Pandora Internet Radio Launches in Australia and New Zealand." Herald Online. http://www.heraldonline.com/2012/12/10/4474644/pandora-internet-radio-launches.html </ref> In previous years, Pandora had discussions to bring its services to Europe, but costs remain a concern because of high European royalty standards and a low demand for paid music services. Today, Pandora is only available in the United States, Australia, and New Zealand.<ref>"Breaking Pandora's Heart..." Pandora.http://blog.pandora.com/pandora/archives/2007/05/breaking-pandor.html</ref><br />
<br />
==How Pandora Works==<br />
[[File: Pandora Iphone.jpg|float|right|400px|thumb| Screenshot of Pandora on the iPhone]]<br />
<br />
===User Experience===<br />
Pandora allows users to create stations from one or more songs a user chooses as "seeds".<ref name="washpost_possdecline_p2">Whoriskey, Peter. "Giant of Internet Radio Nears Its 'Last Stand.'" The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/08/15/AR2008081503367_2.html</ref> A station can be further tailored by giving individual songs queued a "thumbs up" and "thumbs down" via buttons on individual songs.<ref name="washpost_possdecline_p2"/> When a song is rated as liked or disliked by a user, the station it was played on is updated by adding songs the music database rates as similar to liked songs and by preventing songs similar to the disliked songs from being queued<ref name="ehow"> "How to Ban an Artist From One of Your Stations on Pandora.com"<br />
eHow. http://www.ehow.com/how_2031306_ban-artist-one.html</ref> Pandora also allows users to add artists or add songs to existing stations in order to give stations more diversity in music.<ref name="ehow"/> In order to avoid wasting money by playing music to an empty room, Pandora is able to detect when an interaction between the user and Pandora has not occurred recently. When this detection is made, the music stops and a message pops up reading, "Are you still listening?" If the user is still using Pandora, they can simply click "Yes," and if not, Pandora is saving money and allowing the internet radio to remain free to all users.<ref>"Are you still listening?" Pandora. http://help.pandora.com/customer/portal/articles/24252-%22are-you-still-listening-%22</ref><br />
<br />
===Song Recommendation===<br />
Human Analysts enter songs into the [[Wikipedia:Music Genome Project|Music Genome Project]] database by rating each on a scale from 1 to 10 for each of 450 criteria<ref name="musicgenome_pandora">http://www.pandora.com/about/mgp</ref> which include genre, structure, mood, style, and lyrical content.<ref name="pandorahistory_inc_p2">Clifford, Stephanie. “Pandora's Long Strange Trip.” Inc.com, Inc., www.inc.com/magazine/20071001/pandoras-long-strange-trip_pagen_2.html.</ref> Human analysts are used because computers may miss subtleties in lyrical and emotional aspects songs.<ref name="pandorahistory_inc_p2"/> The characteristics in the database are used in combination with user history by a [[Recommender Systems|recommender system]] to suggest music that users might like.<ref name="pandorahistory_inc_p2"/><br />
<br />
Analysts for the Music Genome Project aren't just ordinary musicians; they are required to have certain training and certain understandings about how to identify the characteristics of a song. The Music Genome Project's database uses "precisely defined terminology, a consistent frame of reference, redundant analysis, and ongoing quality control".<ref name="musicgenome_pandora"/><br />
<br />
===Restrictions===<br />
Users of the free version of Pandora must deal with some restrictions set by the application. Pandora limits the amount of music a user can stream per month to 40 hours for each account. Users can make this time last its longest by closing Pandora each time they leave their devices or pausing the application when leaving. In addition, music can only be played for one hour at a time without interruption before being stopped. Pandora must pay royalties per song, and this mechanism helps costs from building up. Pandora also breaks up playing time with advertising breaks, both audible and visible. These ads cannot be skipped in order to get to the next song. In terms of skipping a track, if a user is not fond of the song being played, the user can "thumbs down" a song to ensure it is never played again on his or her account but is limited to only six song skips per hour and 12 skips per day. After their skips are used up, users must listen to all songs until their next session begins. Lastly, Pandora restricts users to 100 personal station creations per account. <ref> "Pandora Restrictions." eHow. http://www.ehow.com/info_11370312_pandora-restrictions.html Pandora User Restrictions</ref><br />
<br />
====Pandy====<br />
In 2012 a Developer by the pseudonym of ''semaphore'' released an application for iOS called '''Pandy'''. Pandy can only be run on jailbroken iOS devices. It allows all songs played through Pandora to be saved and stored on the users iPhone. The songs can then be transferred back to the users computer at their convenience. In 2013, semaphore discontinued the product publicly. He released a statement on his website, "Due to drama and the fact that I don’t want to cause any and cannot stand getting involved in. Pandy has ceased public release. My repo is no longer active. I will not be updating pandy publicly anymore."<ref>S. (2013, March 3). Pandy [Web log post]. Retrieved April 19, 2018, from http://blog.firmwareumbrella.com/2013/03/pandy/</ref> The application is still available to users of his private software repository. Access to the private repository requires payment.<ref>S. (n.d.). Private Repo FAQ. Retrieved April 19, 2018, from http://blog.firmwareumbrella.com/private-repo-faq/</ref><br />
<br />
===Pandora One===<br />
Users can also purchase a premium monthly subscription called Pandora One.<ref>"Pandora One." Pandora. http://help.pandora.com/customer/portal/articles/84834-pandora-one</ref> There are two subscriptions options: $36 annually or $3.99 monthly. The advertisements in between songs are removed when subscribed to Pandora One. Among other options such as custom skins for the web player, Pandora One subscribers are given the option to stream the music at a higher bitrate. Additionally, the daily skip limit is removed, but the six skips per hour per station limit remains in place. <ref> "Skip Limit." Pandora. http://help.pandora.com/customer/portal/articles/24601-skip-limit</ref><br />
<br />
== Traditional vs. Web Radio Services ==<br />
Traditional radio plays the same songs for all users listening at any given time, which might lead to a lack of the uniqueness and individuality that music listeners are seeking. Pandora can offer these opportunities but at a monetary consequence such as royalty fees. In contrast, traditional radio stations do not have to pay a fee each time they play a song.<ref>Whoriskey, Peter. "Giant of Internet Radio Nears Its 'Last Stand.'" The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/08/15/AR2008081503367.html</ref><br />
<br />
Pandora, on the other hand, allows for individuality and creativity by allowing users to have greater control over what songs they hear. While there may be many people using Pandora at once, each one may be listening to a different song. Pandora simultaneously streams separate songs for multiple individual users at once, something that traditional radios do not have the capacity to do. Pandora has a much greater variety of genres, artists, and types of music than traditional radio play. It has specialized playlists for certain artists, as well as playlists catered towards specific genres, locations, etc. Examples are Wiz Khalifa Radio, and East Coast Hip-Hop Radio.<br />
<br />
==Mobile App==<br />
Pandora has an application for [[Wikipedia:Blackberry|Blackberry]], [[Android]], an [[iOS]] platforms. It was recently updated at the end of October 2012. Officially called Pandora 4.0, the updated app finally brings features that have been available with the web version of Pandora to mobile phones.<br />
<br />
Currently, it is one of the most downloaded apps in the United States: 1 in every 3 smartphone owners have accessed Pandora on their smartphone. The app is the second most-downloaded free iPhone app of all time, according to Apple.<ref> Viticci, Federico. "Apple Reveals New “All-Time Top Apps” Following 25 Billion Downloads." Macstories. <ttp://www.macstories.net/news/apple-reveals-new-all-time-top-apps-following-25-billion-downloads/</ref><br />
[[File:Pandora-RadioLarge.jpg|Thumbnail|150px|left]]<br />
The Pandora Radio app has a social media aspect as it offers a more personalized experience. The app gives each Pandora listener his or her own profile page. This functions much like a Facebook profile, as it shows what an individual has done on the social network. Pandora profile will also show what the individual's created stations, bookmarked tracks, and tracks given a thumbs up or a thumbs down. Also, an activity feed works similarly to a [[Facebook]] News Feed- it allows one to follow friends on this service as well as see what tunes other Pandora listeners with similar interests are listening to.<br><br />
<br />
<br />
Recently, [[Wiki:Microsoft|Microsoft]] also announced that Pandora would be coming to [[Wiki:Windows_Phone_8|Windows Phone 8]] in 2013. When the app launches, they have said that it will give Windows Phone users ad-free radio for 1 year.<ref>Price, Emily. "Pandora's New Mobile App Will Rock Your World." Mashable. http://mashable.com/2012/10/29/pandora-app-update/</ref><br />
<br />
== Ethical Concerns with Pandora ==<br />
===Copyright Issues===<br />
An ethical issue Pandora is currently struggling with is their license deals with the [[Wiki:Recording_Industry_Association_of_America|RIAA]] and various other groups. Pandora currently pays out millions of dollars to "big-name" artists like [[Wiki:Adele_(singer)|Adele]] and [[Wiki:Coldplay|Coldplay]], but needs to pay even more to the recording companies because of various rules and regulations put in place for over-the-air radio, which Pandora radio is considered as.<ref>"Pandora and Artist Payments." Pandora. http://blog.pandora.com/pandora/archives/2012/10/pandora-and-art.html</ref><br />
<br />
Pandora wrote a blog post after the Copyright Royalty Board released new rules for fees for internet radio, saying that the RIAA could negatively affect Pandora with their lobbying for higher fees. Tim Westergren, the founder of Pandora said: "The RIAA has effectively convinced this federal committee to establish rates that make online radio a non-viable business."<ref>"RIAA's new royalty rates will kill online radio!!" Pandora. http://blog.pandora.com/pandora/archives/2007/03/riaas-new-royal.html</ref><br />
<br />
=== Recommender System===<br />
Pandora's [[Recommender Systems|recommendation algorithm]] takes a song or musical artist and creates a radio station based on a different number of keywords, in addition to taking user feedback into account. Once an account is created, the user allows Pandora to collect the data from all stations the user created and combines that with the general system in order to create the playlist they believe is best for the user. This poses as a potential breach in online privacy for users in that Pandora has all user information including likes/dislikes collected in their database. However, Pandora needs that information in order to offer the best recommendation algorithm possible. It brings to light the question what do users value more their privacy or the quality of service? However, the recommender system ultimately raises ethical concerns because user's personal data can be harvested without their knowledge of it.<br />
<br />
Many positive things come from the recommender system, such as, listeners find new artists every day on Pandora and which is helpful for artists. The recommender gives listeners the opportunity to listen to new music they may have never heard but probably will love. In addition to that, the artists benefit because they are grabbing new listeners who most likely will like their music too based on the music they generally listen to. It is one thing to hear a song on the radio, but when you hear a song on Pandora radio you are hearing music you that fits your taste. This is a very valuable tool for artists to have and benefits all Pandora users as well. It boils down to if the recommender feature enhances the user and artist experience enough to be worth the collection of user information and privacy.<br />
<br />
===Explicit Content===<br />
There are ethical issues with explicit content and music on Pandora, specifically relating to profane language and sexual references in lyrics. An individual may opt to block Pandora completely. However, one can also opt for a set list they have approved for their child/children on Playlist or [[Wiki:Grooveshark|Grooveshark]]. Additionally, users have the ability to adjust Pandora's filtered setting for what music they want to be blocked on the app.<ref>"How to Filter Explicit Songs from Pandora." Internet Safety Project. http://www.internetsafetyproject.org/wiki/how-filter-explicit-songs-pandora </ref><br />
Pandora has implemented parental controls to aid parents in excluding explicit lyrics and questionable content. Parental settings are specific to each account and apply to PC, Android, and iPhone. Pandora even allows you to set up a PIN to use as a password to guard this setting against being changed. Users claim that it is easy to set up a Pandora account to block explicit content, which means that this should not be a major concern for parents regarding parental controls.<ref> Vazquez, Christopher. "How To: Pandora Parental Controls." Growing Up Wired. http://www.growingupwired.com/parental-controls-2/how-to-pandora-parental-controls/</ref> There are also issues with users who wish to hear the explicit, uncensored versions of songs, but cannot opt-out of censored songs. These users are forced to either use a skip or thumbs down on censored songs or suffer through them. Furthermore, if a user gives a song the thumbs down only because it is censored, they run the risk of similar music that is uncensored being filtered off their station. This is ultimately unfair for artists who have popular songs and music but get penalized for the explicit content they use in their songs simply based on Pandora's system.<br />
<br />
===Price Increases===<br />
Pandora Music has been required to pay for its music as of 2016 <ref>Kafka, Peter. [http://recode.net/2015/12/16/pandora-will-need-to-pay-more-for-its-songs-but-it-could-have-been-worse/ "Pandora Will Need To Pay More for Its Songs, but It Could Have Been Worse."] N.p., 16 Dec. 2015. Web. </ref>. This could negatively affect consumers paying for the premium rate service. In 2014, Pandora raised its price from $3.99 to $4.99.<ref>Henry, Alan. [http://lifehacker.com/pandora-one-is-raising-price-to-4-99-a-month-ditching-1547041836 "Pandora One Is Raising Price to $4.99 a Month, Ditching Annual Option."] Lifehacker. Lifehacker.com, 19 Mar. 2014. </ref>, in order to pay for music to provide for their listeners. With this increase of price in songs in 2016, the rate may rise again looking to continue their ad-free listening. This would force users to pay the higher rate, or consider a different music streaming service.<br />
<br />
==Competition==<br />
There a several music radio services that compete with Pandora. Some include:<br />
*[[Apple Music]]<br />
*[http://www.xbox.com/en-US/music| Xbox Music]<br />
*[http://8tracks.com/| 8tracks]<br />
*[http://www.deezer.com/soon.php| Deezer]<br />
*[http://fizy.com/| fizy]<br />
*[https://play.google.com/music/listen#/home| Google Play Music]<br />
*[http://grooveshark.com/| Grooveshark]<br />
*[http://hypem.com/popular| The Hype Machine]<br />
*[http://www.iheart.com/ | iHeartRadio]<br />
*[http://www.jango.com/| Jango]<br />
*[http://www.last.fm/| Last.fm]<br />
*[http://libre.fm/| Libre.fm]<br />
*[http://www.live365.com/new/index.live| Live365]<br />
*[http://www.meemix.com/| MeeMix]<br />
*[https://mog.com/| MOG]<br />
*[http://www.musicchoice.com/| Music Choice]<br />
*[http://musicovery.com/| Musicovery]<br />
*[http://www.ourstage.com/| OurStage.com]<br />
*[http://player.radio.com/player/RadioPlayer.php?redirectplayit=1| radio.com]<br />
*[http://www.raditaz.com/| Raditaz]<br />
*[http://www.rhapsody.com/start| Rhapsody]<br />
*[http://www.rdio.com/| Rdio]<br />
*[http://www.siriusxm.com/| SiriusXM Satellite Radio]<br />
*[http://www.slacker.com/| Slacker]<br />
*[http://songza.com/| Songza]<br />
*[http://www.spotify.com/us/video-splash/?utm_source=spotify&utm_medium=web&utm_campaign=start| Spotify]<br />
*[http://stitcher.com/| Stitcher Radio]<br />
*[http://www.whosampled.com/| WhoSampled]<br />
Although each has their own separate method of providing music in a free manner, they all stem off of Pandora's initial advertising in between songs strategy, which means that they all share similar ethical concerns and issues. Spotify has recently become the more popular free radio/music streaming service as it has higher ratings (4 to 3.5 stars, lower membership costs on average, a wider selection of music, and allows for customizable playlists).<ref> [http://www.diffen.com/difference/Pandora_vs_Spotify "Spotify vs Pandora."] Spotify vs Pandora - Difference and Comparison | Diffen. N.p., n.d.</ref><br />
<br />
== See Also ==<br />
{{resource|<br />
*[[8tracks]]<br />
*[[Bandcamp]]<br />
*[[Digital Piracy]]<br />
*[[Digital Rights Management]]<br />
*[[File Sharing]]<br />
*[[iTunes Store]]<br />
*[[Limewire]]<br />
*[[Napster]]<br />
*[[Spotify]]<br />
*[[Wiki:Pandora_Radio|Pandora's Wikipedia page]]<br />
}}<br />
<br />
== References ==<br />
<br />
{{resource|<br />
<references/><br />
}}<br />
<br />
[[Category:Services]]<br />
[[Category: Music]]<br />
[[Category: Media Content]]<br />
[[Category:Websites]]<br />
{|class="wikitable" align="left" border="1"<br />
|style="padding-left: 1em; padding-right: 1em" | ←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[#top|Top of Page]]''<br />
|} {{Section|||#BOTTOM}}</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Cookies&diff=72739Cookies2018-04-24T09:41:29Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#I}}<br />
<br />
'''Cookies''' are text files that are sent from a website and uploaded to a user's browser when they enter the website<ref>Wikipedia: HTTP Cookie http://en.wikipedia.org/wiki/HTTP_cookie</ref>. They allow the process of storing information on websites that require users to log in to be easier and more efficient.<ref name="wac">What Are Cookies Website: Computer Cookies Explained http://www.whatarecookies.com/</ref> and navigating a website.<ref name="HSW">How Stuff Works Website: "How Internet Cookies Work" http://computer.howstuffworks.com/cookie.htm</ref> Cookies identify a user through a name-value pair <ref name="HSW"/>. Cookies are assigned times when they will be discontinued or expired. A user can be notified when a website sets a cookie or they have the option to choose settings that prevent cookies from being implemented. The tracking of cookies poses ethical concerns such as issues with user privacy and the ability for parties using cookies to see what sites the user has previously visited.<ref name="wac"/> <br />
<br />
[[File:Cookie.png|thumb|450px| Example of a cookie]]<br />
<br />
<br />
==Setup of a Cookie==<br />
Cookies are set using a name-value pair. For example, a sample of a cookie used by goto.com:<br />
<br />
UserID A9A3BECE0563982D<br />
<br />
In this case, "UserID" is the "name" part of the name-value pair and "A9A3BECE0563982D " is the "value" <ref name="HSW"/>. A cookie also contains a domain, the website that issued the cookie. The domain allows the browser to send the right cookies as a user browses a site, and prevent websites from viewing cookies of another domain. A path value is also stored, to specify which pages within a website the cookie should be sent.<br />
<br />
==Uses==<br />
<br />
Cookies allow websites to easily maintain a user’s preferences whenever a user logs in or visits that site. Cookies ensure that preference is maintained for the duration of future visits to that site. For example, [[Facebook]] uses cookies to customize its advertisements, products, and features to a particular user, maintaining the user's privacy and other various settings. After the user logs out, Facebook would alert the user if someone tries to get through the same account or violates Facebook's policies <ref>Facebook Website: Cookies, Pixels, and Similar Technologies: "How Cookies Work" http://www.facebook.com/help/cookies/</ref>. Cookies can also be used for browser-based gaming so that games might store a player’s state and allow returns for more play. E-commerce sites use cookies as a "shopping cart". This allows a server to hold on to the items that the user picked out to purchase while continuing to shop for other items. Cookies are a means of distributing some of the burden of information management to the client, the user’s browser, rather than the e-commerce business using costly server-side operations to save all data. If it were not for cookies, servers would have a difficult time retrieving the user's information.<ref name="wac"/><br />
<br />
==Types==<br />
<br />
===Session Cookies=== <br />
Session cookies, also called transient cookies, are temporarily stored on a person's computer while the user is browsing on the site. This allows the user to move from page to page on the site. The session cookie is deleted upon closing the browser and is not saved to a user's hard drive.<br />
<br />
===Persistent Cookies===<br />
Persistent cookies--also called permanent cookies or stored cookies--are not deleted when you leave a website. They allow the site to identify individual users. These cookies allow a site to keep track of and maintain a user's settings or preferences when the user logs out of a website and later logs back in.<ref name="AD">About Cookies Website: Frequently Asked Questions http://www.aboutcookies.org/default.aspx?page=5</ref> The permanent cookie is given a specified time to live (TTL) before it expires, specified by the website issuing the cookie. The cookie remains on a user's browser until it runs out, allowing the user to authenticate themselves with the cookie instead of using their username and password.<br />
<br />
===First Party Cookies===<br />
First party cookies have the same domain that a user is currently browsing. For example, if a user is on [[Amazon.com|Amazon.com]], the cookie will have the same domain name: Amazon.com.<br />
<br />
===Third Party Cookies===<br />
Third party cookies have a different domain than what is in the user's address bar. For example, a user may be on Amazon.com, but the cookie could have a domain name other than Amazon.com. Third Party Cookies are the subject of debate when it comes to cookies and privacy. Browsers such as Firefox, Internet Explorer and Google Chrome allow the use of third-party cookies by default but give users the option to turn third-party cookies off.<ref name="OAT">Open Tracker Website: "Third-Party Cookies vs. First-Party Cookies" http://www.opentracker.net/article/third-party-cookies-vs-first-party-cookies</ref><br />
<br />
===Zombie Cookies=== <br />
<br />
These are cookies that automatically recreate themselves after a user initially destroys them.<ref name="HSW"/> They are stored outside of allocated cookie storage locations and this allows them to persist after a user deletes their cookies. They can be stored either online or on your computer, and because they do not behave like traditional cookies, they can be attached to your browser even if you have chosen not to allow cookies.<ref name=Wikizombie>Wikipedia: Zombie Cookies http://en.wikipedia.org/wiki/Zombie_cookie</ref> This type of cookie was first discovered at UC Berkley when researchers found they could not delete cookies as they kept returning.<ref name=Helium>Helium Website: "Zombie Cookies: What zombie cookies are and how to delete them" http://www.helium.com/items/1905717-zombie-cookies-what-zombie-cookies-are-and-how-to-delete-them</ref><br />
<br />
==Ethical Concerns==<br />
Cookies are not viruses, but there have been concerns about privacy on the internet, especially with Third Party Cookies. Cookies of this sort can have the capability to track what other sites a user browses and allow other sites access to a user's information without the user going on to the site and/or give a user's information to another site without the knowledge and consent of the user. Zombie cookies can track users across different browsers used by the same computer because the cookies are stored in places that are common between browsers.<ref name=Wikizombie/> <br />
<br />
===Privacy===<br />
There is a concern that data about a user can be intercepted as the connection between the browser and the user is not encrypted. This would give them access to sensitive cookie data including anything a user has entered them-self into a website, for example filling out a form online.<ref>Cookie Central Website: Frequently Asked Questions http://www.cookiecentral.com/n_cookie_faq.htm#sens_info</ref><br />
<br />
In regards to privacy, a major ethical concern regarding Third Party Cookies is the ability for them to track a user's frequently visited websites as well as store data and patterns about that user's activity online on various web pages. These functions are often used by advertisers to watch what other sites and products the user is viewing. It is often advised to turn off cookies or only accept cookies from trusted or frequently visited sites. Within these sites, cookies help a user who visits the webpage often by remembering their specific information for the frequently visited website. Zombie cookies are also considered a privacy breach as they can be stored right on your computer and are not removed when a user explicitly expects to do so.<ref name=Helium/><br />
<br />
====Session Hijacking====<br />
Session Hijacking is used to gain access to information or services that are not directly provided. Session attackers duplicate data from a user to mislead to communication receiver to be believed that the attacker is the original user. The data obtained by the attacker is then replicated and authenticated for future use. <ref> “Cookie Hijacking: Learning through Replay Attack Examples !” Cookie Hijacking: Learning through Replay Attack Examples ! | TCS Cyber Security Community, securitycommunity.tcs.com/infosecsoapbox/articles/2017/01/05/cookie-hijacking-learning-through-replay-attack-examples.</ref>Cookies, and sessions are not encrypted and make it easier for online predators to access unauthorized information and services. There are many different ways to hijack a session. Once the predator obtains the cookie information they now have the ability to monitor and trace a user network traffic that could potentially contain sensitive information. <ref> Sivakorn, Suphannee, et al. “The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information.” 2016 IEEE Symposium on Security and Privacy (SP), 2016, doi:10.1109/sp.2016.49. </ref><br />
<br />
===Exploitation===<br />
Users can opt to disable cookies from websites but some functionalities will be disabled. Users are often times not made aware of that a website is collecting cookies. Cookie policies are hidden in the privacy policy of a website. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues." </ref> Cookies collect behavioral data from each site a user visits through tracking. These behaviors and trends curate specific ads as a user browses from site to site. This data can be sold to increase a websites new visitors and sales. This subtle explanation is not made aware by a user. There is no information transparency between websites and its users. Users are unaware of how their data is being collected, stored, and used when visiting new and old websites. Per the Privacy and Electronic Communication Regulations, users have the right to know when information is being stored and how it is being used. It violates a users rights ethically.<ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues."</ref><br />
<br />
<br />
==== Cookie tracking ==== <br />
Cookies that are used to authenticate a user to a website (such as Facebook) can be used to track user behavior on third-party websites. A third party website may contain images that are pulled from Facebook, such as the like button. When the image is downloaded from the browser, Facebook identifies the user's cookie and associates that third party website visit to the user.<ref> Charlotte Rottgen, Like or Dislike - Web Tracking, October 18 2017 [[https://link.springer.com/chapter/10.1007%2F978-3-319-62461-7_9 link.springer.com]]</ref> Facebook is able to identify the user without them clicking or interacting with the page. Simply loading the page allows for data collection. Browser extensions such as Ghostery<ref> Ghostery home page, faster, safer, and smarter browsing [[https://www.ghostery.com/ ghostery.com]]</ref> allow a user to block tracking technologies. <br />
<br />
==== Airline prices ====<br />
Consumers have long accused airline companies of using internet cookies to unfairly price tickets. Robert Weiss, an attorney who published a how airlines exploit cookies to price gouge tickets, found that travel sites used cookies to actually determine their pricing of tickets. Bill McGee, a journalist with USA Today and researcher for Consumers Union, conducted an experiment to demonstrate this phenomenon. McGee searched one major travel site for a ticket from New York City to Sydney, Australia with two different browsers (one was clear of all cookies and one had a history of purchasing flights).<ref name="McGee">Airfare Expert: Do cookies really raise airfares?, http://www.usatoday.com/story/travel/columnist/seaney/2013/04/30/airfare-expert-do-cookies-really-raise-airfares/2121981/, Bill McGee, April 30th, 2013 </ref> McGee ultimately found that the browser with no history offered fares ranging from $1,770 to $1,950 while the browser that had past history had fares listing at $2,116.<ref name="McGee"/> This experiment proved how the use of cookies and other tracking information raises serious ethical issues about privacy and the use of stored information.<ref name="McGee"/><br />
<br />
Consumers have since been adapting to practices like these from major online commerce sites. A common solution is to simply delete your cookie history. Another solution is to use Google Chrome Incognito. Chrome Incognito ensures that your browsing history, cookie storage, and other sensitive information will not be kept. <br />
<br />
Such behavior arises the debate whether or not agencies and companies have the moral right to use user-specific data. Many situations are viewed on a case-by-case basis. For instance, the [[NSA]] has in the past used Google cookies to pinpoint targets to "hack" and surveil.<ref name="NSAdebate">NSA uses Google cookies to pinpoint targets for hacking, The Washington Post, Ashkan Soltani, December 10, 2013</ref> The NSA has found particular use in a Google-specific tracking <br />
technology called the "PREF" cookie, which contains numeric code that allows the NSA to specifically track an individual's browsing data.<ref name="NSAdebate"/><br />
<br />
==== Vulnerabilities ====<br />
Browser cookies give attackers the opportunity to steal private information about one's personal life, sensitive finances, and even identity. In September 2015, The US Computer Emergency Response Team ([[Cert]]) found a loophole in major browsers like Internet Explorer, Mozilla Firefox, and Apple Safari that allows remote attackers to essentially bypass industry-secure HTTPS protocol to reveal confidential data.<ref name="Cert">Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information, The Hacker News, Swati Khandelwar, September 25th, 2015 </ref>. A website that uses cookies can be exploited through common vulnerabilities if the website is not developed with common attacks in mind. An attacker can use common attacks such as Cross Site Scripting and Cookie Poisoning<ref>Surajit Sarma, A study on Common Web Based Hacking and Preventive Measure, July 2017 [[http://ijsrcseit.com/paper/CSEIT172449.pdf ijsrcseit.com]]</ref>. To reduce the threat, the content of cookies can be encrypted. Additionally, evaluating the vulnerabilities through penetration testing can reduce the risk of an attack.<br />
<br />
===Laws Regarding Online Privacy===<br />
<br />
====Europe====<br />
In 2002, the European Union made rules regarding the use of cookies. In particular, "the user is provided information about how this data is used" and the opportunity to deny a website from storing their information. In 2009, the European Union amended this law to include giving "a user advanced written notice that a cookie is being placed on his or her device and describes what the cookie is doing" and "obtains the user’s consent to the placement of the cookie before placing the cookie on the user’s device". On May 26, 2011, the European Union set guidelines for websites about using cookies. In order for a site to keep cookies on a user's hard drive, the website must get the consent of the user and gain acceptance.<ref name="HSW"/><ref name="AD"/><ref name="OAT"/><ref>Open Tracker Website http://www.opentracker.net/</ref><br />
<br />
====United States====<br />
The site of the National Security Agency was caught putting cookies on user's computers that were capable of tracking a user's web activities.<ref>Dummies Website: "Defining and Dealing with Web Cookies http://www.dummies.com/how-to/content/defining-and-dealing-with-web-cookies.html</ref> There currently exist no laws in the U.S. that directly target the use of cookies.<br />
<br />
==See Also==<br />
* [[Data Aggregation Online]]<br />
* [[Data Mining]]<br />
*[[Privacy in the Online Environment]]<br />
*[[Web browsing history]]<br />
<br />
==References==<br />
<references/><br />
[[category: Virtual Environments, Concerns, & Issues]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Cookies&diff=72738Cookies2018-04-24T09:13:47Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#I}}<br />
<br />
'''Cookies''' are text files that are sent from a website and uploaded to a user's browser when they enter the website<ref>Wikipedia: HTTP Cookie http://en.wikipedia.org/wiki/HTTP_cookie</ref>. They allow the process of storing information on websites that require users to login to be easier and more efficient.<ref name="wac">What Are Cookies Website: Computer Cookies Explained http://www.whatarecookies.com/</ref> and navigating a website.<ref name="HSW">How Stuff Works Website: "How Internet Cookies Work" http://computer.howstuffworks.com/cookie.htm</ref> Cookies identify a user through a name-value pair <ref name="HSW"/>. Cookies are assigned times when they will be discontinued or expired. A user can be notified when a website sets a cookie or they have the option to choose settings that prevent cookies from being implemented. The tracking of cookies poses ethical concerns such as issues with user privacy and the ability for parties using cookies to see what sites the user has previously visited.<ref name="wac"/> <br />
<br />
[[File:Cookie.png|thumb|450px| Example of a cookie]]<br />
<br />
<br />
==Setup of a Cookie==<br />
Cookies are set using a name-value pair. For example, a sample of a cookie used by goto.com:<br />
<br />
UserID A9A3BECE0563982D<br />
<br />
In this case, "UserID" is the "name" part of the name-value pair and "A9A3BECE0563982D " is the "value" <ref name="HSW"/>. A cookie also contains a domain, the website that issued the cookie. The domain allows the browser to send the right cookies as a user browses a site, and prevent websites from viewing cookies of another domain. A path value is also stored, to specify which pages within a website the cookie should be sent.<br />
<br />
==Uses==<br />
<br />
Cookies allow websites to easily maintain a user’s preferences whenever a user logs in or visits that site. Cookies ensures that preference are maintained for the duration of future visits to that site. For example, [[Facebook]] uses cookies to customize its advertisements, products, and features to a particular user, maintaining the user's privacy and other various settings. After the user logs out, Facebook would alert the user if someone tries to get through the same account or violates Facebook's policies <ref>Facebook Website: Cookies, Pixels, and Similar Technologies: "How Cookies Work" http://www.facebook.com/help/cookies/</ref>. Cookies can also be used for browser-based gaming so that games might store a player’s state and allow returns for more play. E-commerce sites use cookies as a "shopping cart". This allows a server to hold on to the items that the user picked out to purchase while continuing to shop for other items. Cookies are a means of distributing some of the burden of information management to the client, the user’s browser, rather than the e-commerce business using costly server-side operations to save all data. If it were not for cookies, servers would have a difficult time retrieving the user's information.<ref name="wac"/><br />
<br />
==Types==<br />
<br />
===Session Cookies=== <br />
Session cookies, also called transient cookies, are temporarily stored on a person's computer while the user is browsing on the site. This allows the user to move from page to page on the site. The session cookie is deleted upon closing the browser, and is not saved to a user's hard drive.<br />
<br />
===Persistent Cookies===<br />
Persistent cookies--also called permanent cookies or stored cookies--are not deleted when you leave a website. They allow the site to identify individual users. These cookies allow a site to keep track of and maintain a user's settings or preferences when the user logs out of a website and later logs back in.<ref name="AD">About Cookies Website: Frequently Asked Questions http://www.aboutcookies.org/default.aspx?page=5</ref> The permanent cookie is given a specified time to live (TTL) before it expires, specified by the website issuing the cookie. The cookie remains on a user's browser until it runs out, allowing the user to authenticate themselves with the cookie instead of using their username and password.<br />
<br />
===First Party Cookies===<br />
First party cookies have the same domain that a user is currently browsing. For example, if a user is on [[Amazon.com|Amazon.com]], the cookie will have the same domain name: Amazon.com.<br />
<br />
===Third Party Cookies===<br />
Third party cookies have a different domain than what is in the user's address bar. For example, a user may be on Amazon.com, but the cookie could have a domain name other than Amazon.com. Third Party Cookies are the subject of debate when it comes to cookies and privacy. Browsers such as Firefox, Internet Explorer and Google Chrome allow the use of third-party cookies by default but give users the option to turn third-party cookies off.<ref name="OAT">Open Tracker Website: "Third-Party Cookies vs. First-Party Cookies" http://www.opentracker.net/article/third-party-cookies-vs-first-party-cookies</ref><br />
<br />
===Zombie Cookies=== <br />
<br />
These are cookies that automatically recreate themselves after a user initially destroys them.<ref name="HSW"/> They are stored outside of allocated cookie storage locations and this allows them to persist after a user deletes their cookies. They can be stored either online or on your computer, and because they do not behave like traditional cookies, they can be attached to your browser even if you have chosen not to allow cookies.<ref name=Wikizombie>Wikipedia: Zombie Cookies http://en.wikipedia.org/wiki/Zombie_cookie</ref> This type of cookie was first discovered at UC Berkley when researchers found they could not delete cookies as they kept returning.<ref name=Helium>Helium Website: "Zombie Cookies: What zombie cookies are and how to delete them" http://www.helium.com/items/1905717-zombie-cookies-what-zombie-cookies-are-and-how-to-delete-them</ref><br />
<br />
==Ethical Concerns==<br />
Cookies are not viruses, but there have been concerns about privacy on the internet, especially with Third Party Cookies. Cookies of this sort can have the capability to track what other sites a user browses and allow other sites access to a user's information without the user going on to the site and/or give a user's information to another site without the knowledge and consent of the user. Zombie cookies can track users across different browsers used by the same computer because the cookies are stored in places that are common between browsers.<ref name=Wikizombie/> <br />
<br />
===Privacy===<br />
There is a concern that data about a user can be intercepted as the connection between the browser and the user is not encrypted. This would give them access to sensitive cookie data including anything a user has entered them-self into a website, for example filling out a form online.<ref>Cookie Central Website: Frequently Asked Questions http://www.cookiecentral.com/n_cookie_faq.htm#sens_info</ref><br />
<br />
In regards to privacy, a major ethical concern regarding Third Party Cookies is the ability for them to track a user's frequently visited websites as well as store data and patterns about that user's activity online on various web pages. These functions are often used by advertisers to watch what other sites and products the user is viewing. It is often advised to turn off cookies or only accept cookies from trusted or frequently visited sites. Within these sites, cookies help a user who visits the webpage often by remembering their specific information for the frequently visited website. Zombie cookies are also considered a privacy breach as they can be stored right on your computer and are not removed when a user explicitly expects to do so.<ref name=Helium/><br />
<br />
====Session Hijacking====<br />
<br />
===Exploitation===<br />
Users can opt to disable cookies from websites but some functionalities will be disabled. Users are often times not made aware of that a website is collecting cookies. Cookie policies are hidden in the privacy policy of a website. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues." </ref> Cookies collect behavioral data from each site a user visits through tracking. These behaviors and trends curate specific ads as a user browses from site to site. This data can be sold to increase a websites new visitors and sales. This subtle explanation is not made aware by a user. There is no information transparency between websites and its users. Users are unaware of how their data is being collected, stored, and used when visiting new and old websites. Per the Privacy and Electronic Communication Regulations, users have the right to know when information is being stored and how it is being used. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues."</ref><br />
<br />
<br />
==== Cookie tracking ==== <br />
Cookies that are used to authenticate a user to a website (such as Facebook) can be used to track user behavior on third-party websites. A third party website may contain images that are pulled from Facebook, such as the like button. When the image is downloaded from the browser, Facebook identifies the user's cookie and associates that third party website visit to the user.<ref> Charlotte Rottgen, Like or Dislike - Web Tracking, October 18 2017 [[https://link.springer.com/chapter/10.1007%2F978-3-319-62461-7_9 link.springer.com]]</ref> Facebook is able to identify the user without them clicking or interacting with the page. Simply loading the page allows for data collection. Browser extensions such as Ghostery<ref> Ghostery home page, faster, safer, and smarter browsing [[https://www.ghostery.com/ ghostery.com]]</ref> allow a user to block tracking technologies. <br />
<br />
==== Airline prices ====<br />
Consumers have long accused airline companies of using internet cookies to unfairly price tickets. Robert Weiss, an attorney who published a how airlines exploit cookies to price gouge tickets, found that travel sites used cookies to actually determine their pricing of tickets. Bill McGee, a journalist with USA Today and researcher for Consumers Union, conducted an experiment to demonstrate this phenomenon. McGee searched one major travel site for a ticket from New York City to Sydney, Australia with two different browsers (one was clear of all cookies and one had a history of purchasing flights).<ref name="McGee">Airfare Expert: Do cookies really raise airfares?, http://www.usatoday.com/story/travel/columnist/seaney/2013/04/30/airfare-expert-do-cookies-really-raise-airfares/2121981/, Bill McGee, April 30th, 2013 </ref> McGee ultimately found that the browser with no history offered fares ranging from $1,770 to $1,950 while the browser that had past history had fares listing at $2,116.<ref name="McGee"/> This experiment proved how the use of cookies and other tracking information raises serious ethical issues about privacy and the use of stored information.<ref name="McGee"/><br />
<br />
Consumers have since been adapting to practices like these from major online commerce sites. A common solution is to simply delete your cookie history. Another solution is to use Google Chrome Incognito. Chrome Incognito ensures that your browsing history, cookie storage, and other sensitive information will not be kept. <br />
<br />
Such behavior arises the debate whether or not agencies and companies have the moral right to use user-specific data. Many situations are viewed on a case-by-case basis. For instance, the [[NSA]] has in the past used Google cookies to pinpoint targets to "hack" and surveil.<ref name="NSAdebate">NSA uses Google cookies to pinpoint targets for hacking, The Washington Post, Ashkan Soltani, December 10, 2013</ref> The NSA has found particular use in a Google-specific tracking <br />
technology called the "PREF" cookie, which contains numeric code that allows the NSA to specifically track an individual's browsing data.<ref name="NSAdebate"/><br />
<br />
==== Vulnerabilities ====<br />
Browser cookies give attackers the opportunity to steal private information about one's personal life, sensitive finances, and even identity. In September 2015, The US Computer Emergency Response Team ([[Cert]]) found a loophole in major browsers like Internet Explorer, Mozilla Firefox, and Apple Safari that allows remote attackers to essentially bypass industry-secure HTTPS protocol to reveal confidential data.<ref name="Cert">Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information, The Hacker News, Swati Khandelwar, September 25th, 2015 </ref>. A website that uses cookies can be exploited through common vulnerabilities if the website is not developed with common attacks in mind. An attacker can use common attacks such as Cross Site Scripting and Cookie Poisoning<ref>Surajit Sarma, A study on Common Web Based Hacking and Preventive Measure, July 2017 [[http://ijsrcseit.com/paper/CSEIT172449.pdf ijsrcseit.com]]</ref>. To reduce threat, the content of cookies can be encrypted. Additionally, evaluating the vulnerabilities through penetration testing can reduce the risk of an attack.<br />
<br />
===Laws Regarding Online Privacy===<br />
<br />
====Europe====<br />
In 2002, the European Union made rules regarding the use of cookies. In particular, "the user is provided information about how this data is used" and the opportunity to deny a website from storing their information. In 2009, the European Union amended this law to include giving "a user advanced written notice that a cookie is being placed on his or her device and describes what the cookie is doing" and "obtains the user’s consent to the placement of the cookie before placing the cookie on the user’s device". On May 26, 2011, the European Union set guidelines for websites about using cookies. In order for a site to keep cookies on a user's hard drive, the website must get the consent of the user and gain acceptance.<ref name="HSW"/><ref name="AD"/><ref name="OAT"/><ref>Open Tracker Website http://www.opentracker.net/</ref><br />
<br />
====United States====<br />
The site of the National Security Agency was caught putting cookies on user's computers that were capable of tracking a user's web activities.<ref>Dummies Website: "Defining and Dealing with Web Cookies http://www.dummies.com/how-to/content/defining-and-dealing-with-web-cookies.html</ref> There currently exist no laws in the U.S. that directly target the use of cookies.<br />
<br />
==See Also==<br />
* [[Data Aggregation Online]]<br />
* [[Data Mining]]<br />
*[[Privacy in the Online Environment]]<br />
*[[Web browsing history]]<br />
<br />
==References==<br />
<references/><br />
[[category: Virtual Environments, Concerns, & Issues]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Cookies&diff=72737Cookies2018-04-24T09:12:45Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#I}}<br />
<br />
'''Cookies''' are text files that are sent from a website and uploaded to a user's browser when they enter the website<ref>Wikipedia: HTTP Cookie http://en.wikipedia.org/wiki/HTTP_cookie</ref>. They allow the process of storing information on websites that require users to login to be easier and more efficient.<ref name="wac">What Are Cookies Website: Computer Cookies Explained http://www.whatarecookies.com/</ref> and navigating a website.<ref name="HSW">How Stuff Works Website: "How Internet Cookies Work" http://computer.howstuffworks.com/cookie.htm</ref> Cookies identify a user through a name-value pair <ref name="HSW"/>. Cookies are assigned times when they will be discontinued or expired. A user can be notified when a website sets a cookie or they have the option to choose settings that prevent cookies from being implemented. The tracking of cookies poses ethical concerns such as issues with user privacy and the ability for parties using cookies to see what sites the user has previously visited.<ref name="wac"/> <br />
<br />
[[File:Cookie.png|thumb|450px| Example of a cookie]]<br />
<br />
<br />
==Setup of a Cookie==<br />
Cookies are set using a name-value pair. For example, a sample of a cookie used by goto.com:<br />
<br />
UserID A9A3BECE0563982D<br />
<br />
In this case, "UserID" is the "name" part of the name-value pair and "A9A3BECE0563982D " is the "value" <ref name="HSW"/>. A cookie also contains a domain, the website that issued the cookie. The domain allows the browser to send the right cookies as a user browses a site, and prevent websites from viewing cookies of another domain. A path value is also stored, to specify which pages within a website the cookie should be sent.<br />
<br />
==Uses==<br />
<br />
Cookies allow websites to easily maintain a user’s preferences whenever a user logs in or visits that site. Cookies ensures that preference are maintained for the duration of future visits to that site. For example, [[Facebook]] uses cookies to customize its advertisements, products, and features to a particular user, maintaining the user's privacy and other various settings. After the user logs out, Facebook would alert the user if someone tries to get through the same account or violates Facebook's policies <ref>Facebook Website: Cookies, Pixels, and Similar Technologies: "How Cookies Work" http://www.facebook.com/help/cookies/</ref>. Cookies can also be used for browser-based gaming so that games might store a player’s state and allow returns for more play. E-commerce sites use cookies as a "shopping cart". This allows a server to hold on to the items that the user picked out to purchase while continuing to shop for other items. Cookies are a means of distributing some of the burden of information management to the client, the user’s browser, rather than the e-commerce business using costly server-side operations to save all data. If it were not for cookies, servers would have a difficult time retrieving the user's information.<ref name="wac"/><br />
<br />
==Types==<br />
<br />
===Session Cookies=== <br />
Session cookies, also called transient cookies, are temporarily stored on a person's computer while the user is browsing on the site. This allows the user to move from page to page on the site. The session cookie is deleted upon closing the browser, and is not saved to a user's hard drive.<br />
<br />
===Persistent Cookies===<br />
Persistent cookies--also called permanent cookies or stored cookies--are not deleted when you leave a website. They allow the site to identify individual users. These cookies allow a site to keep track of and maintain a user's settings or preferences when the user logs out of a website and later logs back in.<ref name="AD">About Cookies Website: Frequently Asked Questions http://www.aboutcookies.org/default.aspx?page=5</ref> The permanent cookie is given a specified time to live (TTL) before it expires, specified by the website issuing the cookie. The cookie remains on a user's browser until it runs out, allowing the user to authenticate themselves with the cookie instead of using their username and password.<br />
<br />
===First Party Cookies===<br />
First party cookies have the same domain that a user is currently browsing. For example, if a user is on [[Amazon.com|Amazon.com]], the cookie will have the same domain name: Amazon.com.<br />
<br />
===Third Party Cookies===<br />
Third party cookies have a different domain than what is in the user's address bar. For example, a user may be on Amazon.com, but the cookie could have a domain name other than Amazon.com. Third Party Cookies are the subject of debate when it comes to cookies and privacy. Browsers such as Firefox, Internet Explorer and Google Chrome allow the use of third-party cookies by default but give users the option to turn third-party cookies off.<ref name="OAT">Open Tracker Website: "Third-Party Cookies vs. First-Party Cookies" http://www.opentracker.net/article/third-party-cookies-vs-first-party-cookies</ref><br />
<br />
===Zombie Cookies=== <br />
<br />
These are cookies that automatically recreate themselves after a user initially destroys them.<ref name="HSW"/> They are stored outside of allocated cookie storage locations and this allows them to persist after a user deletes their cookies. They can be stored either online or on your computer, and because they do not behave like traditional cookies, they can be attached to your browser even if you have chosen not to allow cookies.<ref name=Wikizombie>Wikipedia: Zombie Cookies http://en.wikipedia.org/wiki/Zombie_cookie</ref> This type of cookie was first discovered at UC Berkley when researchers found they could not delete cookies as they kept returning.<ref name=Helium>Helium Website: "Zombie Cookies: What zombie cookies are and how to delete them" http://www.helium.com/items/1905717-zombie-cookies-what-zombie-cookies-are-and-how-to-delete-them</ref><br />
<br />
==Ethical Concerns==<br />
Cookies are not viruses, but there have been concerns about privacy on the internet, especially with Third Party Cookies. Cookies of this sort can have the capability to track what other sites a user browses and allow other sites access to a user's information without the user going on to the site and/or give a user's information to another site without the knowledge and consent of the user. Zombie cookies can track users across different browsers used by the same computer because the cookies are stored in places that are common between browsers.<ref name=Wikizombie/> <br />
<br />
===Privacy===<br />
There is a concern that data about a user can be intercepted as the connection between the browser and the user is not encrypted. This would give them access to sensitive cookie data including anything a user has entered them-self into a website, for example filling out a form online.<ref>Cookie Central Website: Frequently Asked Questions http://www.cookiecentral.com/n_cookie_faq.htm#sens_info</ref><br />
<br />
In regards to privacy, a major ethical concern regarding Third Party Cookies is the ability for them to track a user's frequently visited websites as well as store data and patterns about that user's activity online on various web pages. These functions are often used by advertisers to watch what other sites and products the user is viewing. It is often advised to turn off cookies or only accept cookies from trusted or frequently visited sites. Within these sites, cookies help a user who visits the webpage often by remembering their specific information for the frequently visited website. Zombie cookies are also considered a privacy breach as they can be stored right on your computer and are not removed when a user explicitly expects to do so.<ref name=Helium/><br />
<br />
===Exploitation===<br />
Users can opt to disable cookies from websites but some functionalities will be disabled. Users are often times not made aware of that a website is collecting cookies. Cookie policies are hidden in the privacy policy of a website. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues." </ref> Cookies collect behavioral data from each site a user visits through tracking. These behaviors and trends curate specific ads as a user browses from site to site. This data can be sold to increase a websites new visitors and sales. This subtle explanation is not made aware by a user. There is no information transparency between websites and its users. Users are unaware of how their data is being collected, stored, and used when visiting new and old websites. Per the Privacy and Electronic Communication Regulations, users have the right to know when information is being stored and how it is being used. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues."</ref><br />
<br />
<br />
==== Cookie tracking ==== <br />
Cookies that are used to authenticate a user to a website (such as Facebook) can be used to track user behavior on third-party websites. A third party website may contain images that are pulled from Facebook, such as the like button. When the image is downloaded from the browser, Facebook identifies the user's cookie and associates that third party website visit to the user.<ref> Charlotte Rottgen, Like or Dislike - Web Tracking, October 18 2017 [[https://link.springer.com/chapter/10.1007%2F978-3-319-62461-7_9 link.springer.com]]</ref> Facebook is able to identify the user without them clicking or interacting with the page. Simply loading the page allows for data collection. Browser extensions such as Ghostery<ref> Ghostery home page, faster, safer, and smarter browsing [[https://www.ghostery.com/ ghostery.com]]</ref> allow a user to block tracking technologies. <br />
<br />
==== Airline prices ====<br />
Consumers have long accused airline companies of using internet cookies to unfairly price tickets. Robert Weiss, an attorney who published a how airlines exploit cookies to price gouge tickets, found that travel sites used cookies to actually determine their pricing of tickets. Bill McGee, a journalist with USA Today and researcher for Consumers Union, conducted an experiment to demonstrate this phenomenon. McGee searched one major travel site for a ticket from New York City to Sydney, Australia with two different browsers (one was clear of all cookies and one had a history of purchasing flights).<ref name="McGee">Airfare Expert: Do cookies really raise airfares?, http://www.usatoday.com/story/travel/columnist/seaney/2013/04/30/airfare-expert-do-cookies-really-raise-airfares/2121981/, Bill McGee, April 30th, 2013 </ref> McGee ultimately found that the browser with no history offered fares ranging from $1,770 to $1,950 while the browser that had past history had fares listing at $2,116.<ref name="McGee"/> This experiment proved how the use of cookies and other tracking information raises serious ethical issues about privacy and the use of stored information.<ref name="McGee"/><br />
<br />
Consumers have since been adapting to practices like these from major online commerce sites. A common solution is to simply delete your cookie history. Another solution is to use Google Chrome Incognito. Chrome Incognito ensures that your browsing history, cookie storage, and other sensitive information will not be kept. <br />
<br />
Such behavior arises the debate whether or not agencies and companies have the moral right to use user-specific data. Many situations are viewed on a case-by-case basis. For instance, the [[NSA]] has in the past used Google cookies to pinpoint targets to "hack" and surveil.<ref name="NSAdebate">NSA uses Google cookies to pinpoint targets for hacking, The Washington Post, Ashkan Soltani, December 10, 2013</ref> The NSA has found particular use in a Google-specific tracking <br />
technology called the "PREF" cookie, which contains numeric code that allows the NSA to specifically track an individual's browsing data.<ref name="NSAdebate"/><br />
<br />
==== Vulnerabilities ====<br />
Browser cookies give attackers the opportunity to steal private information about one's personal life, sensitive finances, and even identity. In September 2015, The US Computer Emergency Response Team ([[Cert]]) found a loophole in major browsers like Internet Explorer, Mozilla Firefox, and Apple Safari that allows remote attackers to essentially bypass industry-secure HTTPS protocol to reveal confidential data.<ref name="Cert">Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information, The Hacker News, Swati Khandelwar, September 25th, 2015 </ref>. A website that uses cookies can be exploited through common vulnerabilities if the website is not developed with common attacks in mind. An attacker can use common attacks such as Cross Site Scripting and Cookie Poisoning<ref>Surajit Sarma, A study on Common Web Based Hacking and Preventive Measure, July 2017 [[http://ijsrcseit.com/paper/CSEIT172449.pdf ijsrcseit.com]]</ref>. To reduce threat, the content of cookies can be encrypted. Additionally, evaluating the vulnerabilities through penetration testing can reduce the risk of an attack.<br />
<br />
===Laws Regarding Online Privacy===<br />
<br />
====Europe====<br />
In 2002, the European Union made rules regarding the use of cookies. In particular, "the user is provided information about how this data is used" and the opportunity to deny a website from storing their information. In 2009, the European Union amended this law to include giving "a user advanced written notice that a cookie is being placed on his or her device and describes what the cookie is doing" and "obtains the user’s consent to the placement of the cookie before placing the cookie on the user’s device". On May 26, 2011, the European Union set guidelines for websites about using cookies. In order for a site to keep cookies on a user's hard drive, the website must get the consent of the user and gain acceptance.<ref name="HSW"/><ref name="AD"/><ref name="OAT"/><ref>Open Tracker Website http://www.opentracker.net/</ref><br />
<br />
====United States====<br />
The site of the National Security Agency was caught putting cookies on user's computers that were capable of tracking a user's web activities.<ref>Dummies Website: "Defining and Dealing with Web Cookies http://www.dummies.com/how-to/content/defining-and-dealing-with-web-cookies.html</ref> There currently exist no laws in the U.S. that directly target the use of cookies.<br />
<br />
==See Also==<br />
* [[Data Aggregation Online]]<br />
* [[Data Mining]]<br />
*[[Privacy in the Online Environment]]<br />
*[[Web browsing history]]<br />
<br />
==References==<br />
<references/><br />
[[category: Virtual Environments, Concerns, & Issues]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Cookies&diff=72736Cookies2018-04-24T09:10:33Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#I}}<br />
<br />
'''Cookies''' are text files that are sent from a website and uploaded to a user's browser when they enter the website<ref>Wikipedia: HTTP Cookie http://en.wikipedia.org/wiki/HTTP_cookie</ref>. They allow the process of storing information on websites that require users to login to be easier and more efficient.<ref name="wac">What Are Cookies Website: Computer Cookies Explained http://www.whatarecookies.com/</ref> and navigating a website.<ref name="HSW">How Stuff Works Website: "How Internet Cookies Work" http://computer.howstuffworks.com/cookie.htm</ref> Cookies identify a user through a name-value pair <ref name="HSW"/>. Cookies are assigned times when they will be discontinued or expired. A user can be notified when a website sets a cookie or they have the option to choose settings that prevent cookies from being implemented. The tracking of cookies poses ethical concerns such as issues with user privacy and the ability for parties using cookies to see what sites the user has previously visited.<ref name="wac"/> <br />
<br />
[[File:Cookie.png|thumb|450px| Example of a cookie]]<br />
<br />
<br />
==Setup of a Cookie==<br />
Cookies are set using a name-value pair. For example, a sample of a cookie used by goto.com:<br />
<br />
UserID A9A3BECE0563982D<br />
<br />
In this case, "UserID" is the "name" part of the name-value pair and "A9A3BECE0563982D " is the "value" <ref name="HSW"/>. A cookie also contains a domain, the website that issued the cookie. The domain allows the browser to send the right cookies as a user browses a site, and prevent websites from viewing cookies of another domain. A path value is also stored, to specify which pages within a website the cookie should be sent.<br />
<br />
==Uses==<br />
<br />
Cookies allow websites to easily maintain a user’s preferences whenever a user logs in or visits that site. Cookies ensures that preference are maintained for the duration of future visits to that site. For example, [[Facebook]] uses cookies to customize its advertisements, products, and features to a particular user, maintaining the user's privacy and other various settings. After the user logs out, Facebook would alert the user if someone tries to get through the same account or violates Facebook's policies <ref>Facebook Website: Cookies, Pixels, and Similar Technologies: "How Cookies Work" http://www.facebook.com/help/cookies/</ref>. Cookies can also be used for browser-based gaming so that games might store a player’s state and allow returns for more play. E-commerce sites use cookies as a "shopping cart". This allows a server to hold on to the items that the user picked out to purchase while continuing to shop for other items. Cookies are a means of distributing some of the burden of information management to the client, the user’s browser, rather than the e-commerce business using costly server-side operations to save all data. If it were not for cookies, servers would have a difficult time retrieving the user's information.<ref name="wac"/><br />
<br />
==Types==<br />
<br />
===Session Cookies=== <br />
Session cookies, also called transient cookies, are temporarily stored on a person's computer while the user is browsing on the site. This allows the user to move from page to page on the site. The session cookie is deleted upon closing the browser, and is not saved to a user's hard drive.<br />
<br />
===Persistent Cookies===<br />
Persistent cookies--also called permanent cookies or stored cookies--are not deleted when you leave a website. They allow the site to identify individual users. These cookies allow a site to keep track of and maintain a user's settings or preferences when the user logs out of a website and later logs back in.<ref name="AD">About Cookies Website: Frequently Asked Questions http://www.aboutcookies.org/default.aspx?page=5</ref> The permanent cookie is given a specified time to live (TTL) before it expires, specified by the website issuing the cookie. The cookie remains on a user's browser until it runs out, allowing the user to authenticate themselves with the cookie instead of using their username and password.<br />
<br />
===First Party Cookies===<br />
First party cookies have the same domain that a user is currently browsing. For example, if a user is on [[Amazon.com|Amazon.com]], the cookie will have the same domain name: Amazon.com.<br />
<br />
===Third Party Cookies===<br />
Third party cookies have a different domain than what is in the user's address bar. For example, a user may be on Amazon.com, but the cookie could have a domain name other than Amazon.com. Third Party Cookies are the subject of debate when it comes to cookies and privacy. Browsers such as Firefox, Internet Explorer and Google Chrome allow the use of third-party cookies by default but give users the option to turn third-party cookies off.<ref name="OAT">Open Tracker Website: "Third-Party Cookies vs. First-Party Cookies" http://www.opentracker.net/article/third-party-cookies-vs-first-party-cookies</ref><br />
<br />
===Zombie Cookies=== <br />
<br />
These are cookies that automatically recreate themselves after a user initially destroys them.<ref name="HSW"/> They are stored outside of allocated cookie storage locations and this allows them to persist after a user deletes their cookies. They can be stored either online or on your computer, and because they do not behave like traditional cookies, they can be attached to your browser even if you have chosen not to allow cookies.<ref name=Wikizombie>Wikipedia: Zombie Cookies http://en.wikipedia.org/wiki/Zombie_cookie</ref> This type of cookie was first discovered at UC Berkley when researchers found they could not delete cookies as they kept returning.<ref name=Helium>Helium Website: "Zombie Cookies: What zombie cookies are and how to delete them" http://www.helium.com/items/1905717-zombie-cookies-what-zombie-cookies-are-and-how-to-delete-them</ref><br />
<br />
==Ethical Concerns==<br />
Cookies are not viruses, but there have been concerns about privacy on the internet, especially with Third Party Cookies. Cookies of this sort can have the capability to track what other sites a user browses and allow other sites access to a user's information without the user going on to the site and/or give a user's information to another site without the knowledge and consent of the user. Zombie cookies can track users across different browsers used by the same computer because the cookies are stored in places that are common between browsers.<ref name=Wikizombie/> <br />
<br />
===Privacy===<br />
There is a concern that data about a user can be intercepted as the connection between the browser and the user is not encrypted. This would give them access to sensitive cookie data including anything a user has entered them-self into a website, for example filling out a form online.<ref>Cookie Central Website: Frequently Asked Questions http://www.cookiecentral.com/n_cookie_faq.htm#sens_info</ref><br />
<br />
In regards to privacy, a major ethical concern regarding Third Party Cookies is the ability for them to track a user's frequently visited websites as well as store data and patterns about that user's activity online on various web pages. These functions are often used by advertisers to watch what other sites and products the user is viewing. It is often advised to turn off cookies or only accept cookies from trusted or frequently visited sites. Within these sites, cookies help a user who visits the webpage often by remembering their specific information for the frequently visited website. Zombie cookies are also considered a privacy breach as they can be stored right on your computer and are not removed when a user explicitly expects to do so.<ref name=Helium/><br />
<br />
===Exploitation===<br />
Users can opt to disable cookies from websites but some functionalities will be disabled. Users are often times not made aware of that a website is collecting cookies. Cookie policies are hidden in the privacy policy of a website. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues." Cookies collect behavioral data from each site a user visits through tracking. These behaviors and trends curate specific ads as a user browses from site to site. This data can be sold to increase a websites new visitors and sales. This subtle explanation is not made aware by a user. There is no information transparency between websites and its users. Users are unaware of how their data is being collected, stored, and used when visiting new and old websites. Per the Privacy and Electronic Communication Regulations, users have the right to know when information is being stored and how it is being used. <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues."</ref><br />
<br />
<br />
==== Cookie tracking ==== <br />
Cookies that are used to authenticate a user to a website (such as Facebook) can be used to track user behavior on third-party websites. A third party website may contain images that are pulled from Facebook, such as the like button. When the image is downloaded from the browser, Facebook identifies the user's cookie and associates that third party website visit to the user.<ref> Charlotte Rottgen, Like or Dislike - Web Tracking, October 18 2017 [[https://link.springer.com/chapter/10.1007%2F978-3-319-62461-7_9 link.springer.com]]</ref> Facebook is able to identify the user without them clicking or interacting with the page. Simply loading the page allows for data collection. Browser extensions such as Ghostery<ref> Ghostery home page, faster, safer, and smarter browsing [[https://www.ghostery.com/ ghostery.com]]</ref> allow a user to block tracking technologies. <br />
<br />
==== Airline prices ====<br />
Consumers have long accused airline companies of using internet cookies to unfairly price tickets. Robert Weiss, an attorney who published a how airlines exploit cookies to price gouge tickets, found that travel sites used cookies to actually determine their pricing of tickets. Bill McGee, a journalist with USA Today and researcher for Consumers Union, conducted an experiment to demonstrate this phenomenon. McGee searched one major travel site for a ticket from New York City to Sydney, Australia with two different browsers (one was clear of all cookies and one had a history of purchasing flights).<ref name="McGee">Airfare Expert: Do cookies really raise airfares?, http://www.usatoday.com/story/travel/columnist/seaney/2013/04/30/airfare-expert-do-cookies-really-raise-airfares/2121981/, Bill McGee, April 30th, 2013 </ref> McGee ultimately found that the browser with no history offered fares ranging from $1,770 to $1,950 while the browser that had past history had fares listing at $2,116.<ref name="McGee"/> This experiment proved how the use of cookies and other tracking information raises serious ethical issues about privacy and the use of stored information.<ref name="McGee"/><br />
<br />
Consumers have since been adapting to practices like these from major online commerce sites. A common solution is to simply delete your cookie history. Another solution is to use Google Chrome Incognito. Chrome Incognito ensures that your browsing history, cookie storage, and other sensitive information will not be kept. <br />
<br />
Such behavior arises the debate whether or not agencies and companies have the moral right to use user-specific data. Many situations are viewed on a case-by-case basis. For instance, the [[NSA]] has in the past used Google cookies to pinpoint targets to "hack" and surveil.<ref name="NSAdebate">NSA uses Google cookies to pinpoint targets for hacking, The Washington Post, Ashkan Soltani, December 10, 2013</ref> The NSA has found particular use in a Google-specific tracking <br />
technology called the "PREF" cookie, which contains numeric code that allows the NSA to specifically track an individual's browsing data.<ref name="NSAdebate"/><br />
<br />
==== Vulnerabilities ====<br />
Browser cookies give attackers the opportunity to steal private information about one's personal life, sensitive finances, and even identity. In September 2015, The US Computer Emergency Response Team ([[Cert]]) found a loophole in major browsers like Internet Explorer, Mozilla Firefox, and Apple Safari that allows remote attackers to essentially bypass industry-secure HTTPS protocol to reveal confidential data.<ref name="Cert">Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information, The Hacker News, Swati Khandelwar, September 25th, 2015 </ref>. A website that uses cookies can be exploited through common vulnerabilities if the website is not developed with common attacks in mind. An attacker can use common attacks such as Cross Site Scripting and Cookie Poisoning<ref>Surajit Sarma, A study on Common Web Based Hacking and Preventive Measure, July 2017 [[http://ijsrcseit.com/paper/CSEIT172449.pdf ijsrcseit.com]]</ref>. To reduce threat, the content of cookies can be encrypted. Additionally, evaluating the vulnerabilities through penetration testing can reduce the risk of an attack.<br />
<br />
===Laws Regarding Online Privacy===<br />
<br />
====Europe====<br />
In 2002, the European Union made rules regarding the use of cookies. In particular, "the user is provided information about how this data is used" and the opportunity to deny a website from storing their information. In 2009, the European Union amended this law to include giving "a user advanced written notice that a cookie is being placed on his or her device and describes what the cookie is doing" and "obtains the user’s consent to the placement of the cookie before placing the cookie on the user’s device". On May 26, 2011, the European Union set guidelines for websites about using cookies. In order for a site to keep cookies on a user's hard drive, the website must get the consent of the user and gain acceptance.<ref name="HSW"/><ref name="AD"/><ref name="OAT"/><ref>Open Tracker Website http://www.opentracker.net/</ref><br />
<br />
====United States====<br />
The site of the National Security Agency was caught putting cookies on user's computers that were capable of tracking a user's web activities.<ref>Dummies Website: "Defining and Dealing with Web Cookies http://www.dummies.com/how-to/content/defining-and-dealing-with-web-cookies.html</ref> There currently exist no laws in the U.S. that directly target the use of cookies.<br />
<br />
==See Also==<br />
* [[Data Aggregation Online]]<br />
* [[Data Mining]]<br />
*[[Privacy in the Online Environment]]<br />
*[[Web browsing history]]<br />
<br />
==References==<br />
<references/><br />
[[category: Virtual Environments, Concerns, & Issues]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Cookies&diff=72735Cookies2018-04-24T08:53:09Z<p>Hillcm: /* Ethical Concerns */</p>
<hr />
<div>{{nav-Bar|topics#I}}<br />
<br />
'''Cookies''' are text files that are sent from a website and uploaded to a user's browser when they enter the website<ref>Wikipedia: HTTP Cookie http://en.wikipedia.org/wiki/HTTP_cookie</ref>. They allow the process of storing information on websites that require users to login to be easier and more efficient.<ref name="wac">What Are Cookies Website: Computer Cookies Explained http://www.whatarecookies.com/</ref> and navigating a website.<ref name="HSW">How Stuff Works Website: "How Internet Cookies Work" http://computer.howstuffworks.com/cookie.htm</ref> Cookies identify a user through a name-value pair <ref name="HSW"/>. Cookies are assigned times when they will be discontinued or expired. A user can be notified when a website sets a cookie or they have the option to choose settings that prevent cookies from being implemented. The tracking of cookies poses ethical concerns such as issues with user privacy and the ability for parties using cookies to see what sites the user has previously visited.<ref name="wac"/> <br />
<br />
[[File:Cookie.png|thumb|450px| Example of a cookie]]<br />
<br />
<br />
==Setup of a Cookie==<br />
Cookies are set using a name-value pair. For example, a sample of a cookie used by goto.com:<br />
<br />
UserID A9A3BECE0563982D<br />
<br />
In this case, "UserID" is the "name" part of the name-value pair and "A9A3BECE0563982D " is the "value" <ref name="HSW"/>. A cookie also contains a domain, the website that issued the cookie. The domain allows the browser to send the right cookies as a user browses a site, and prevent websites from viewing cookies of another domain. A path value is also stored, to specify which pages within a website the cookie should be sent.<br />
<br />
==Uses==<br />
<br />
Cookies allow websites to easily maintain a user’s preferences whenever a user logs in or visits that site. Cookies ensures that preference are maintained for the duration of future visits to that site. For example, [[Facebook]] uses cookies to customize its advertisements, products, and features to a particular user, maintaining the user's privacy and other various settings. After the user logs out, Facebook would alert the user if someone tries to get through the same account or violates Facebook's policies <ref>Facebook Website: Cookies, Pixels, and Similar Technologies: "How Cookies Work" http://www.facebook.com/help/cookies/</ref>. Cookies can also be used for browser-based gaming so that games might store a player’s state and allow returns for more play. E-commerce sites use cookies as a "shopping cart". This allows a server to hold on to the items that the user picked out to purchase while continuing to shop for other items. Cookies are a means of distributing some of the burden of information management to the client, the user’s browser, rather than the e-commerce business using costly server-side operations to save all data. If it were not for cookies, servers would have a difficult time retrieving the user's information.<ref name="wac"/><br />
<br />
==Types==<br />
<br />
===Session Cookies=== <br />
Session cookies, also called transient cookies, are temporarily stored on a person's computer while the user is browsing on the site. This allows the user to move from page to page on the site. The session cookie is deleted upon closing the browser, and is not saved to a user's hard drive.<br />
<br />
===Persistent Cookies===<br />
Persistent cookies--also called permanent cookies or stored cookies--are not deleted when you leave a website. They allow the site to identify individual users. These cookies allow a site to keep track of and maintain a user's settings or preferences when the user logs out of a website and later logs back in.<ref name="AD">About Cookies Website: Frequently Asked Questions http://www.aboutcookies.org/default.aspx?page=5</ref> The permanent cookie is given a specified time to live (TTL) before it expires, specified by the website issuing the cookie. The cookie remains on a user's browser until it runs out, allowing the user to authenticate themselves with the cookie instead of using their username and password.<br />
<br />
===First Party Cookies===<br />
First party cookies have the same domain that a user is currently browsing. For example, if a user is on [[Amazon.com|Amazon.com]], the cookie will have the same domain name: Amazon.com.<br />
<br />
===Third Party Cookies===<br />
Third party cookies have a different domain than what is in the user's address bar. For example, a user may be on Amazon.com, but the cookie could have a domain name other than Amazon.com. Third Party Cookies are the subject of debate when it comes to cookies and privacy. Browsers such as Firefox, Internet Explorer and Google Chrome allow the use of third-party cookies by default but give users the option to turn third-party cookies off.<ref name="OAT">Open Tracker Website: "Third-Party Cookies vs. First-Party Cookies" http://www.opentracker.net/article/third-party-cookies-vs-first-party-cookies</ref><br />
<br />
===Zombie Cookies=== <br />
<br />
These are cookies that automatically recreate themselves after a user initially destroys them.<ref name="HSW"/> They are stored outside of allocated cookie storage locations and this allows them to persist after a user deletes their cookies. They can be stored either online or on your computer, and because they do not behave like traditional cookies, they can be attached to your browser even if you have chosen not to allow cookies.<ref name=Wikizombie>Wikipedia: Zombie Cookies http://en.wikipedia.org/wiki/Zombie_cookie</ref> This type of cookie was first discovered at UC Berkley when researchers found they could not delete cookies as they kept returning.<ref name=Helium>Helium Website: "Zombie Cookies: What zombie cookies are and how to delete them" http://www.helium.com/items/1905717-zombie-cookies-what-zombie-cookies-are-and-how-to-delete-them</ref><br />
<br />
==Ethical Concerns==<br />
Cookies are not viruses, but there have been concerns of privacy on the internet, especially with Third Party Cookies. Cookies of this sort can have the capability to track what other sites a user browses and allow other sites access to a user's information without the user going on to the site and/or give a user's information to another site without the knowledge and consent of the user. Zombie cookies can track users across different browsers used by the same computer because the cookies are stored in places that are common between browsers.<ref name=Wikizombie/> <br />
Users can opt to disable cookies from websites but some functionalities will be disabled <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues." CoRR abs/1305.2306 (2013): . </ref><br />
<br />
===Privacy===<br />
There is a concern that data about a user can be intercepted as the connection between the browser and the user is not encrypted. This would give them access to sensitive cookie data including anything a user has entered them-self into a website, for example filling out a form online.<ref>Cookie Central Website: Frequently Asked Questions http://www.cookiecentral.com/n_cookie_faq.htm#sens_info</ref><br />
<br />
In regards to privacy, a major ethical concern regarding Third Party Cookies is the ability for them to track a user's frequently visited websites as well as store data and patterns about that user's activity online on various web pages. These functions are often used by advertisers to watch what other sites and products the user is viewing. It is often advised to turn off cookies or only accept cookies from trusted or frequently visited sites. Within these sites, cookies help a user who visits the webpage often by remembering their specific information for the frequently visited website. Zombie cookies are also considered a privacy breach as they can be stored right on your computer and are not removed when a user explicitly expects to do so.<ref name=Helium/><br />
<br />
===Exploitation===<br />
Users can opt to disable cookies from websites but some functionalities will be disabled <ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues."<br />
if the user needs to use that site with cookies, forcibly accept to reap the benefits of the website features. <br />
<br />
<br />
information is opaque. users of websites are not aware of the information that third-party websites are developing by cookie tracking. <br />
<br />
cookies collect personal data from each site you visit to curate ads<br />
<br />
controlling users for marketing cookie <br />
data can be sold from company to company to increase sales and gain new customers<br />
there is no information transparency between third parties and users. Users are unaware of how their information is being collected, stored, and used when visiting websites. <br />
Per the Privacy and Electronic Communication Regulations users have the right to know when infromation is being stored. <br />
<br />
<ref> Jegatheesan, Sowmyan. "Cookies Invading Our Privacy for Marketing Advertising and Security Issues."<br />
<br />
<br />
==== Cookie tracking ==== <br />
Cookies that are used to authenticate a user to a website (such as Facebook) can be used to track user behavior on third-party websites. A third party website may contain images that are pulled from Facebook, such as the like button. When the image is downloaded from the browser, Facebook identifies the user's cookie and associates that third party website visit to the user.<ref> Charlotte Rottgen, Like or Dislike - Web Tracking, October 18 2017 [[https://link.springer.com/chapter/10.1007%2F978-3-319-62461-7_9 link.springer.com]]</ref> Facebook is able to identify the user without them clicking or interacting with the page. Simply loading the page allows for data collection. Browser extensions such as Ghostery<ref> Ghostery home page, faster, safer, and smarter browsing [[https://www.ghostery.com/ ghostery.com]]</ref> allow a user to block tracking technologies. <br />
<br />
==== Airline prices ====<br />
Consumers have long accused airline companies of using internet cookies to unfairly price tickets. Robert Weiss, an attorney who published a how airlines exploit cookies to price gouge tickets, found that travel sites used cookies to actually determine their pricing of tickets. Bill McGee, a journalist with USA Today and researcher for Consumers Union, conducted an experiment to demonstrate this phenomenon. McGee searched one major travel site for a ticket from New York City to Sydney, Australia with two different browsers (one was clear of all cookies and one had a history of purchasing flights).<ref name="McGee">Airfare Expert: Do cookies really raise airfares?, http://www.usatoday.com/story/travel/columnist/seaney/2013/04/30/airfare-expert-do-cookies-really-raise-airfares/2121981/, Bill McGee, April 30th, 2013 </ref> McGee ultimately found that the browser with no history offered fares ranging from $1,770 to $1,950 while the browser that had past history had fares listing at $2,116.<ref name="McGee"/> This experiment proved how the use of cookies and other tracking information raises serious ethical issues about privacy and the use of stored information.<ref name="McGee"/><br />
<br />
Consumers have since been adapting to practices like these from major online commerce sites. A common solution is to simply delete your cookie history. Another solution is to use Google Chrome Incognito. Chrome Incognito ensures that your browsing history, cookie storage, and other sensitive information will not be kept. <br />
<br />
Such behavior arises the debate whether or not agencies and companies have the moral right to use user-specific data. Many situations are viewed on a case-by-case basis. For instance, the [[NSA]] has in the past used Google cookies to pinpoint targets to "hack" and surveil.<ref name="NSAdebate">NSA uses Google cookies to pinpoint targets for hacking, The Washington Post, Ashkan Soltani, December 10, 2013</ref> The NSA has found particular use in a Google-specific tracking <br />
technology called the "PREF" cookie, which contains numeric code that allows the NSA to specifically track an individual's browsing data.<ref name="NSAdebate"/><br />
<br />
==== Vulnerabilities ====<br />
Browser cookies give attackers the opportunity to steal private information about one's personal life, sensitive finances, and even identity. In September 2015, The US Computer Emergency Response Team ([[Cert]]) found a loophole in major browsers like Internet Explorer, Mozilla Firefox, and Apple Safari that allows remote attackers to essentially bypass industry-secure HTTPS protocol to reveal confidential data.<ref name="Cert">Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information, The Hacker News, Swati Khandelwar, September 25th, 2015 </ref>. A website that uses cookies can be exploited through common vulnerabilities if the website is not developed with common attacks in mind. An attacker can use common attacks such as Cross Site Scripting and Cookie Poisoning<ref>Surajit Sarma, A study on Common Web Based Hacking and Preventive Measure, July 2017 [[http://ijsrcseit.com/paper/CSEIT172449.pdf ijsrcseit.com]]</ref>. To reduce threat, the content of cookies can be encrypted. Additionally, evaluating the vulnerabilities through penetration testing can reduce the risk of an attack.<br />
<br />
===Laws Regarding Online Privacy===<br />
<br />
====Europe====<br />
In 2002, the European Union made rules regarding the use of cookies. In particular, "the user is provided information about how this data is used" and the opportunity to deny a website from storing their information. In 2009, the European Union amended this law to include giving "a user advanced written notice that a cookie is being placed on his or her device and describes what the cookie is doing" and "obtains the user’s consent to the placement of the cookie before placing the cookie on the user’s device". On May 26, 2011, the European Union set guidelines for websites about using cookies. In order for a site to keep cookies on a user's hard drive, the website must get the consent of the user and gain acceptance.<ref name="HSW"/><ref name="AD"/><ref name="OAT"/><ref>Open Tracker Website http://www.opentracker.net/</ref><br />
<br />
====United States====<br />
The site of the National Security Agency was caught putting cookies on user's computers that were capable of tracking a user's web activities.<ref>Dummies Website: "Defining and Dealing with Web Cookies http://www.dummies.com/how-to/content/defining-and-dealing-with-web-cookies.html</ref> There currently exist no laws in the U.S. that directly target the use of cookies.<br />
<br />
==See Also==<br />
* [[Data Aggregation Online]]<br />
* [[Data Mining]]<br />
*[[Privacy in the Online Environment]]<br />
*[[Web browsing history]]<br />
<br />
==References==<br />
<references/><br />
[[category: Virtual Environments, Concerns, & Issues]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Cyberwarfare&diff=72734Cyberwarfare2018-04-24T08:23:38Z<p>Hillcm: /* Ethical Implications */</p>
<hr />
<div>{{Box|<br />
{{width|224}}<br />
{{height|24}}<br />
{{multiBox\layout\lightShadow}}<br />
{{padding|5|0|0|10}}<br />
{{box\radius|15}}<br />
|←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[Topics#Topics|Topics]]'' • ↑''[[Topics#Categories|Categories]]''<br />
}}<br />
<br />
<br />
'''Cyberwarfare''' refers to politically motivated hacking to conduct sabotage and espionage.<ref name="cyberwarfare">[[Wikipedia:Cyberwarfare]]</ref> It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. In the United States military, the [[Wikipedia:Air Force Space Command|United States Air Force Space Command]] is responsible for cyber warfare<ref name="cybercommand">Lackland chosen as cyber numbered Air Force headquarters, 15 May 2009 [http://www.af.mil/news/story.asp?id=123149460 www.af.mil]</ref>. Because of the nature of cyber warfare and the extreme difference between it and more 'traditional' forms of warfare the ethics of cyber warfare are very heavily debated.<br />
<br />
[[Image:cyberwar.jpg|thumb|350px|Cyberwarfare is often used for military purposes]]<br />
<br />
==Background Information==<br />
Since it originated, cyberwarfare has been defined in many ways. Some of these definitions include: <br />
<br />
*Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption<br />
<br />
*The fifth domain of warfare<br />
<br />
Cyberwarfare has transformed into a very common way to attack other nations in war time today. The U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare, which has become critical to military operations as land, sea, air, and space." In May 2010, the Pentagon set up its new U.S. Cyber Command, to defend American military networks and attack other countries' systems.<ref>"[[Wikipedia:United_States_Cyber_Command|United States Cyber Command]]." Wikipedia, the Free Encyclopedia. Web. 06 Oct. 2011.</ref> Other nations are quickly following in the United States footsteps to set up national cyber security. <br />
<br />
In 2009, President Obama warned that cyber intruders (specifically China and Russia) have probed the United States electrical grids. Motivations behind a cyber-attack on a nation's electrical grid system would include to disrupt the economy, distract from an actual military attack, and create a national trauma<ref name="cyberwarfare"/>. It has been acknowledged that the nation's system is very vulnerable to attack, and as a result, utility companies are treated as a government agency of sorts. A possible solution to addressing these shortcomings would be to implement appropriate security measures during the installation of new [[Wikipedia:Smart Grid|Smart Grid]] systems, that are occurring nationwide over the next decade.<br />
<br />
==Methods==<br />
===Espionage===<br />
Espionage is the act of obtaining sensitive information from someone for an advantage illegally exploiting said persons or groups, often over the internet. When the opposition finds breaches in the security, they can easily obtain and alter classified information from anywhere on the globe.<br />
<br />
===Sabotage===<br />
The United States military is among the most technologically advanced militaries in the world. Many operations incorporate computers and satellites, normally for some type of communication. These operations are the most vulnerable and susceptible to breaching. Communications can be intercepted by enemies, and enemies can replace messages, with orders of their own. Security breaches have gone far beyond stolen credit card information, and reached the electric power grids, and even the stock market. A recent example of this, was in July 2010, when security experts discovered a malicious software program called Stuxnet that had infiltrated the factory computers of the company Siemens and had spread around the world. The worm was one of the most complex pieces of malicious software to date, exploiting numerous Microsoft security holes, spreading itself in a myriad number of ways, targeting specific hardware control software of a specific brand, and hiding itself insidiously. Around 60% of the infections occurred in Iran, and it has been speculated that not only was Stuxnet the work of a nation state (based on it's complexity) but was intended to disrupt Iran's Bushehr nuclear power plant or the uranium enrichment plant at Natanz.<ref>Stuxnet worm 'targeted high-value Iranian assets', Jonathan Fildes, 23 September 2010 [http://www.bbc.co.uk/news/technology-11388018 www.bbc.co.uk]</ref><br />
<br />
==Motivations==<br />
There are vast motivations for nations to partake in Cyberwarfare, these motivations include: Military advantages, civil advantages, and private advantages.<br />
<br />
===Military===<br />
General Keith B. Alexander, head of the United States Cyber Command (USCYBERCOM), recently told the Senate Armed Services Committee, that computer network warfare is evolving rapidly, and there is a mismatch between our technical capabilities to conduct operations and the governing laws and policies. The USCYBERCOM focuses on attempting to find and neutralize cyberattack to defend military networks. This is important because all military operations are documented on a server. If an outside source has access to these classified, secret, and top secret records, the United States will be in grave danger. Not only are all operations documented, but all command and control systems at military headquarters, air defense networks, and weapons systems require computers to operate. <br />
<br />
===Civil===<br />
Potential targets in internet sabotage include all aspects of the Internet from the deepest parts of the semantic web, to the internet service providers and the varying types of data communication and network equipment. Cyber targets in the civilian sector include: servers, information systems, client servers, communication links, desktops and laptops, electrical grids, and telecommunication systems. This is seen anywhere from stealing credit card information to emailing someone a virus to kill an entire computer, to exploiting a large company.<br />
<br />
===Private===<br />
Computer hacking is no new development, and occurs quite often, with quite ease, yet is often overlooked. According to McAfee's George Kurtz, corporations around the world face millions of cyber attacks a day, most don't gain any media attention, or lead to strong statements by victims.<br />
<br />
==Counterintelligence==<br />
Counterintelligence is defined as measures to identify, penetrate, or neutralize foreign operations that use cyber means, as well as foreign intelligence service efforts that breach security. <br />
<br />
The reality of cyberwarfare has become very apparent, and since, the United States has taken many precautions to protect the nation from attack. <br />
<br />
* 07 April 2009, The Pentagon announced over $100 million in spending in the last 6 months to repair damage from cyber attacks and other computer network problems.<br />
*09 February 2009, the White House announced that it would conduct a review of the nation's cyber security to ensure that the Federal governments cyber security was properly managed.<br />
*2009, cyber war was waged against Estonia, NATO established the Cooperative Cyber Defense Centre of Excellence in order to enhance the organizations cyber defense capability.<br />
<br />
==Reality==<br />
*Cyberattacks on Estonia refers to a series of cyber attacks that began April 27, 2007 and swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country's row with Russia about the relocation of the Bronze Soldier of Tallinn, an elaborate Soviet-era grave marker, as well as war graves in Tallinn.<ref>[[Wikipedia:2007_cyberattacks_on_Estonia|2007 Cyberattacks on Estonia]]</ref><br />
<br />
*Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature and their real identities remain unknown. In early December 2005 the director of the SANS Institute, a security institute in the U.S., said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems." Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.<ref>[[Wikipedia:Titan_Rain|Titan Rain]]</ref><br />
<br />
*Moonlight Maze refers to an incident in which U.S. officials accidentally discovered a pattern of probing of computer systems at The Pentagon, NASA, United States Department of Energy, private universities, and research labs that had begun in March 1998 and had been going on for nearly two years. Sources report that the invaders were systematically looking through tens of thousands of files. Files included maps of military installations, troop configurations and military hardware designs. The United States Department of Defense traced the trail back to a mainframe computer in the former Soviet Union but the sponsor of the attacks is unknown and Russia denies any involvement. As of 2003, Moonlight Maze was still being actively investigated by U.S. intelligence.<ref>[[Wikipedia:Moonlight_Maze|Moonlight Maze]]</ref><br />
<br />
==Ethical Implications==<br />
Any type of warfare contains a wide range of ethical implications. Cyber attacks are extremely difficult to trace and thus the use of online anonymity makes it easier for individuals and/or countries to get away with these attacks. The anonymity in the online world makes cyberattacks and cyberwarfare tougher to detect and deal with. The effects of cyber warfare can be extremely detrimental to a business, country, and economy and therefore from an ethical standpoint are extremely controversial, just like all types of warfare.<br />
<br />
Because of the many downfalls of cyberwarfare attacks, including the lack of reusability, non-permanent aftereffects, and difficulty in targeting, the military can develop a criteria for identifying cyberwarfare in "ethical" situations. The criteria are still hard to judge because the damage from cyberwarfare is compromised data - which is largely hidden from attackers. According to a formula based on an average of seven factors: severity, immediacy, directness, invasiveness, measurability, presumptive legitimacy, and responsibility <ref> Rowe, Neil C "Ethics of Cyberwar Attacks" http://faculty.nps.edu/ncrowe/attackethics.htm </ref>, the hostility of a cyber attack can be determined. However, the level of hostility does not prevent an ensuing "counter-attacking" phase, which follows most cyber attacks and can end up to be very costly.<br />
<br />
Although in situations of challenging ethics, such spamming an oppressive government's website, the damage may not end in exposing its citizens to different kinds of propaganda, but also in corrupting software systems and its connected entities within a network. Despite the apparent "good intentions" of cyber attacks, criminal damage is caused, from any perspective.<br />
<br />
==See Also==<br />
*[[Online Identity Theft]]<br />
*[[Day Zero Attack]]<br />
<br />
== References ==<br />
<br />
<references/><br />
<br />
[[Category: Virtual Environments, Concerns, & Issues]]<br />
[[Category:Malware]]<br />
[[Category:Software]]<br />
[[Category:Information Assurance]]<br />
<br />
{|class="wikitable" align="left" border="1"<br />
|style="padding-left: 1em; padding-right: 1em" | ←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[#top|Top of Page]]''<br />
|} {{Section|||#BOTTOM}}</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Microtransactions&diff=72733Microtransactions2018-04-24T08:19:17Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#B}}<br />
[[File:Micro-global.png|300px|thumb|right|Informatic]] '''Microtransactions''' also commonly known as '''MTX''' is the purchasing of virtual products with real world currencies. Typically these have been implemented as a means of providing developers of free-to-play games with revenue in order to continue development of said games. While they are available on virtually any platform, we have seen a significant increase in their use in the mobile games market. In a study done by Slice Intelligence, we learned that mobile players spent an average of $87 on free-to-play games while PC/Console players spent around $5 on average. Depending on how micro transactions are implemented these games can be called "pay-to-win" in which the purchasing of these virtual currencies are needed to make significant progress in the game, contradicting the whole free-to-play game aspect. Other games provide "loot boxes" in which players purchase these as a means of obtaining more desirable items or features that allow players to save time obtaining these by playing the game. The entire model is based on the idea that providing these virtual currencies will provide more profit than selling the game through a one-time-purchase. <br />
<br />
==Revenue==<br />
<br />
Over the years, gaming giants such as Ubisoft have approached micotransactions with caution, however it has seen a notable shift in earnings for many of its biggest sellers. According to SeekingAlpha, Ubisoft's sales were buoyed by South Park: The Fractured But Whole and Assassin's Creed:Origins, however microtransactions have only shot up even further over the years. Over the last year, microtransactions have grown 1.83x as opposed to the growth of video game sales which was 1.57x. Hinting that microtransactions, the release of additional content to complement existing games is fast becoming a larger market than the market for video game sales itself. <br />
<br />
===PC Gaming===<br />
<br />
Since its inception, revenue from free-to-play PC games has doubled since 2012 according to a recent SuperData report. The report which states EA still "has a ways to go in fully understanding gamer's appetite for micro transactions" shows consumers are spending an increasing large amount on microtransactions. In 2012, PC free-to-play generated $11 billion in revenue and doubled to $22 billion in 2017. It is expected to grow a further $3 billion by 2022. <ref> https://www.gamesindustry.biz/articles/2017-11-24-pc-free-to-play-revenue-has-doubled-since-2012 </ref><br />
<br />
===Mobile Gaming===<br />
<br />
==In-Game Items==<br />
In-game purchases allow for purchasers to purchase in game items that are normally acquired through progressing the game. These microtransactions receive the most criticism due to the fact that it allows for newer players <br />
<br />
==Loot Boxes==<br />
''Main Article: [[Loot Box]]''<br />
<br />
Loot boxes are a form of digital wares sold within an online video game. The purchase of loot boxes are a from of microtransaction. Each box can be used once to receive randomized in-game items that either provide cosmetic changes to the game and player, or provide advantages over other players. Depending on the game, loot boxes may also be referred to as packs, bundles, crates or chests. Loot boxes are typically found only in games with a multiplayer aspect, marketed by the visual feedback from opening a loot box as well as the benefit provided by the items. Due to the randomized nature of loot boxes, they can be seen as a form of digital gambling that brings ethical issues into consideration.<br />
<br />
===Gambling===<br />
Loot boxes contain all of the elements required for traditional gambling. The purchase of a loot box represents a transfer of wealth for a future event. <ref name="ref4"> “IS THE BUYING OF LOOT BOXES IN VIDEO GAMES A FORM OF GAMBLING OR GAMING?” Gaming Law Review, www.liebertpub.com/doi/full/10.1089/glr2.2018.2216. [https://www.liebertpub.com/doi/full/10.1089/glr2.2018.2216]</ref> This future event is randomly decided and set by the developer, allowing them to tune their model to maximize profit. Younger players experience gambling for the first time with loot boxes. The UK Gambling Commission <ref name="ref5"> Loot boxes within video games, www.gamblingcommission.gov.uk/news-action-and-statistics/news/2017/Loot-boxes-within-video-games.aspx. [http://www.gamblingcommission.gov.uk/news-action-and-statistics/news/2017/Loot-boxes-within-video-games.aspx link]</ref> does not consider loot boxes as a form of gambling, as they claim the items received do not have any monetary value. The only difference between loot boxes and real world gambling is the absence of a true monetary payout, however games with real money marketplaces can be used for payout, and many have made thousands of dollars. The design choices are clearly seen to keep the player buying loot boxes. Often right after opening a loot box, a player is prompted to buy additional loot boxes, building upon the addictive model.<br />
<br />
===Transparency===<br />
One of the leading reasons why players consume loot boxes is the perceived rarity of the items they could win. This rarity is almost never expressly relayed to the player. Some games will indicate which items are rare and which are common but often do not have any hard data or statistics on how likely the player is to win the item. Because of this, regulations are starting to spring up in Japan and China. For example, the mobile game Fire Emblem: Heroes communicates to its players that there a 3% chance that players will be able to summon a five-star character. This number then starts to increase after the player uses multiple summons in a single game. Another example is the popular shooter Overwatch. Due to Chinese gambling laws, the Overwatch developers had to disclose that the loot box crates will doll out a legendary item after opening approximately 13 crates. This number is different for each country as some countries have stricter gambling regulations than others. <ref>Alexandra, Heather. “Loot Boxes Are Designed To Exploit Us.” Kotaku, Kotaku.com, 13 Oct. 2017, [kotaku.com/loot-boxes-are-designed-to-exploit-us-1819457592]</ref><br />
<br />
== Ethical Issues ==<br />
The growing popularity of mobile games through the iOS and Android Playstore have allowed many smaller developers the opportunity to put out content either paid or free-to-play. The Micro-transactions model is more appealing for developers because of the fact that it allows a player base to develop before they start selling products when compared to an upfront cost that oftentimes drives away players unless the game has an established reputation already. This brings up the paradox in many mobile games being marketed as free-to-play when in fact a lot of the higher level content is made available to newer players through micro transactions. This in the eyes of players who have advanced through the game by traditional means devalues their accomplishments. Many of these free-to-play games are made to be played passively, in which the player comes back periodically to check on the game. This leaves players with two options for progressing, investing a substantial amount of time or advance through purchasing virtual products that allow for speed ups or higher tier items that would normally require lots of grinding to obtain the higher level items.<br />
<br />
Microtransactions allow for developers to release content without an upfront cost, as long developers abide by moral guidelines they provide an excellent form of revenue to developers that may lack the resources needed to produce a wide scale game. The issue arises when developers lock high-level content behind hundreds of hours of grinding and making it available for purchase in which buying it through microtransactions it more feasible than progressing through the game.<br />
<br />
== Common Terms and Shortcuts ==<br />
* Free-to play game - Games made available to all players without an upfront cost <br />
* Grinding - Repetitive actions that allows for substantial progress in a game<br />
<br />
==See Also==<br />
<br />
<br />
==External Links==<br />
{{resource<br />
|<br />
*[Outside link]<br />
*[Example link]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references /><br />
}}<br />
<br />
<br />
[[Category: Concepts]]<br />
<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72732Social Networking2018-04-24T07:51:29Z<p>Hillcm: /* Identity */</p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by through primary elements of pictures, profile biographies, and privacy settings. Other elements include their subscriber's behaviors, tagged photos, and advertisements that track behavior. <br />
Each site has their own purpose and means of building relationships online. LinkedIn intends to build a professional community online while Facebook intends to build a friendly community online. <br />
Based on the site's environment, it will dictate how and what a user publishes their information to their communities. The user limitation hides pieces of information from themselves from site to site in an effort to present themselves that aligns with the purpose of the platform. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> With these limitations, a user's authentic self will never be achieved online. <ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
===Fake News===<br />
Fake news is the act of spreading false information through social networking sites. <ref> “Definition of ‘Fake News’ - English Dictionary.” Fake News Definition in the Cambridge English Dictionary, dictionary.cambridge.org/us/dictionary/english/fake-news. </ref> These posts by users are often not credible but easily believed due to sharing similar political and other social views. This trend has intensified over the past year with the growth of social media power and influence. Posts can reach thousands to millions of people within hours with confirmation bias. It is easy on each networking site to affirm a user's post by liking or retweeting. <ref> Law, Tom. “Ethics in the News .” Ethical Journalism Network, Ethical Journalism Network, 19 Jan. 2017, ethicaljournalismnetwork.org/resources/publications/ethics-in-the-news/fake-news. </ref><br />
These actions have caused much political turmoil in the 2016 Presidential Election.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72731Social Networking2018-04-24T07:43:10Z<p>Hillcm: </p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. <br />
Each site has their own purpose and means of building relationships online. LinkedIn intends to build a professional community online while Facebook intends to build a friendly community online. <br />
Based on the site's environment, it will dictate how and what a user publishes their information to their communities. With these limitations, a user's authentic self will never be achieved. <ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user. Users have the ability to control the information that they are sharing with their social networking communities. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
===Fake News===<br />
Fake news is the act of spreading false information through social networking sites. <ref> “Definition of ‘Fake News’ - English Dictionary.” Fake News Definition in the Cambridge English Dictionary, dictionary.cambridge.org/us/dictionary/english/fake-news. </ref> These posts by users are often not credible but easily believed due to sharing similar political and other social views. This trend has intensified over the past year with the growth of social media power and influence. Posts can reach thousands to millions of people within hours with confirmation bias. It is easy on each networking site to affirm a user's post by liking or retweeting. <ref> Law, Tom. “Ethics in the News .” Ethical Journalism Network, Ethical Journalism Network, 19 Jan. 2017, ethicaljournalismnetwork.org/resources/publications/ethics-in-the-news/fake-news. </ref><br />
These actions have caused much political turmoil in the 2016 Presidential Election.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72730Social Networking2018-04-24T07:25:22Z<p>Hillcm: </p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. .<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user. Users have the ability to control the information that they are sharing with their social networking communities. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
===Fake News===<br />
Fake news is the act of spreading false information through social networking sites. <ref> “Definition of ‘Fake News’ - English Dictionary.” Fake News Definition in the Cambridge English Dictionary, dictionary.cambridge.org/us/dictionary/english/fake-news. </ref> These posts by users are often not credible but easily believed due to sharing similar political and other social views. This trend has intensified over the past year with the growth of social media power and influence. Posts can reach thousands to millions of people within hours with confirmation bias. It is easy on each networking site to affirm a user's post by liking or retweeting. <ref> Law, Tom. “Ethics in the News .” Ethical Journalism Network, Ethical Journalism Network, 19 Jan. 2017, ethicaljournalismnetwork.org/resources/publications/ethics-in-the-news/fake-news. </ref><br />
These actions have caused much political turmoil in the 2016 Presidential Election.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72729Social Networking2018-04-24T07:23:05Z<p>Hillcm: </p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. Authenticity is an effect and not an essence.<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user.<br />
<br />
<br />
===Fake News===<br />
Fake news is the act of spreading false information through social networking sites. <ref> “Definition of ‘Fake News’ - English Dictionary.” Fake News Definition in the Cambridge English Dictionary, dictionary.cambridge.org/us/dictionary/english/fake-news. </ref> These posts by users are often not credible but easily believed due to sharing similar political and other social views. This trend has intensified over the past year with the growth of social media power and influence. Posts can reach thousands to millions of people within hours with confirmation bias. It is easy on each networking site to affirm a user's post by liking or retweeting. <ref> Law, Tom. “Ethics in the News .” Ethical Journalism Network, Ethical Journalism Network, 19 Jan. 2017, ethicaljournalismnetwork.org/resources/publications/ethics-in-the-news/fake-news. </ref><br />
These actions have caused much political turmoil in the 2016 Presidential Election.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72728Social Networking2018-04-24T07:16:48Z<p>Hillcm: </p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. Authenticity is an effect and not an essence.<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user.<br />
<br />
<br />
===Fake News===<br />
Fake news is the act of spreading false information through social networking sites. <ref> “Definition of ‘Fake News’ - English Dictionary.” Fake News Definition in the Cambridge English Dictionary, dictionary.cambridge.org/us/dictionary/english/fake-news. </ref> These posts by users are often not credible but easily believed due to sharing similar political and other social views. This trend has intensified over the past year with the growth of social media power and influence. Posts can reach thousands to millions of people within hours with confirmation bias <ref> Law, Tom. “Ethics in the News .” Ethical Journalism Network, Ethical Journalism Network, 19 Jan. 2017, ethicaljournalismnetwork.org/resources/publications/ethics-in-the-news/fake-news. </ref><br />
The consequences of having large information sharing sites caused much political turmoil in the 2016 Presidential Election.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72727Social Networking2018-04-24T07:09:21Z<p>Hillcm: /* Fake News */</p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. Authenticity is an effect and not an essence.<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user.<br />
<br />
<br />
===Fake News===<br />
Fake news is the act of spreading false information through social networking sites. <ref> “Definition of ‘Fake News’ - English Dictionary.” Fake News Definition in the Cambridge English Dictionary, dictionary.cambridge.org/us/dictionary/english/fake-news. </ref> These posts by users are often not credible but easily believed due to sharing similar political and other social views. This trend has intensified over the past year with the growth of social media power and influence.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72726Social Networking2018-04-24T06:53:27Z<p>Hillcm: </p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. Authenticity is an effect and not an essence.<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user.<br />
<br />
<br />
===Fake News===<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72725Social Networking2018-04-24T06:52:23Z<p>Hillcm: </p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. The popularity of these services continues to grow today, especially with younger generations of college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters of technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smartphones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition, 54% of those businesses who have used social media for over 3 years have reported an increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect with people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. Authenticity is an effect and not an essence.<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family is good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Social_Networking&diff=72724Social Networking2018-04-24T06:50:45Z<p>Hillcm: /* Privacy */</p>
<hr />
<div>{{box||[[File: Social-networking.jpg|300px|thumb|right|Pictured here are some of the more popular social networking sites. ]]}}<br />
'''Social Networking''' involve online tools that are used for communication, collaboration, and sharing thoughts of individuals among friends. Popularity of these services continues to grow today, especially with younger generations like college students. People can post a large amount of information including personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since online identity can be extremely difficult to distinguish from one's offline identity. Social networking sites also make it easier for bullying to occur, as a user may easily remain anonymous.<br />
<br />
Moral issues include cyber-bullying, fake profiles, and invasion of privacy. <br />
<br />
==History==<br />
Social networking services started in the late 1990s, with a limited number of users. The types of information that could be displayed were small, and most of the services were closed off to a certain demographic of people. Most users were considered early adopters to technology.<br />
<br />
The first reported social networking service was SixDegrees.com. This site allowed users to create profiles, add friends by common interests/groups, and browse through those lists. Many other sites began to pop-up, the next big ones to be Friendster in 2002 and then MySpace in 2003. In 2003 the professional social networking site LinkedIn was launched - to date LinkedIn was the first American social-networking company to list an IPO. However, social-networking took a big leap forward with the launch of [[Facebook]] in 2004. Just a year later Facebook expanded to include high-school students, and in 2006 expanded to include anyone 13 years or older. Facebook then began its domination in social networking service users year after year. The micro-blogging service [[Twitter]] launched in 2006. In 2011 Google launched it's social network Google+ and it became the quickest growing social-network ever and it added over 10 million users in less than a month<ref name="ref>[http://techcrunch.com/2011/07/27/google-minus/ Sophomore Slump? One Month In, Google+ Sees A Traffic Minus]</ref>. Even though some of the earlier sites lost users because of new features offered on new products, the general theme of the services remained the same. Each site allows a user to form a profile, with whatever amount of information they wish, and then to connect with other friends and family members to share thoughts, stories, or any other interests.<br />
<br />
==Today==<br />
Social networking services have become an integral part of everyday life. The sites are popular for sharing images, videos, stories, and other friendly information across groups of friends. They are also useful for staying in touch with friends and family who may live in another state or attend another school. Users find information about current and local events, and many businesses rely on these platforms to advertise their products and services. Facebook, the largest of these networks, claims to have over 800 million active users, with 50% of these users logging in daily. Controversy surrounds the site, as far as privacy issues and other psychological issues that may result from use of social networking services.<br />
<br />
==List of Popular Social Networks==<br />
<br />
{| class="wikitable" style="border:1px solid black;width:100%;"<br />
|-<br />
|style="width: 10%"|Name<br />
|style="width: 40%"|Focus<br />
|style="width: 30%"|Features<br />
|style="width: 10%"|Membership<br />
|style="width: 10%"|Users<br />
|-<br />
|'''Delicious'''<br />
|[[Wikipedia:Delicious (website)|Delicious]] is a social bookmarking site that allows users to save, manage, and share pages on one website. Users are able to view bookmarks saved by other users. All bookmarks that are posted to the site are publicly viewable by default, but users have the option of marking specific bookmarks as private.<ref>[http://en.wikipedia.org/wiki/Delicious_(website) Delicious (website)]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Facebook]]'''<br />
|[[Facebook|Facebook]] is the most popular social networking site available to Internet users today. Users must have an email address to join the site. Each user has a profile that can be made as private or public as desired and can include as much information as the user would like. On one's profile, photo albums, tagged photos, timeline posts, and status updates are viewable to others.<br />
|[[File:Screen_shot_2012-12-11_at_11.49.42_PM.png|250px|thumb|left| An email address, rather than a username, is required to sign up.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''Flickr'''<br />
|[[Wikipedia:Flickr|Flickr]] is an online community that enables users to post images and videos for both their own personal use and to share with other users. Flickr offers its users both free and pro accounts. Free accounts let users upload up to 300 MB of photos while a pro account has unlimited space.<ref>[http://en.wikipedia.org/wiki/Flickr Flickr]</ref><br />
|<br />
|<br />
|<br />
|-<br />
|'''Friendster'''<br />
|[[Wikipedia:Friendster|Friendster]] is considered the original social networking site. Each user has a profile and is able to share content and communicate with other Friendster users. <br />
|<br />
|<br />
|<br />
|-<br />
|'''Foursquare'''<br />
|[[Foursquare|Foursquare]] is a location-based networking site that allows users to "check-in" at various locations. The site is operated from a mobile device and has GPS tracking software, so the user has access to a list of nearby locations whenever they wish to "check-in." With each "check-in," users receive points and eventually reach different levels.<br />
|<br />
|<br />
|<br />
|-<br />
|'''Google+'''<br />
|[[Wikipedia:Google+|Google+]] is a an embedded social networking site within Google in which users much have a gmail account to create a profile. What makes Google+ unique is the site's ability to let users organize other Google+ users into "circle" or "hangouts." For instance, a user may have a "Friends", "Family", and "Coworkers" circle.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[LinkedIn]]'''<br />
|[[LinkedIn|LinkedIn]] is a professional networking site in which users create profiles that include their education and work experience information. Users are able to directly message other users. One feature that differs from other social networking sites is the ability for users to see who has viewed their profile. Users are able to easily share their resumes with education, work experience, and community involvement, with other users or companies. LinkedIn allows users to cultivate a network with other working professionals to increase job opportunities in the future. By allowing users within the LinkedIn community to see who has viewed specific online profiles, the goal is to increase and foster relationships that potentially lead to new employment opportunities.<br />
|[[File:Screen_shot_2012-12-11_at_11.41.20_PM.png|250px|thumb|left| The feature enabling users to see who has viewed their profile]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''MySpace'''<br />
|[[Myspace|Myspace]] is a social networking site in which users create profiles with pictures and customized backgrounds and music that plays whenever the user's page is refreshed. Users had the ability to write on other Myspace users' profiles and directly message them as well.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[StumbleUpon]]'''<br />
|[[Wikipedia:StumbleUpon|StumbleUpon]] recommends pages to users based on their previously noted interests in specific topics and categories. In the upper left-hand corner of the site, there is a button "Stumble!" which users press and the site randomly generates pages based on their interests. Users can rate pages as "like" or "unlike" which will further let the site know which pages to generate for the user.<br />
|[[File:Screen shot 2012-12-05 at 1.35.49 PM.png|250px|thumb|left| The "Stumble!" button in the upper left-hand corner]]<br />
|<br />
|<br />
|-<br />
|'''[[Tumblr]]'''<br />
|[[Tumblr|Tumblr]] is a blogging website where users post images and blog posts. Users can follow each other, as well as reblog content from another blog. Users generally blog and reblog pictures, although text is also common.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Twitter]]'''<br />
|[[Twitter|Twitter]] is a social networking site in which users post status updates in 140 characters or fewer. Users "follow" one another and the "tweets" of those accounts that one follows appears on their Twitter newsfeed. Twitter allows users to cultivate online relationships that can lead to a number of different opportunities, such as: increased contact, or closeness, with celebrities; faster breaking news sources; or the ability to connect with friends and colleagues in an online environment.<br />
|[[File:Screen shot 2012-12-11 at 11.44.22 PM.png|250px|thumb|left| The box users view when composing a tweet; the "140" in the bottom right corner notifies users how many characters they have left to use.]]<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Pinterest]]'''<br />
|[[Pinterest|Pinterest]] lets users create their personalized profile with "boards" specific to their interests. The user can add sites to each board, either by personal searching or by "pinning" another user's sites to their own.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Instagram]]'''<br />
|[[Instagram|Instagram]] is the newest social networking site available to users with smart phones only. Instagram allows users to edit and post photos with a caption, tag other Instagram users, and geotag one's location. Users can follow one another, "like" photos, and leave comments on photos.<br />
|<br />
|<br />
|<br />
|-<br />
|'''[[Snapchat]]'''<br />
|[[Snapchat|Snapchat]] is an app for iOS devices and Android devices where users can create images or videos that have a maximum duration of 10 seconds. Once the image or video is opened by another user, it disappears. Users can also add these images and videos to their "Snapchat Stories", where the post will be on the app under their name for 24 hours.<br />
|<br />
|<br />
|<br />
|}<br />
<br />
==Use of Social Networks by Businesses==<br />
Businesses have placed an emphasis on social networks as a means of marketing. The three most popular social networks for business use are [[Facebook]], [[Twitter]], and Google+. Social network marketing has grown extremely rapidly over the past decade, so much that 94% of all businesses that have a marketing department use social media. In addition 54% of those businesses who have used social media for over 3 years have have reported a increase in sales of that time period.<ref>[http://www.forbes.com/sites/moneywisewomen/2012/08/08/the-developing-role-of-social-media-in-the-modern-business-world/ The Developing Role of Social Media in the Modern Business World]</ref><br />
<br />
==Ethical Issues==<br />
Many people argue social networking and other [[Web 2.0]] websites create many ethical concerns. Suddenly, information that was intended to be private, or shared among an intimate group of people is accessible by complete strangers. Individual rights issues can potentially arise as far as what content is viewable and by who is difficult for individuals to control. Our idea of what is right to share and who to share it with becomes hazy in an online, social environment. Issues such as [[Cyberbullying|cyber-bullying]], online stalking, [[Troll|trolling]] and other malicious behavior is hard to monitor within social networking services, as it is easy for a user to create a false profile or impersonate another person. There is not confirmation of identity, unless there is a connection to the real world. Ethics surrounding the common good of all people is also an issue. Some user might join the site to create a group and connect to people for good causes, such as cancer awareness or to promote good qualities. It would be just as easy for a user to create a group for such bad actions as well. Questions of honesty and accountability are present in these services as well. Because little information is needed to confirm the accuracy on a user's profile, a person can get away with saying anything about themselves in order to connect to the people they want to be associated with. [[Anonymous Behavior in Virtual Environments|Anonymity]] is a large problem underlying all of these issues because there is a lack of accountability in social networks.<br />
<br />
<br />
<br />
===Privacy===<br />
With a large network of people on the web, social networking services find their privacy policies under attack on a daily basis. Bits of data are being collected, collated, distributed, and stored constantly. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref> Based on Shoemakers theories, the efforts of privacy of information can be controlled and limited. Control theory allows the user themselves to oversee the amount of information that they would like to share their social networking community. Users now assume responsibility for the information that is being posted. Limitation theory allows users to limit and restrict to whom is receiving their information. <ref> Shoemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol. 12, no. 1, 2009, pp. 3–15., doi:10.1007/s10676-009-9186-x. </ref><br />
<br />
College students are finding they have to limit their privacy settings for their online pictures. Companies are starting to evaluate candidates through Facebook, LinkedIn, and other social networking sites. In order to maintain a level of privacy for their pictures containing alcohol and other deterrents that would steer potential employers away from hiring candidates, students and professionals are learning how to manage privacy settings on their social networking accounts quickly. The dilemma of accountability for managing privacy settings on social networking sites then falls on both the creators and members of the network. Social networking sites are implementing more innovative privacy settings daily in order to allow users to control the visibility of their profiles.<br />
<br />
===Cyber-bullying===<br />
A variety of methods of [[Cyberbullying|cyberbullying]] exist and are employed in social networks online. This is becoming a problematic issue, as many lawsuits and even life-threatening issues have arisen from cyberbullying via social media. There have been many instances where people have taken their own lives, or the lives of others, because of comments or threats made online.<ref>Huffington Post article on recent cyberbullying suicides [http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html http://www.huffingtonpost.com/2012/10/29/erin-gallagher-irish-teen-commits-suicide-battle-cyberbullying_n_2040850.html]</ref><br />
<br />
An example of an extreme effect of cyberbullying can be found in the case of [[Suicide of Amanda Todd|Amanda Todd]]. Amanda Todd was a 15-year-old Canadian girl who was bullied over the Internet for her decision to bare her breasts on camera to a stranger. This bullying took such a toll on her that she ultimately ended up taking her own life. This caused criticism of Canada's bullying legislation, and many people began to insist that cyberbullying be criminalized. <ref>Miceli, Karen. [http://www.insidehalton.com/opinion-story/4328944-canada-long-overdue-for-legislation-criminalizing-cyberbullying/|Canada long overdue for legislation criminalizing cyberbullying]. 22 January 2014. Retrieved 13 April 2017.</ref><br />
<br />
===Fake Profiles===<br />
Fake profiles have become prevalent as more prominent figures enter the social networking sphere. Across different platforms, there are many different levels of impersonation or fake accounts because the different sites require different levels of user authentication. Twitter is a hotbed for fake accounts, as there is little to no defense against it. In fact, many fake, or parody, accounts are some of the most popular out there. For example, there is a fake [[Wikipedia:Will Ferrell|Will Ferrell]] account that has accumulated nearly two million followers.<ref>@FillWerrell [https://twitter.com/FillWerrell https://twitter.com/FillWerrell]</ref> Many sites only require an e-mail address, which does not have to be an active one. Many people create fake or temporary addresses solely for the purpose of signing up for social media accounts. Twitter does verify certain high-profile accounts, but not all of them, so it is sometimes difficult to tell which accounts are authentic, and which are not.<br />
<br />
On other sites, it is more difficult to create such accounts. One example is Google+. On Google+, users are required to register under their own names and cannot change that. Twitter also enacts methods that "verify" persons they feel have a high risk of impersonation.<ref>https://support.twitter.com/articles/119135-faqs-about-verified-accounts</ref> This makes it so that there is a distinction between those fake profiles and real ones.<br />
<br />
Many people create fake accounts with negative intentions. This is not true for everyone, however, as many fake accounts serve to entertain (such as the aforementioned Will Ferrell account). These accounts might be made with good intentions, but could still offend others, regardless of the creator's intent.<br />
<br />
===Identity===<br />
Online identity represents a form of "truth" about a user. Online identities are manufactured by users and are constantly updated so that users continue to portray their best selves. Since users choose what to present on their profiles, users' "authentic" selves are not portrayed online. Authenticity is an effect and not an essence.<ref> Smith and Watson, “Virtually Me: A Toolbox about Online Self-Presentation,” 2012. </ref><br />
<br />
On social media, users identities consist of primary and secondary elements. Primary elements of a user's identities are pictures uploaded, profile biographies, and privacy settings. Secondary elements are the responses of a user's followers, tagged photos, and advertisements that are tailored to a user.<br />
<br />
==Future==<br />
The future of social networking services remains to be unknown, but new innovations are being created on a daily basis as far as how big the social networks can get. Connecting to friends, employers, and family are good, but joining together for awareness on hot topic issues, put beside a page where friends can decide where they want to eat together just hints at the enormity the services can have. There will no doubt be more of these services created, especially to individualized interests, as people try to keep parts of their lives separate.<br />
<br />
===The Stop Online Privacy Act===<br />
Under the SOPA, the entire future of social networking websites could be at risk. Due to the high volume of constant user submission (especially on the larger-scale websites like Facebook), it is theoretically possible that if just one of those submissions contained a link to an illegal download the entire website could be shut down<ref>[http://www.dailydot.com/politics/reddit-alexis-ohanian-stop-online-piracy-act/ Reddit cofounder pleads case against the Stop Online Piracy Act]</ref>. The implications for the economy of a website like Facebook, which hosts thousands of third-party apps and is quickly becoming the primary mode of distribution for many businesses who operate through social network-mediated apps, being shut down could be disastrous.<br />
<br />
==See Also==<br />
*[[Experience Project]]<br />
*[[Facebook]]<br />
*[[Privacy in Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Twitter]]<br />
*[[Online Dating]]<br />
*[[Spotify]]<br />
<br />
==External Links==<br />
*[http://www.facebook.com Facebook's Homepage]<br />
*[http://twitter.com/ Twitter's Homepage]<br />
<br />
==References==<br />
<references/><br />
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html<br />
http://www.facebook.com/press/info.php?statistics<br />
http://edu.udym.com/ethics-of-social-networking/<br />
http://www.scu.edu/ethics/publications/submitted/social-networking.html<br />
<br />
[[Category:Social Networking]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Amazon_Alexa_(Amazon_Echo)&diff=72286Amazon Alexa (Amazon Echo)2018-04-22T05:57:01Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics##}}<br><br />
{{SoftwareInfoBox<br />
|NAME=''Amazon Alexa''<br />
|HEIGHT=470<br />
|TYPE=Amazon Product<br />
|LOGO=amazonecho.png<br />
|SCREENIMAGE=Echo.jpg<br />
|CAPTION="Amazon Echo Product"<br />
|IMAGEURL=https://www.amazon.com/echo-superbowl-commercial/b?ie=UTF8&node=9818047011<br />
|PRODUCT=Product<br />
|LAUNCH=2014<br />
|STATUS=Active<br />
|PLATFORM=Amazon<br />
|DEVELOPER=Amazon.com<br />
|SITEURL=https://www.amazon.com/gp/product/B01E6AO69U?tag=googhydr-20&hvadid=178729965770&hvpos=1t1&hvexid=&hvnetw=g&hvrand=6737795059246184133&hvpone=&hvptwo=&hvqmt=e&hvdev=c&ref=pd_sl_4azkexk7h5_e<br />
|URLTEXT= Amazon Echo Website<br />
}}<br />
The '''Alexa Voice System''', commonly known as '''Alexa''', is an intelligent personal assistant developed by American e-commerce company [[Wikipedia: Amazon (company) |Amazon]]. The service is currently available on a variety of platforms, including phones, smart televisions, and dedicated hardware such as [https://en.wikipedia.org/wiki/Amazon_Echo Amazon Echo]. Alexa is similar in function to other "virtual assistants" such as [https://www.apple.com/ios/siri/ Siri], [https://assistant.google.com/#?modal_active=none Google Assistant], and [https://www.microsoft.com/en-us/windows/cortana Microsoft Cortana] and can respond to voice commands by performing a wide array of tasks, from playing music to relaying the news to controlling smart home devices. <ref>Crist, Ry [https://www.cnet.com/how-to/amazon-alexa-device-compatibility-how-tos-and-much-more/ "Amazon Alexa: Device Compatibility, How-Tos and Much More"] '''CNET''', (8 April 2016. Retrieved on 19 February 2017.) </ref> The Amazon Echo, and similar devices such as [https://store.google.com/us/product/google_home?hl=en-US Google Home],<ref> Bohn, Dieter [http://www.theverge.com/2016/5/18/11688376/google-home-speaker-announced-virtual-assistant-io-2016/ "Google Home: a speaker to finally take on the Amazon Echo"] '''The Verge''', (18 May 2016. Retrieved on 11 April 2017.)</ref> are among the first "smart home" assistants. The central idea of the smart home is to bring the [https://en.wikipedia.org/wiki/Internet_of_things Internet of Things] into everyday, household objects in order to collect useful data and automate simple tasks. Alexa is intended to provide users with an easy-to-use interface for this data. Currently, to activate Alexa, the user must say a wake-word often being "Echo" or "Okay, Alexa" to issue a command or request.<br />
<br />
==History==<br />
Development for Amazon Echo began in 2010, when Amazon executive Dave Limp believed the idea of Amazon Echo hinted at a new, unique experience but would require many iterations to be successful in the [[Smart Home]] market. The biggest challenge faced by Amazon in the construction of the Amazon Echo was that there were no other products which served the same purpose on the market to serve as a model upon which the company could improve. Therefore, engineers and product designers at Amazon were tasked with inventing a unique and novel product. Other voice control systems, such as Apple's Siri, Google's [[Wikipedia: Google Voice Search|Voice Search]], and Microsoft's [[Wikipedia: Kinect|Kinect]], were fundamentally different from Amazon's product as Amazon Echo did not have a screen for users to see voice input.<br />
<br />
For Amazon Echo to be competitive on the market, Amazon needed to create a built-in virtual assistant, Alexa, that was capable of responding to queries quickly and conversationally. After years of unsuccessful iterations, Amazon Alexa was able to thoughtfully respond to voice queries in less than 1.5 seconds on average, far faster than the response times of other competing voice-recognition technologies of the time. Amazon Echo was noted as one of the biggest hits in Amazon's history and made Amazon Alexa widely popular in November of 2014. <ref> Gallagher, Billy. [http://www.businessinsider.com/the-inside-story-of-how-amazon-created-echo-2016-4 "The inside story of how Amazon created Echo, the next billion-dollar business no one saw coming"] (2 April 2016. Retrieved on 7 April 2017.) </ref><br />
<br />
==Functions==<br />
Amazon Echo is signaled when the wake word, set to default by the name "Alexa", is spoken. Users can program their own wake word to be used with the device if they do not like "Alexa". Once signaled by the wake word, Alexa responds via the speakers in an Alexa-compatible device, such as Amazon Echo. The audio that is spoken after the wake word, including less than a second of audio that came before the wake word, is sent to the Cloud. The ring on top of the Echo speaker will turn light blue to let the user know that the audio is being streamed to the Cloud. <ref> Amazon [https://www.amazon.com/gp/help/customer/display.html?nodeId=201602230 "Alexa and Alexa Device FAQs"] '''Amazon''', (Retrieved 26 February 2017.)</ref>.<br />
<br />
===Audio===<br />
The Amazon Alexa and Echo are compatible with the music services [[Wikipedia:Amazon Music|Amazon Music]], [[Wikipedia: Spotify|Spotify]], [[Wikipedia: Pandora Radio|Pandora]], [[Wikipedia: TuneIn |TuneIn]], and [[Wikipedia:iHeartRadio|iHeartRadio]]. The Amazon Echo provides 360 degree omni-directional audio and contains a 2.5 inch woofer and 2.0 inch tweeter for deep bass and crisp high notes.<ref>https://www.amazon.com/echo-superbowl-commercial/b?ie=UTF8&node=9818047011</ref> Amazon Alexa can hear you from across the room with far-field voice recognition and can even hear you while music is playing from the Amazon Echo. <ref> "Amazon Echo - Black." Amazon Echo - Amazon Official Site - Alexa-Enabled. N.p., n.d. Web. 17 Apr. 2017. <https://www.amazon.com/dp/B00X4WHP5E?th=1> </ref><br />
<br />
===Alexa Skills===<br />
Amazon Alexa also supports Alexa skills, which are voice-driven capabilities that are designed to enhance the functionality of Alexa and Amazon devices. Alexa can answer questions that users ask her and refer them to outside resources. Alexa can also play music, set timers and alarms, create shopping lists, give news and sports updates, check calendars, get traffic information, order Amazon products, and perform many other functions to help a user. <ref> Amazon [https://www.amazon.com/gp/help/customer/display.html?nodeId=201848700 "Enable Alexa Skills"] '''Amazon''', (Retrieved 26 February 2017.)</ref> Moreover, Alexa offers a wide array of features as the technology is constantly being updated. On April 15, 2015, Amazon launched a home automation feature that allows Alexa to interact with devices, including WeMo, Philips Hue, Samsung SmartThings, Nest, ecobee, and others <ref>http://www.connectedly.com/amazon-echo-owners-can-now-control-wemo-and-philips-hue-devices-their-voice</ref> As of November 2016, Alexa Appstore had over 5,000 functions available compared to 1,000 functions in June 2016.<br />
<br />
===Alexa Skills Kit===<br />
<br />
[[File:AlexaDeveloperKitFlowDiagram.png|thumb|500px|right|Flow diagram from Amazon's Alexa Skills Kit developer documentation site. <ref name="amazonASKDevDocs">"Alexa Skills Kit Developer Documentation." Alexa Skills Kit. Amazon, n.d. Web. <https://developer.amazon.com/alexa-skills-kit>.</ref>]]<br />
The '''Alexa Skills Kit''' ('''ASK''') is a collection of self-service APIs, tools, documentation, and code samples that enable designers and developers to create and publish skills to Alexa. ASK is free to use and Alexa skill developers can apply to receive promotional credits towards developing further Alexa skills. These skills can be downloaded for free via the Alexa app and tutorials are available for developers to learn how to build voice experiences for their new or existing applications.<ref>Alexa Skills Kit (ASK) https://developer.amazon.com/alexa-skills-kit</ref> A new addition to the Alexa Skills Kit is the Smart Home Skill API that provides a set of built-in smart home capabilities. Examples of these capabilities include the ability to control lights, fans, switches, thermostats, garage doors, sprinklers, locks, and more. <ref> "Amazon Echo - Black." Amazon Echo - Amazon Official Site - Alexa-Enabled. N.p., n.d. Web. 17 Apr. 2017. <https://www.amazon.com/dp/B00X4WHP5E?th=1>. </ref> The Smart Home Skill API taps into Amazon's standardized language model, relieving developers from building the voice interaction model for their smart home skill.<ref>Smart Home Skills API https://developer.amazon.com/alexa/smart-home</ref><br />
<br />
==Alexa Prize==<br />
Voice communication and everyday language remain one of the ultimate challenges for artificial intelligence. Amazon continues to promote the advancement of natural language processing. On September 29, 2016, the Alexa Prize was announced, a $2.5 million university competition to advance conversational AI through voice. Teams of university students from around the world are amongst eligible applicants. Up to ten team of students will be selected to receive a $100,000 research grant as a stipend. The competition started on November 14, 2016 and runs until November 2017, with an award ceremony in Las Vegas, Nevada. The first competition is to create a socialbot, "an Alexa skill that converses coherently and engagingly with humans on popular topics for 20 minutes." Teams are expected to create a socialbot capable of maintaining a high-quality, fun conversation with humans. <ref>Alexa Prize https://developer.amazon.com/blogs/post/Tx221UQAWNUXON3/Are-you-up-to-the-Challenge-Announcing-the-Alexa-Prize-2-5-Million-to-Advance-Co</ref><br />
<br/><br />
The combined University of Washington Electrical Engineering team and Paul G. Allen School of Computer Science & Engineering team were the first place winners of the Alexa Prize and earned $500,000 for their efforts. Together, they developed a chat bot with the intent to immerse the user in a dynamic, realistic conversation and fundamentally alter the way users interface with various devices around the home and office. Their chatbot, called Sounding Board, stood out because it was designed to interpret human conversation in different ways such attitude, context, and personality. The University of Washington team supplemented this by letting Sounding Board gather information in real time and then make connections so that it would not only have interesting topics to talk about, they would also be relevant and up to date. <ref>UW students win Amazon’s inaugural Alexa Prize for most engaging socialbot https://www.washington.edu/news/2017/11/28/uw-students-win-amazons-inaugural-alexa-prize-for-most-engaging-and-conversant-socialbot</ref><br />
<br />
==Alexa Fund==<br />
To further advance voice technologies, Amazon announced a $100 million venture capital fund on June 25, 2015 to help spur innovation in three specific areas. The three areas are:<br />
* Hardware products for inside the home, outside the home, or on-the-go<br />
* Skills that deliver new abilities to Alexa-endabled devices<br />
* New contributions to the science behind voice technology<br />
To target these different segments, the Alexa Fund consists of three parts. This is to target start ups and entrepreneurs at the different stages of innovation. <ref>How Amazon’s Startup Fund Is Betting On An Alexa-Everywhere Future https://www.fastcompany.com/40476530/amazon-alexa-fund-startups-accelerator</ref> The three parts are:<br />
* A University fellowship program<br />
* A Venture Capital investment arm<br />
* An accelerator or incubator<br />
Such a fund would allow Amazon to further their current products and allow greater development in the real of text to speech, automatic speech recognition, artificial intelligence.<br />
<br />
==Ethical Implications==<br />
Many ethical concerns regarding privacy and security have been raised about Alexa and other voice response systems. One of the greatest concerns is the device's ability to hear and record you when it is not actively being used as well as the government's and independent hackers' ability to use these features to gather information on users.<br />
<br />
===Security===<br />
Alexa has the ability to communicate with third-party services through the Alexa Skills Kit interface, in order to carry out commands. The many possible functions which Alexa can be programmed to serve is cause for concern for many. For instance, a third-party service which interfaces with an Amazon Echo could retain records of its users' Alexa usage -- complete with personally identifying information ([[PII]]) -- and subsequently make use of that data without the end-users' knowledge. <br />
<br />
Many are also concerned that malicious actors could hack into the system in order to eavesdrop and listen in on users in their homes. Amazon counters this concern by stating that the data that is sent from the device to Amazon's servers is encrypted, helping secure user information from potential hackers, <ref> Moynihan, Tim. [https://www.wired.com/2016/12/alexa-and-google-record-your-voice/ "Alexa and Google Home Record What You Say. But What Happens to That Data?"] '''Wired''', (5 December 2016. Retrieved 19 February 2017.) </ref> but this explanation does not account for software and firmware modifications on the Echo device itself. Instead, such precautions only preserve the security of the voice data in transit between the Echo and Alexa-powering Amazon servers.<br />
<br />
Another privacy and security controversy was sparked when a San Diego area television station reported the story of a 6-year-old who accidentally ordered a $170 dollhouse and cookies via Alexa. The reporters presenting the story used the Echo's wake word frequently, mimicking the orders placed by the six year old, in the segment which prompted viewers' Alexa devices all over San Diego to attempt to place Amazon orders. <ref> http://www.foxnews.com/tech/2017/01/06/tv-news-report-prompts-viewers-amazon-echo-devices-to-order-unwanted-dollhouses.html</ref> <br />
<br />
Many Echo owners feel that the devices may intrude on their privacy due to its constant listening. This was the case when Alexa ordered a dollhouse by request of a unbeknownst 6-year-old. However, others feel that the parents and owners of Alexa are responsible for understanding the capabilities of the technology they are buying and are responsible for setting security measures accordingly. Alexa and the Echo do offer options that can prevent unnecessary purchases and owners can change the wake word if they so desire. While it is Amazon's duty to ensure security measures on its products, consumers are also responsible for understanding the technology they are buying.<br />
<br />
===Privacy/Surveillance===<br />
Amazon Alexa is activated when the wake word is spoken. However, the Amazon Echo is always listening. It is programmed to listen for the word "Alexa", so is constantly analyzing every sentence to make sure that specific word is not mentioned. This can be a problem, especially when television is involves. Alexa may respond to its own television ads playing on the user's television because it is unable to distinguish sound on the television and an actual person. In both cases, the information that follows the wake word is sent to Amazon's cloud servers to determine the correct response, but also to learn more about the user. <ref>Clauser, Grant [http://thewirecutter.com/reviews/what-is-alexa-what-is-the-amazon-echo-and-should-you-get-one/ "What is Alexa? What is the Amazon Echo, And Should You Get One?"] (11 February 2017. Retrieved 19 February 2017.) </ref> While Alexa is always listening, it's only sending the content that is said after it's signaled. After all, Alexa's role is a voice assistant and a huge part of how voice assistants function is to record your voice. This voice information is used to better personalize the user's experience; however, it is unclear how long this data is stored in Amazon's servers. <ref> Massoglia, Anna. [https://lawyerist.com/139741/amazon-echo-useful-risky-lawyers/ "Amazon Echo is Both Useful and Risky for Lawyers"] (3 January 2017. Retrieved 19 February 2017.)</ref> <br />
<br />
Users have expressed their concerns about how much Alexa listens to them, and whether that affects user privacy or could potentially be used by law enforcement. <ref> Bradley, Tony. [https://www.forbes.com/sites/tonybradley/2017/01/05/alexa-is-listening-but-amazon-values-privacy-and-gives-you-control/#73f781f87ee6 "How Amazon Echo Users Can Control Privacy"] (5 January 2017. Retrieved 26 February 2017.)</ref> A spokesperson from Amazon stated that there must be a proper legal warrant for Amazon to give out customer information. Users can also delete voice recordings that were sent to Alexa by going to the History tab in the Settings section of their Alexa App; however, Amazon warns that by deleting voice recordings and interactions made with Alexa, the user experience may be affected. Another option given to users is to change their wake word to something more unique that won't be mistakenly said or picked up on. <ref> Moyniham, Tim. [https://www.wired.com/2017/02/keep-amazon-echo-google-home-responding-tv/ "How to Keep Amazon Echo and Google Home From Responding to Your TV"] (2 February 2017. Retrieved 10 April, 2017.)</ref> Users have also expressed concerns that Amazon Alexa is listening to private conversations and storing the information. Amazon has responded to these concerns by stating that it only stores information after the "wake word" has been stated. <ref> "Amazon announces Echo, a $199 voice-driven home assistant". Ars Technica. Retrieved 17 November 2014.</ref> Sometimes in common conversation, the wake work can be stated thus activating Alexa to listen to the rest of the conversation regardless if turning on the device was intentional or not. This causes confusion for some customers who accidentally turn Alexa on by unknowingly using a wake word, and raises security concerns on how often Alexa is storing what they are saying. <br />
<br />
It is worthy to note that when asked, "Are you connected to the CIA?" Alexa shuts off and ignores the question. This was videotaped and placed on Youtube. The situation was awfully creepy and the web took it by storm. This aided in the privacy, security, and surveillance issues that stem from Amazon Alexa. Many individuals are worried that their personal information is being relayed to others without their knowledge. Additionally, they are worried that their conversations are being recorded and potentially being sent to the CIA. This is a common concern as many individuals are worried that Alexa is constantly listening to conversations. The Amazon Alexa streams audio to the cloud where conversations are stored. A user's conversations are only deleted from the cloud when they choose to delete it however, it might degrade their future experiences. <ref> https://www.nytimes.com/2017/12/08/business/echo-alexa-amazon.html</ref> Due to these features, Alexa recordings have turned into a controversial topic where customers are questioning the ethical implications behind a device that stores their personal conversations. <br />
<br />
====Perfect Voyeurism?====<br />
The capability of the device to consistently listen to users in anticipation of the wake word relates to Tony Doyle's notion of "Perfect Voyeurism". Doyle defines Perfect Voyeurism as "covert watching or listening that is neither discovered nor publicized" and Doyle argues that there is nothing wrong with this type of voyeurism <ref name= Doyle>Doyle, Tony. Privacy and Perfect Voyeurism. (27. May. 2009. Retrieved 23.April. 2017.) </ref> Prior to cases such as the dollhouse incident, this perfect voyeurism could be maintained. As users were likely oblivious to the device's eavesdropping capabilities. However now that the users have become aware of the listening, they have taken measures to avoid the devices persistent listening. As users are able to turn off the microphone on Amazon Echo or Echo Dot by pressing a button on the top of the device. This is consistent with Doyle's sentiment as he states "I maintain that, if detected or publicized, voyeurism can do grave harm" <ref name="Doyle"/>. This harm is evident in the users desire to avoid it. As the avoidance reduces functionality, when this button turns red, the device will not respond to its wake word or the action button until the microphone is turned on again. <ref> "How Can We Help?"[https://edfenergyuk.custhelp.com/app/answers/detail/a_id/1365/~/can-i-turn-off-the-microphone-on-amazon-echo%3F "Can I Turn off the Microphone on Amazon Echo?"] N.p., 28 Sept. 2016. Web. 13 Apr. 2017. .</ref> Given the exposed surveillance, users will have to choose between the ease of functionality and reduced privacy associated with the surveillance. <br />
<br />
====Benton County, Arkansas Homicide Investigation====<br />
Amazon Alexa is concerning in regards to access and ownership of its voice recordings and audio files, especially when it comes to criminal investigation. During a homicide investigation in Benton County, Arkansas in 2015, investigators filed a warrant to collect the audio recordings from an Amazon Alexa Echo device in the home of the homicide suspect<ref> Hautala, Laura [https://www.cnet.com/news/amazon-echo-alexa-privacy-first-amendment-constitution-protects-court-filing/ "Amazon Argues Constitution Protects Your Chats With Alexa"] '''CNET''', (23 February 2017. Retrieved 26 February 2017.)</ref>. Amazon refused to provide the recordings for investigators out of respect to privacy and constitutional rights under the First Amendment. In a February 2017 court filing, Amazon pushed back against the warrant saying that they would not provide the recordings and transcripts "unless the Court finds that the State has met its heightened burden for compelled production of such materials"<ref>Mukunyadzi, Tafi [http://bigstory.ap.org/article/5528f11f9ba04488a347d5ca029d948b/amazon-resists-request-echo-info-arkansas-slaying] "AP", (22 February 2017. Retrieved 13 April 2017.)</ref>. In March of 2017 James Bates' lawyer, Kathleen Zellner, filed a motion stating that Bates would provide the recordings voluntarily. <ref name="givesrecordings">McLaughlin, Eliott C. [http://www.cnn.com/2017/03/07/tech/amazon-echo-alexa-bentonville-arkansas-murder-case/ "Suspect OKs Amazon to hand over Echo recordings in murder case"] '''CNN''' (7 March 2017. Retrieved 23 April 2017.)</ref> Authorities have asked for evidence from technological devices before, but this may have been the first time a smart speaker has been the holder of information, according to Joel Reidenberg, the Founding Academic Director of the Fordham University's Center on on Law and Information Policy. <ref name="givesrecordings"/> While this is the first case Joel Reidenberg has seen involving smart speakers, he noted that he was not surprised. <ref name="givesrecordings"/><br />
<br />
====Becoming A Robotic Society====<br />
Without producing an individual idea, “Alexa” agrees with any opinion one may have. Who wouldn’t choose that over approaching another human with their own point of view? Due to “Alexa’s” ease of availability and lack of opinion, a human would now prefer to direct questions at a machine. Without opinion and debate, there is no personal identity: we become a robotic society. The technology-run world we are headed towards does not seem filled with companionship or respect for others. Amazon intended for “Alexa” to be more of a shopping assistant, but she has become owners’ friend. Due to “her” lack of curated opinions, though, “Alexa” is bossed around like a machine, not at all treated like a friend<ref> Can Amazon's Alexa Be Your Friend? http://digg.com/2017/amazon-alexa-is-not-your-friend</ref>. Interpersonal skills are not required anymore. Issues arise in human to human interactions due to impolite or disrespectful body language and tone of voice. Only 7% of any message is conveyed through words; the other 93 percent is nonverbal communication<ref>How Much of Communication is Really Nonverbal? http://www.nonverbalgroup.com/2011/08/how-much-of-communication-is-really-nonverbal</ref>. “Alexa” cannot read these nonverbal cues, so humans speak to her in disrespectful ways without consequences. Taking feeling and emotion out of the equation, humans all become the same, like “Alexa.”<br />
<br />
====Google Home vs. Burger King====<br />
Although not an ethical implication of Amazon's Alexa specifically, a similar product to it, Google Home, was recently embroiled in controversy surrounding the privacy of its users. A fast food giant, Burger King, recently ran an advertisement that featured a man saying "OK Google, what is the Whoper burger?"<ref name = "bk">Google Disabled Burger King's Ad Hijacking Google Home, but BK Got Around That Too</ref> The "OK Google" at the beginning of the statement serves as an initialization of the device, which responded to the question by rattling off the Whoper burger's Wikipedia entry, much to the irritation of Google Home owners that had tuned into the television at the time of the advertisement. When people caught wind of what Burger King was attempting to do, the Wikipedia entry for "Whoper burger" was changed to include other, inappropriate statements, such as listing one of the ingredients as cyanide<ref name = "bk"></ref>. The advertisement sparked outrage and conversation about the ethics of this particular advertising maneuver by Burger King; similar to Google Home, the Amazon Alexa can be summoned and initialized by a fairly simple command: "Alexa.<ref>Martin, T. (2017, April 17). The complete list of Alexa commands so far. Retrieved April 23, 2017, from https://www.cnet.com/how-to/amazon-echo-the-complete-list-of-alexa-commands/</ref>"<br />
<br />
As discussed in ''Protecting privacy in public? Surveillance technologies and the value of public places'' by Jason W. Patton, highly intelligent surveillance technologies that are accessible in public spaces are "detrimental to the social, cultural, and civic importance of these places."<ref name = "patton">Patton, Jason W. (2000). “Protecting privacy in public? Surveillance technologies and the value of public spaces.” Ethics and Information Technology 2: 181-187. [7 pages]</ref> While Amazon Alexa and Google Home are not products in public places, the Burger King advertisement demonstrates that they have the ability to transform a private home into a public space when tapped by a third-party. Patton eventually comes to the conclusion that the protection of public spaces is just as important as individual privacies; people relish the value that a free environment can provide them and it is critical to avoid infringing on that freedom.<ref name = "patton"></ref> Amazon Alexa and Google Home are not surveillance technologies, but their easy manipulation in not only private spaces, but potentially public ones, can infringe both individual rights and safety in public spaces.<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Amazon.com]]<br />
*[[Artificial Intelligence and Technology]]<br />
*[[Information Security]]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
<br />
[[Category: Privacy]]<br />
[[Category: Hardware]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Pinterest&diff=72285Pinterest2018-04-22T05:45:19Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#A}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=430<br />
|NAME=Pinterest<br />
|LOGO=pin2.png<br />
|SCREENIMAGE=pin3.png<br />
|CAPTION=Pinterest Official Logo<br />
|IMAGEURL=http://pinterest.com<br />
|TEXT=<br />
|PLATFORM=Cloud Service, iOS, Android <br />
|PRODUCT=Social Networking Service<br />
|TYPE=Visual discovery and collection<br />
|SITEURL=http://pinterest.com<br />
|URLTEXT=www.pinterest.com<br />
|STATUS=Active<br />
|LAUNCH=2010 <ref>About Pinterest: Press https://about.pinterest.com/en/press/press</ref><br />
|AVAILABLE LANGUAGES= English, Français, Nederlands, Português(Europeu), Deutsch, Português (Brasil), Español (América), Español (España)<br />
<br />
}}<br />
{{initial|P}}'''interest''' is a website and mobile application that allows users to visually share and save ideas. Pinterest was founded as a [[Wikipedia: Silicon Valley|Silicon Valley]] start-up <ref>Forbes: Ben Silbermann, Evan Sharp, Co-founders, Pinterest http://www.forbes.com/pictures/mmj45ifhm/ben-silbermann-evan-sharp-co-founder-pinterest-2928/</ref> by [[Wikipedia: Ben_Silbermann|Ben Silbermann]], [[Wikipedia: Paul_Sciarra|Paul Sciarra]], and [[Wikipedia: Evan_Sharp|Evan Sharp]] in 2009. <ref>Founders: A group of eclectic collectors http://www.nypost.com/p/news/business/founders_group_of_eclectic_collecters_c6OCu79GSiJIs3oynbwliN/</ref> With over 150 million active users (as of October of 2016)<ref>Pinterest Has Reached a User Milestone http://www.businessinsider.com/pinterest-has-reached-a-user-milestone-2016-10</ref>, the platform is essentially a virtual vision board, where users can create and manage image collections of photos and other media content, often referred to as "pins." These pins are aggregated into groups called boards, which are determined by the individual users based on their various interests. Pinterest allows its users to both encounter and share photos and ideas of their favorite styles, tastes, and interests. As a medium, it relies heavily on interaction between users. Pinterest serves as a platform to find inspiration and motivation; suggested pins are given by a Pinterest algorithm and determined by user behavior and searches. Ethical concerns of copyright and censorship have been prevalent due to the sharing of information between users. <br />
<br />
<br />
<br />
<br />
==History==<br />
[[File:imgres.jpeg|300px|right|thumb|Pinterest Co-founders: Paul Sciarra, Ben Silbermann, and Evan Sharp]]<br />
Paul Sciarra left his job at a venture capital firm, [[Wikipedia:Radius_Ventures|Radius Ventures]], in New York, in 2008 and Ben Silbermann left his job at customer service and data entry at [[Google]] in California. The college friends came together to brainstorm ideas for a startup. The two started developing a product called Tote, a catalog for one's phone but struggled to gain necessary funds after the recession. After securing investors, the entrepreneurs turned away from Tote and began to work on Pinterest, going on to recruit Evan Sharp as another co-founder. <ref> Pinterest CEO: Here's How We Became The Web's Next Big Thing http://www.businessinsider.com/pinterest-founding-story-2012-4?op=1</ref> The three did not find immediate success with it. Pinterest’s initial slow growth concerned the trio, but only a year later, the site skyrocketed to success as it experienced wild growth. Created out of a childhood love to collect things from insects to stamps, Pinterest was built to let people continue their collections online.<ref>Meet Ben Silbermann<br />
http://articles.businessinsider.com/2012-03-13/tech/31158694_1_google-experience-products-silbermann-said/</ref><br />
<br />
Pinterest began as an exclusive website requiring an invitation to join and participate. In August 2012, Pinterest opened up to the public allowing anyone to sign up for an account and be a user.<ref>Pinterest Finally Ditches Invitations, Now Lets Anyone Sign Up http://techcrunch.com/2012/08/08/pinterest-open/</ref><br />
<br />
===Growth===<br />
Pinterest became the fastest site ever to break through the 10 million unique visitor mark when data reported from [[Wikipedia:comScore|comScore]] indicated the site had 11.7 million unique U.S. visitors on a monthly basis.<ref>Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Everhttp://techcrunch.com/2012/02/07/pinterest-monthly-uniques/</ref> Since early 2012, the number of Pinterest users to visit the site daily has increased 145%.<ref>This Is Everything You Need To Know About Pinterest http://techcrunch.com/2012/03/14/this-is-everything-you-need-to-know-about-pinterest-infographic/</ref> According to new data from social media marketer, Tamba, the number of daily unique visitors of Pinterest doubled in just two months from 2 million in January 2012 to 4 million in March 2012.<ref>Infographic Interest in Pinterest http://www.tamba.co.uk/blog/infographic-interest-in-pinterest-tamba/</ref><br />
<br />
According to the [[Wikipedia:Los_Angeles_Times|Los Angeles Times]], July of 2012 astonishingly saw over 29 million weekly visits to the site, over a 2183% increase from the previous year of 1.27 million weekly visits.<ref>Pinterest, Instagram continues meteoric growth http://articles.latimes.com/2012/aug/29/business/la-fi-tn-pinterest-instagram-growth-20120829/ </ref> As of now with over 150 million users, Pinterest's CEO attributes this growth not to better algorithms or engineering, but to the work of better marketing. Silbermann still believes what was needed and is still needed is simply a better way to distribute Pinterest to users. When Pinterest first started, Silbermann went to many local boutiques and other events and found people who had similar interests to his own and promoted Pinterest as a tool for an idea and interest sharing. <ref>The Secret Behind Pinterest’s Growth Was Marketing, Not Engineering, Says CEO Ben Silbermann http://allthingsd.com/20121020/the-secret-behind-pinterests-growth-was-marketing-not-engineering-says-ceo-ben-silbermann/</ref><br />
<br />
===User Statistics===<br />
Pinterest caters to a variety of social groups. The average Pinterest users are ages 25 to 54, but a total of 67% of users fall under the age 40. <ref name="omni"/> 40% of men who use the application are new users and contribute to 7% of the pins. Users predominately reside in the Midwest. <ref name="omni"/>. In 2012, 80% of United States users were women. It maintained this trend; by 2017 81% of users were female. <ref name="omni">Pinterest by the Numbers: Stats, Demographics & Fun Facts https://www.omnicoreagency.com/pinterest-statistics/</ref><br />
<br />
===Funding===<br />
Since the launch of Pinterest, the company has raised millions from investors, including [[Wikipedia:Andreessen_Horowitz|Andreessen Horowitz]], [[Wikipedia:Firstmark_Capital|FirstMark Capital]], and [[Wikipedia: Bessemer_Venture_Partners|Bessemer Venture Partners]].<ref> Pinterest pins down $100M in new funding http://news.cnet.com/8301-1023_3-57435953-93/pinterest-pins-down-$100m-in-new-funding/</ref> In October 2011, venture capital firm Andreesen Horowitz gave Pinterest $27 million in funding that increased the value the social media site to $200 million.<ref>Pinterest valued at more than $1bn after raising $100m funding http://www.guardian.co.uk/technology/2012/may/17/pinterest-valued-at-more-than-1bn/</ref> Pinterest received a $100 million investment from a group led by Japanese online retailer [[Wikipedia:Rakuten|Rakuten Inc.]], further increasing the value of the company, bringing its total value to $1.5 billion.<ref>Pinterest Funding http://www.huffingtonpost.com/2012/05/17/pinterest-funding_n_1523253.html/</ref><br />
<br />
===Privacy===<br />
Users can browse any other users’ pins. Pinterest allows users to comment on or pin anything they desire, and visibility is not limited. On October 17, 2012, Pinterest announced that they had responded to the request for more privacy controls by adding new features. Now there is a flag icon on each user’s profile allowing anyone to block or report that individual’s profile for nudity or pornography, attacks on a group or individual, graphic violence, hateful speech or symbols, actively promotes self-harm, spam, or other. The block feature prevents users from the ability to follow each other’s boards and to repin and comment on one another’s pins. The report user feature alerts the Community team to evaluate the account that has been reported. <ref>Announcing Blocking & More Controls http://blog.pinterest.com/post/33785122869/announcing-blocking-more-controls/</ref><br />
<br />
[[File:pinterestpage.png|350px|thumb|right|Sample of a page]]<br />
[[File:pinterestcategory.png|200px|thumb|right|Categories]]<br />
<br />
==Features==<br />
'''Pins''': A pin is an image or video uploaded by the user, or taken from a website. A description can be added to the pin to explain or comment on if the purpose of the pin is not explicitly stated. If a pin is from an outside website, users can visit the website by clicking on the link located below each pin. There is direct user-to-user interaction when others “pin” the user's pictures. These pins allow the picture to appear on their own board. Pins represent the actual sharing of ideas between users. Without them, users would not be able to keep track of all of the ideas that they are fond of throughout the Pinterest application. Pinning is essentially a bookmark tool. It allows the user to refer back to a post at any given time and are organized and distributed throughout boards labeled by the user.<br />
<br />
'''Boards''': Pinboards are unique to each user’s page. Users can create and freely name as many boards as they desire by clicking the “Add” button on the navigation bar located on the top right. A pinboard categorizes pins properly onto specific boards in order to help others find the user's pins. These boards can be followed by anyone (depending on settings) and it enables the user to find their ideas in an efficient way when they actually are thinking about “trying” them. Within each board is an organized feed of all of the pins. It is easiest to process the pins if they are systematized and relatable to each other. The board can help the user specify the exact pin they would like to “try” out. <br />
<br />
*'''Secret Boards:''' From late 2012, Pinterest introduced a new type of board which users can mark as 'Secret.' Secret boards are not shared with followers and cannot be accessed by the public.<br />
<br />
'''Comments''': Users can add comments to pins on their own boards or others' boards, even if the users do not follow on another. A comment can be added by clicking on the pin and typing in the comment box, or by hovering over the picture of the pin and clicking on "Comment." Comments also allow for positive feedback and provide a user with motivation to finding even more pins that can relate themselves to other Pinterest users. <br />
<br />
'''Follow''': Users can follow other Pinterest members. There is the option to follow all of their boards or individual boards that the user likes. Friends on Pinterest can be easily found through connecting to [[Facebook]], [[Twitter]], and email accounts.<br />
<br />
'''Bookmarklet''': This “Pin it” button can be added to a browser’s bookmarks bar. Pinterest suggests this feature be installed due to its result of simplistic and easy pinning. Users can click on "bookmark" to open a menu from which one can pick the image they want to pin.<br />
<br />
'''Notifications''': Pinterest came out with new features that allow the user to filter their feed even more than they do. Pinterest interrupts a user’s day with posts that appeal to them. This creates constant connectivity between the Pinterest community and allows for the users to constantly be thinking of the pins they want to try. <br />
<br />
''Filters''': The people behind Pinterest created an algorithm that could filter a search query.<br />
<br />
''Buying/Selling''': Not only can users buy and sell products directly on Pinterest, but Pinterest is also used as an advertising website for items that are sold in stores. As a result, users may seek them out in the stores after pinning the product on Pinterest.<br />
<br />
''Trending''': The trending page allows the user to gain exposure to topics that they may not be following, but that majority of users are interested in at the moment. However, even though the posts below the most popular hashtags are trending, they are still filtered based on the user’s preferences. Posts become trending especially when users “try” them and love them. While this doesn’t necessarily maximize the number of new ideas being “tried” in the real world, it creates a desire for users to share their experiences of trying the same ideas by commenting and having conversations with other pinners on the post.<br />
<br />
==Usage==<br />
===Pinning===<br />
Pinning is the process of collecting pins and posting them and categorizing them onto boards. Members can pin any image from any website. There are three ways to pin.<br />
<br />
#Upload an image to Pinterest straight from a file on the computer by clicking the “Add” button. This is a great option to share personal pictures, ones that are not already hosted on the web.<br />
#If a user stumbles upon an image found on another site, like a blog, rather than saving the image to one’s computer, and re-uploading it to Pinterest, click the “Pin It” button that is installed. Clicking the “Pin It” button gives users the option to pin any of the images embedded on the webpage that they are currently visiting. The URL of the original source of the images are automatically set into the link. <br />
#“Repin” something that is already pinned. Browsing makes pinning simple. If one comes across an image of a photo they like on another's board, one has the option to “repin” or “like” it, which gives the owner of the original content the option to share the likes, without having them pinned on their board. This like will be added to the “likes” section of one's profile. Choosing “repin” cues the user to classify the pin to one of the user’s specific boards.<br />
<br />
It is an online bridge between the web and the real world. The site’s popularity is due to its simplicity. In general, it is all about ‘pinning’ things one finds interesting across the web and saving them in any ‘Board’ they like.<br />
<br />
===Pinterest Mobile Applications===<br />
[[File:120815074504-pinterest-mobile-apps-story-top.jpeg|300px|right|thumb|Pinterest Mobile Apps]]<br />
Pinterest has created apps for iPhone, iPad and [[Android]] that are available to download on the Pinterest website. The goal of these apps is to allow users to take Pinterest anywhere, so that users can pin, discover, and access information on the go.<ref>Pinterest for iPhone https://itunes.apple.com/us/app/pinterest/id429047995?mt=8/</ref> Pinterest launched the iPhone app and Pinterest Mobile in September 2011 and in May 2012, they redesigned and updated the app.<ref>Pinterest to Launch Android App at Google I/O 2012? http://siliconangle.com/blog/2012/06/25/pinterest-to-launch-android-app-at-google-io-2012/</ref> On August 14, 2012, Pinterest announced that an iPad app and Android app is now developed and available for download.<ref>Introducing Pinterest for Android, iPad and iPhone http://blog.pinterest.com/post/29392054155/introducing-pinterest-for-android-ipad-and-iphone/</ref><br />
<br />
These apps allow users to do almost everything capable of the Pinterest website. The app displays easy and accessible icons for browsing pins of people that users are following, exploring various pins from various categories, capturing pictures and instantly pinning them, news with the user’s recent activity, and profile displaying pints, boards, likes, the number of followers, and people followed.<br />
<br />
Pinterest founder Ben Silberman recently said that the transition to phones has been one of the biggest ways the company has changed. It started out as a website and now about 80% of its usage is by phone, something he could never have imagined five years ago<ref>Tech Insider Ben Silbermann Interview http://www.businessinsider.com/ben-silbermann-interview-pinterest-ceo-on-ipo-startups-2016-4</ref>.<br />
<br />
==Pinterest for Business==<br />
Many businesses use Pinterest as a marketing tool. They are able to use the site to increase awareness of their business and to monitor traffic by looking at the number of followers or engagement measures of likes, repins, and comments.<ref>9 Businesses Using Pinterest Contests to Drive Traffic and Exposure http://www.socialmediaexaminer.com/pinterest-contest/</ref> A number of companies such as [[Wikipedia:Procter_and_Gamble|Procter & Gamble]], [[Wikipedia:The_Wall_Street_Journal|The Wall Street Journal]], [[Wikipedia:Land%27s_End|Land’s End]], [[Etsy]], [[Ebay]], [[Wikipedia:Zappos|Zappos]], and [[Wikipedia: Whole_Foods_Market|Whole Foods Market]] use the social media platform for exposure to a large audience, attract new followers, engage with existing followers, increase visits to their websites, and generate sales.<ref>Pinterest tightens copyright rules http://www.cbsnews.com/8301-505124_162-57404630/pinterest-tightens-copyright-rules/</ref><ref>With Pinpointing, Zappos hooks up Pinterest with e-commerce http://news.cnet.com/8301-1023_3-57502559-93/with-pinpointing-zappos-hooks-up-pinterest-with-e-commerce/</ref> Pinterest is a great source for consumer insights, allowing businesses to understand their audience, and what they are discussing and sharing. Companies can check out their competition, and compare their products and services.<ref>Pinterest Contests and Sweeps, Turbocharged by Tech: This Holiday Season, Brands rely on Pinfluencer Promotions Platform to manage Holiday Promotions on Pinterest http://www.equities.com/news/news-headline-story?dt=2012-10-19&val=612380&d=1&cat=headline/</ref> Many brands are using Pinterest as an advertising strategy in order to drive sales via images and displays.<br />
<br />
===Promotions===<br />
Companies use Pinterest to promote their brands with contests and sweepstakes to improve user experience for their audience base. Companies like [[Wikipedia:Honda|Honda]], [[Wikipedia:Kotex|Kotex]], [[Wikipedia:Sephora|Sephora]], Gilt, [[Wikipedia:AMC_Theatres|AMC Theaters]], and [[Wikipedia:Victoria%27s_Secret|Victoria’s Secret]] have used Pinterest to connect with their audiences by offering giveaways. <ref name="jpl">Kautz, Kelly. [http://www.jplcreative.com/blog/index.php/2012/05/14/five-ways-pinterest-can-benefit-your-business/ "Five Ways Pinterest Can Benefit Your Business"] '''JPL'''(Retrieved 22 April 2017).</ref><br />
<br />
Contests allow brands to engage with consumers in a personal and cost-effective way as well as to help collect customer information, preferences, and feedback. The great majority of the above companies cater to women much more so than to men. Because of this, Pinterest, with its high percentage of users being women, was a successful and appropriate outlet for such promotions. With this, the collected consumer information, preferences, and feedback were for an appropriate population of the companies' markets.<br />
<br />
===Marketing Tools===<br />
[[File:12.jpeg|300px|right|thumb|PinReach Sign Up Site.]]<br />
There are tools that have been developed after the quick popularity of Pinterest growth. These marketing tools provide users with ways to measure their efforts and make it simple to pin content to boards, share and track better on Pinterest. Businesses use Pinterest to their advantage as the site provides the insights that they need to measure and optimize their content and engagement efforts on Pinterest.<ref>Di Gallo. [http://socialmediaweek.org/blog/tag/pinpuff/ "Getting Insights Into Your Pinterest Efforts"] '''Social Media Week''' (Retrieved 22 April 2017).</ref><br />
<br />
* [http://www.pinreach.com/ PinReach] provides insight and analytics to assist users to examine trends, and measure the success of the page. It allows users to see what their top five pins and boards are and provides the number of pins, boards, likes, followers, likes, repins, and comments.<br />
* [http://www.repinly.com/ Repinly] is a site that analyzes Pinterest users and content providing insights on popular content for pins and boards, how users spend their time, and most followed users.<ref>[Pinterest http://www.socialbrite.org/2012/06/27/5-tools-to-help-you-master-pinterest/ "5 Tools to Help You Master Pinterest"]</ref><br />
* [http://pinpuff.com/ PinPuff] is a site that allows users to explore social influence. It calculates a score and gives the user the number on a scale of 1-100 that indicates a user’s “pinfluence” measuring popularity, influence, and activity. The site gives suggestions of other users collecting similar content. This number can be used for marketing strategy for businesses and startups.<br />
*http://pinaquote.com/ Pin A Quote] allows users to easily pin any text found on the Internet.<ref>[http://www.huffingtonpost.com/2012/03/26/pinterest-terms-of-service-update_n_1379486.html#slide=more217065/ "Pinterest Terms of Service Get Updated"]</ref><br />
* [http://www.reachli.com/landing Reachli] is an analytic tool that helps keep track of repins, and likes that pins are receiving. It has an easy-to-use dashboard interface for browsing and pinning. The site helps devise the best strategy for content to increase user’s sales and increase traffic.<ref>[http://www.cypressnorth.com/blog/social-media/13-essential-tools-help-pin-share-track-better-pinterest/ "13 Essential Tools to Help Pin, Share & Track Better on Pinterest"]</ref><br />
* [http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration] is an app developed for Pinterest users on Windows Phones.<br />
* [http://home.pintics.com/login Pintics] provides the tools needed to manage activity and sales and help track and optimize their Pinterest traffic.<br />
* [http://pinalerts.com/index/login PinAlerts] is a site that alerts users via email when someone pins an image from their website onto Pinterest.<ref>[http://kleinconsult.net/2012/09/28/8-tools-for-managing-and-monitoring-pinterest/ "8Tools for Marketers Using Pinterest"]</ref><br />
* [http://www.pinalyzer.com/ Pinalyzer] is a service that suggests to users pins and people to follow based on analyzing the user’s followers and following people.<br />
* [http://www.pinwords.com/ Pinwords] allows a caption, description, or text to be added to an image instantly before it is pinned to Pinterest.<br />
* [https://itunes.apple.com/app/id544081731 PinDown] is an application which allows users to download multiple pictures at once from their Pinterest account.<ref>[http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html/ "Down for Pinterest"]</ref><br />
<br />
==Awards==<br />
[[File:pinterestaward.png|200px|right|thumb|Pinterest Wins Best Startup]]<br />
*[http://crunchies2011.techcrunch.com/about/ Best New Startup]<br />
* [http://sxsw.com/interactive/awards/winners/ Breakout Digital Trend]<br />
* [http://www.webbyawards.com/webbys/current.php?season=16/ Best Social Media App and People’s Voice Winner in Best Visual Design-Function]<br />
<br />
==Competition==<br />
Some competitors of Pinterest include: <br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable]<br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
All of these sites are some variation of social service for photo-clipping, which allows users to capture, share, and organize anything on the web.<br />
<br />
==Ethical Concerns==<br />
Pinterest users are told to read and agree to the Terms of Use for the company before signing for their account on the website. The Terms of Use at Pinterest requires its members to “acknowledge and agree” sole responsibility for any content or products generated by themselves on the website or any of its affiliates<ref>Exploring the Ethics of Pinterest http://ohmyhandmade.com/2012/entrepreneurship/pinterest-ethics/</ref>. Furthermore, regardless of whether the user is an individual or a business, the party that owns the Pinterest account also owns the content or products created on the site and its affiliates, also known as “Member Content”. This also applies to any sort of images stolen from other users; Pinterest clearly states in their Terms of Use that their Member Content must not misuse or appropriate content from a “third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights,” etc. <br />
<br />
<blockquote class="toccolours" style="float:none; padding: 10px 15px 10px 15px; display:table;"> "You acknowledge and agree that you are solely responsible for all Member Content that you make available through the Site, Application and Services. Accordingly, you represent and warrant that: (i) you either are the sole and exclusive owner of all Member Content that you make available through the Site, Application, and Services or you have all rights, licenses, consents and releases that are necessary to grant to Cold Brew Labs the rights in such Member Content, as contemplated under these Terms; and (ii) neither the Member Content nor your posting, uploading, publication, submission or transmittal of the Member Content or Cold Brew Labs’ use of the Member Content (or any portion thereof) on, through or by means of the Site, Application and the Services will infringe, misappropriate or violate a third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights, or rights of publicity or privacy, or result in the violation of any applicable law or regulation.” – Pinterest, Terms of Use.<br />
</blockquote><br />
<br />
===Copyright Issues===<br />
Due to its picture-based content and ability to replicate through sociotechnical processes such as “re-pinning,” Pinterest has experienced various copyright concerns since its founding. Members of the Pinterest community are unaware of copyright laws and trademark infringement possibilities in the content they post to their accounts. Pinterest’s social network model is based on users linking to any image found on the Internet, of which many are copyrighted. Since users pin texts or pictures onto their profiles without the permission of the copyright holder, this is an infringement of copyright law.<br />
<br />
To combat copyright infringement, Pinterest has implemented their own Copyright Policy that is in accordance with the [[Wikipedia: Digital_Millennium_Copyright_Act|Digital Millennium Copyright Act]], which is provided in their Terms of Service. Under the Pinterest Copyright Policy, “Pinterest respects the intellectual property rights of others and expects its users to do the same.”<ref>Pinterest Copyright & Trademark http://pinterest.com/about/copyright/</ref> With the policy, at its discretion, Pinterest may disable or terminate accounts that are repeatedly charged with infringement issues. Pinterest also has a protocol employed for copyright owners who would like to report copyright infringement within Pinterest, which includes writing to Pinterest and identifying the copyrighted work and the subject who infringed the copyright. When Pinterest complies with a copyright complaint, the pin, and its content is removed from Pinterest.<br />
<br />
Pinterest has attempted to comply with websites that do not want their content to appear on the site. They have implemented a "nopin" meta-tag that websites can put into their HTML codes that prevent users from pinning images that appear on that website. If a user tries to pin an image from a website that has the "nopin" meta-tag in place, the user will see a message that says "This site doesn't allow Pinning to Pinterest. Please contact the owner with any questions. Thanks for visiting!"<ref>Prevent saves to Pinterest from your site https://help.pinterest.com/en/articles/prevent-pinning-your-site</ref><br />
<br />
===Censorship===<br />
The Pinterest website describes the process of picture content removal if a user receives an excessive amount of copyright infringement notices: <br />
<br />
If you receive a notification that a Pin has been removed due a copyright complaint, it means that the Pin’s content has been deleted from Pinterest at the request of the content’s owner. If your account receives too many copyright complaints, you may lose the ability to Pin new content on Pinterest, and your account may be disabled completely.<br />
<br />
In a scenario where the user was not posting copyrighted material but was still asked to remove their content, the scenario reflects [[censorship]] by Pinterest. With digital editing materials available to users, it is hard to decipher the origin of pictures and other online material. Thus, it is hard to say who originally created or posted pictures, and the removal of pictures that do not infringe upon copyright laws could be described as censorship.<br />
<br />
Opponents believe stricter guidelines should be implemented with regards to properly citing or adding a source to the picture. Many pins have links attached to direct the viewer to the correct page, but if they have been screenshots or downloads there should be an option to add details regarding the origin of the picture.<br />
<br />
Indirect censorship is an ethical issue commonly overlooking Pinterest. Due to algorithms and the limitations of search results, users may not see a pin, while it may show up in another user's search result. This indirectly censors some pins since they are unable to access it due to the user's past history and pins. Although it seems reasonable for the search engine to display pins that match the user's interest, it should be up to the user to choose whether or not they want to see all relevant pins.<br />
<br />
===Scams and Hacks===<br />
Some pins often redirect the user to a separate link, which is often a third party website, which makes this site susceptible to scams and hacks. Women make up a large demographic of Pinterest users, so they can be baited by titles such as "Free Makeup Giveaways" or "10 Tips to Lose Weight", and when the link is clicked, malware could be downloaded or another scam may be in progress. Pinterest does not have filters for these scams, but filtering posts may prove to be difficult as scam posts are made to look exactly like the legitimate websites, making it difficult to differentiate between real and fake. Pinterest has yet to take action to mitigate this harm by checking linked websites are credible.<br />
<br />
=== PinDown ===<br />
PinDown is an application that allows users to download multiple images from their Pinterest boards and save them to their computer.<ref>Download http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html</ref> This may promote the idea of copyright infringement, as they could download an image, and post it elsewhere. If the user did not actively search for the image to download it, they may not even know where it originated, and cannot give credit. Pinterest and PinDown may increase copyright infringement by Pinterest users, without them knowing it. Another concern is the idea that some may not want their work to be shared on Pinterest, but are not given the option as the number of members submitting is too great.<br />
<br />
==See Also==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[[Facebook]]<br />
*[[Twitter]]<br />
*[[Instagram]]<br />
*[[Social Networking]]<br />
*[[StumbleUpon]]<br />
*[[Etsy]]<br />
*[[Ebay]]<br />
*[[Tumblr]]<br />
*[[Snapchat]]<br />
*[[Myspace]]<br />
</div><br />
<br />
==External Links==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable] <br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
*[http://crunchies2011.techcrunch.com/ Crunchies 2011]<br />
*[http://www.pinreach.com/ PinReach]<br />
*[http://www.repinly.com/ Repinly]<br />
*[http://pinpuff.com/ PinPuff]<br />
*[http://pinaquote.com/ Pin A Quote]<br />
*[http://www.pinerly.com/landing Pinerly]<br />
*[http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration]<br />
*[http://home.pintics.com/login Pintics]<br />
*[http://pinalerts.com/index/login PinAlerts]<br />
*[http://www.pinalyzer.com/ Pinalyzer]<br />
*[http://www.pinwords.com/ Pinwords]<br />
*[https://chrome.google.com/webstore/detail/pin-search--image-search-/okiaciimfpgbpdhnfdllhdkicpmdoakm Pin Search]<br />
*[http://pinterest.com/about/copyright/ Copyright Complaint Form]<br />
*[http://pinterest.com/about/terms/ Terms of Service]<br />
</div><br />
<br />
==References==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
<references/><br />
</div><br />
<br />
[[Category:Social Networking]]<br />
[[Category:Websites]]<br />
[[Category: Media Content]]<br />
[[Category:Corporations]]<br />
[[Category:GoldStar]]<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Pinterest&diff=72278Pinterest2018-04-22T05:23:26Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#A}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=430<br />
|NAME=Pinterest<br />
|LOGO=pin2.png<br />
|SCREENIMAGE=pin3.png<br />
|CAPTION=Pinterest Official Logo<br />
|IMAGEURL=http://pinterest.com<br />
|TEXT=<br />
|PLATFORM=Cloud Service, iOS, Android <br />
|PRODUCT=Social Networking Service<br />
|TYPE=Visual discovery and collection<br />
|SITEURL=http://pinterest.com<br />
|URLTEXT=www.pinterest.com<br />
|STATUS=Active<br />
|LAUNCH=2010 <ref>About Pinterest: Press https://about.pinterest.com/en/press/press</ref><br />
|AVAILABLE LANGUAGES= English, Français, Nederlands, Português(Europeu), Deutsch, Português (Brasil), Español (América), Español (España)<br />
<br />
}}<br />
{{initial|P}}'''interest''' is a website and mobile application that allows users to visually share and save ideas. Pinterest was founded as a [[Wikipedia: Silicon Valley|Silicon Valley]] start-up <ref>Forbes: Ben Silbermann, Evan Sharp, Co-founders, Pinterest http://www.forbes.com/pictures/mmj45ifhm/ben-silbermann-evan-sharp-co-founder-pinterest-2928/</ref> by [[Wikipedia: Ben_Silbermann|Ben Silbermann]], [[Wikipedia: Paul_Sciarra|Paul Sciarra]], and [[Wikipedia: Evan_Sharp|Evan Sharp]] in 2009. <ref>Founders: A group of eclectic collectors http://www.nypost.com/p/news/business/founders_group_of_eclectic_collecters_c6OCu79GSiJIs3oynbwliN/</ref> With over 150 million active users (as of October of 2016)<ref>Pinterest Has Reached a User Milestone http://www.businessinsider.com/pinterest-has-reached-a-user-milestone-2016-10</ref>, the platform is essentially a virtual vision board, where users can create and manage image collections of photos and other media content, often referred to as "pins." These pins are aggregated into groups called boards, which are determined by the individual users based on their various interests. Pinterest allows its users to both encounter and share photos and ideas of their favorite styles, tastes, and interests. As a medium, it relies heavily on interaction between users. Pinterest serves as a platform to find inspiration and motivation; suggested pins are given by a Pinterest algorithm and determined by user behavior and searches. Ethical concerns of copyright and censorship have been prevalent due to the sharing of information between users. <br />
<br />
<br />
<br />
<br />
==History==<br />
[[File:imgres.jpeg|300px|right|thumb|Pinterest Co-founders: Paul Sciarra, Ben Silbermann, and Evan Sharp]]<br />
Paul Sciarra left his job at a venture capital firm, [[Wikipedia:Radius_Ventures|Radius Ventures]], in New York, in 2008 and Ben Silbermann left his job at customer service and data entry at [[Google]] in California. The college friends came together to brainstorm ideas for a startup. The two started developing a product called Tote, a catalog for one's phone but struggled to gain necessary funds after the recession. After securing investors, the entrepreneurs turned away from Tote and began to work on Pinterest, going on to recruit Evan Sharp as another co-founder. <ref> Pinterest CEO: Here's How We Became The Web's Next Big Thing http://www.businessinsider.com/pinterest-founding-story-2012-4?op=1</ref> The three did not find immediate success with it. Pinterest’s initial slow growth concerned the trio, but only a year later, the site skyrocketed to success as it experienced wild growth. Created out of a childhood love to collect things from insects to stamps, Pinterest was built to let people continue their collections online.<ref>Meet Ben Silbermann<br />
http://articles.businessinsider.com/2012-03-13/tech/31158694_1_google-experience-products-silbermann-said/</ref><br />
<br />
Pinterest began as an exclusive website requiring an invitation to join and participate. In August 2012, Pinterest opened up to the public allowing anyone to sign up for an account and be a user.<ref>Pinterest Finally Ditches Invitations, Now Lets Anyone Sign Up http://techcrunch.com/2012/08/08/pinterest-open/</ref><br />
<br />
===Growth===<br />
Pinterest became the fastest site ever to break through the 10 million unique visitor mark when data reported from [[Wikipedia:comScore|comScore]] indicated the site had 11.7 million unique U.S. visitors on a monthly basis.<ref>Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Everhttp://techcrunch.com/2012/02/07/pinterest-monthly-uniques/</ref> Since early 2012, the number of Pinterest users to visit the site daily has increased 145%.<ref>This Is Everything You Need To Know About Pinterest http://techcrunch.com/2012/03/14/this-is-everything-you-need-to-know-about-pinterest-infographic/</ref> According to new data from social media marketer, Tamba, the number of daily unique visitors of Pinterest doubled in just two months from 2 million in January 2012 to 4 million in March 2012.<ref>Infographic Interest in Pinterest http://www.tamba.co.uk/blog/infographic-interest-in-pinterest-tamba/</ref><br />
<br />
According to the [[Wikipedia:Los_Angeles_Times|Los Angeles Times]], July of 2012 astonishingly saw over 29 million weekly visits to the site, over a 2183% increase from the previous year of 1.27 million weekly visits.<ref>Pinterest, Instagram continues meteoric growth http://articles.latimes.com/2012/aug/29/business/la-fi-tn-pinterest-instagram-growth-20120829/ </ref> As of now with over 150 million users, Pinterest's CEO attributes this growth not to better algorithms or engineering, but to the work of better marketing. Silbermann still believes what was needed and is still needed is simply a better way to distribute Pinterest to users. When Pinterest first started, Silbermann went to many local boutiques and other events and found people who had similar interests to his own and promoted Pinterest as a tool for an idea and interest sharing. <ref>The Secret Behind Pinterest’s Growth Was Marketing, Not Engineering, Says CEO Ben Silbermann http://allthingsd.com/20121020/the-secret-behind-pinterests-growth-was-marketing-not-engineering-says-ceo-ben-silbermann/</ref><br />
<br />
===User Statistics===<br />
Pinterest caters to a variety of social groups. The average Pinterest users are ages 25 to 54, but a total of 67% of users fall under the age 40. <ref name="omni"/> 40% of men who use the application are new users and contribute to 7% of the pins. Users predominately reside in the Midwest. <ref name="omni"/>. In 2012, 80% of United States users were women. It maintained this trend; by 2017 81% of users were female. <ref name="omni">Pinterest by the Numbers: Stats, Demographics & Fun Facts https://www.omnicoreagency.com/pinterest-statistics/</ref><br />
<br />
===Funding===<br />
Since the launch of Pinterest, the company has raised millions from investors, including [[Wikipedia:Andreessen_Horowitz|Andreessen Horowitz]], [[Wikipedia:Firstmark_Capital|FirstMark Capital]], and [[Wikipedia: Bessemer_Venture_Partners|Bessemer Venture Partners]].<ref> Pinterest pins down $100M in new funding http://news.cnet.com/8301-1023_3-57435953-93/pinterest-pins-down-$100m-in-new-funding/</ref> In October 2011, venture capital firm Andreesen Horowitz gave Pinterest $27 million in funding that increased the value the social media site to $200 million.<ref>Pinterest valued at more than $1bn after raising $100m funding http://www.guardian.co.uk/technology/2012/may/17/pinterest-valued-at-more-than-1bn/</ref> Pinterest received a $100 million investment from a group led by Japanese online retailer [[Wikipedia:Rakuten|Rakuten Inc.]], further increasing the value of the company, bringing its total value to $1.5 billion.<ref>Pinterest Funding http://www.huffingtonpost.com/2012/05/17/pinterest-funding_n_1523253.html/</ref><br />
<br />
===Privacy===<br />
Users can browse any other users’ pins. Pinterest allows users to comment on or pin anything they desire, and visibility is not limited. On October 17, 2012, Pinterest announced that they had responded to the request for more privacy controls by adding new features. Now there is a flag icon on each user’s profile allowing anyone to block or report that individual’s profile for nudity or pornography, attacks on a group or individual, graphic violence, hateful speech or symbols, actively promotes self-harm, spam, or other. The block feature prevents users from the ability to follow each other’s boards and to repin and comment on one another’s pins. The report user feature alerts the Community team to evaluate the account that has been reported. <ref>Announcing Blocking & More Controls http://blog.pinterest.com/post/33785122869/announcing-blocking-more-controls/</ref><br />
<br />
[[File:pinterestpage.png|350px|thumb|right|Sample of a page]]<br />
[[File:pinterestcategory.png|200px|thumb|right|Categories]]<br />
<br />
==Features==<br />
'''Pins''': A pin is an image or video uploaded by the user, or taken from a website. A description can be added to the pin to explain or comment on if the purpose of the pin is not explicitly stated. If a pin is from an outside website, users can visit the website by clicking on the link located below each pin. There is direct user-to-user interaction when others “pin” the user's pictures. These pins allow the picture to appear on their own board. Pins represent the actual sharing of ideas between users. Without them, users would not be able to keep track of all of the ideas that they are fond of throughout the Pinterest application. Pinning is essentially a bookmark tool. It allows the user to refer back to a post at any given time and are organized and distributed throughout boards labeled by the user.<br />
<br />
'''Boards''': Pinboards are unique to each user’s page. Users can create and freely name as many boards as they desire by clicking the “Add” button on the navigation bar located on the top right. A pinboard categorizes pins properly onto specific boards in order to help others find the user's pins. These boards can be followed by anyone (depending on settings) and it enables the user to find their ideas in an efficient way when they actually are thinking about “trying” them. Within each board is an organized feed of all of the pins. It is easiest to process the pins if they are systematized and relatable to each other. The board can help the user specify the exact pin they would like to “try” out. <br />
<br />
*'''Secret Boards:''' From late 2012, Pinterest introduced a new type of board which users can mark as 'Secret.' Secret boards are not shared with followers and cannot be accessed by the public.<br />
<br />
'''Comments''': Users can add comments to pins on their own boards or others' boards, even if the users do not follow on another. A comment can be added by clicking on the pin and typing in the comment box, or by hovering over the picture of the pin and clicking on "Comment." Comments also allow for positive feedback and provide a user with motivation to finding even more pins that can relate themselves to other Pinterest users. <br />
<br />
'''Follow''': Users can follow other Pinterest members. There is the option to follow all of their boards or individual boards that the user likes. Friends on Pinterest can be easily found through connecting to [[Facebook]], [[Twitter]], and email accounts.<br />
<br />
'''Bookmarklet''': This “Pin it” button can be added to a browser’s bookmarks bar. Pinterest suggests this feature be installed due to its result of simplistic and easy pinning. Users can click on "bookmark" to open a menu from which one can pick the image they want to pin.<br />
<br />
'''Notifications''': Pinterest came out with new features that allow the user to filter their feed even more than they do. Pinterest interrupts a user’s day with posts that appeal to them. This creates constant connectivity between the Pinterest community and allows for the users to constantly be thinking of the pins they want to try. <br />
<br />
''Filters''': The people behind Pinterest created an algorithm that could filter a search query.<br />
<br />
''Buying/Selling''': Not only can users buy and sell products directly on Pinterest, but Pinterest is also used as an advertising website for items that are sold in stores. As a result, users may seek them out in the stores after pinning the product on Pinterest.<br />
<br />
''Trending''': The trending page allows the user to gain exposure to topics that they may not be following, but that majority of users are interested in at the moment. However, even though the posts below the most popular hashtags are trending, they are still filtered based on the user’s preferences. Posts become trending especially when users “try” them and love them. While this doesn’t necessarily maximize the number of new ideas being “tried” in the real world, it creates a desire for users to share their experiences of trying the same ideas by commenting and having conversations with other pinners on the post.<br />
<br />
==Usage==<br />
===Pinning===<br />
Pinning is the process of collecting pins and posting them and categorizing them onto boards. Members can pin any image from any website. There are three ways to pin.<br />
<br />
#Upload an image to Pinterest straight from a file on the computer by clicking the “Add” button. This is a great option to share personal pictures, ones that are not already hosted on the web.<br />
#If a user stumbles upon an image found on another site, like a blog, rather than saving the image to one’s computer, and re-uploading it to Pinterest, click the “Pin It” button that is installed. Clicking the “Pin It” button gives users the option to pin any of the images embedded on the webpage that they are currently visiting. The URL of the original source of the images are automatically set into the link. <br />
#“Repin” something that is already pinned. Browsing makes pinning simple. If one comes across an image of a photo they like on another's board, one has the option to “repin” or “like” it, which gives the owner of the original content the option to share the likes, without having them pinned on their board. This like will be added to the “likes” section of one's profile. Choosing “repin” cues the user to classify the pin to one of the user’s specific boards.<br />
<br />
It is an online bridge between the web and the real world. The site’s popularity is due to its simplicity. In general, it is all about ‘pinning’ things one finds interesting across the web and saving them in any ‘Board’ they like.<br />
<br />
===Pinterest Mobile Applications===<br />
[[File:120815074504-pinterest-mobile-apps-story-top.jpeg|300px|right|thumb|Pinterest Mobile Apps]]<br />
Pinterest has created apps for iPhone, iPad and [[Android]] that are available to download on the Pinterest website. The goal of these apps is to allow users to take Pinterest anywhere, so that users can pin, discover, and access information on the go.<ref>Pinterest for iPhone https://itunes.apple.com/us/app/pinterest/id429047995?mt=8/</ref> Pinterest launched the iPhone app and Pinterest Mobile in September 2011 and in May 2012, they redesigned and updated the app.<ref>Pinterest to Launch Android App at Google I/O 2012? http://siliconangle.com/blog/2012/06/25/pinterest-to-launch-android-app-at-google-io-2012/</ref> On August 14, 2012, Pinterest announced that an iPad app and Android app is now developed and available for download.<ref>Introducing Pinterest for Android, iPad and iPhone http://blog.pinterest.com/post/29392054155/introducing-pinterest-for-android-ipad-and-iphone/</ref><br />
<br />
These apps allow users to do almost everything capable of the Pinterest website. The app displays easy and accessible icons for browsing pins of people that users are following, exploring various pins from various categories, capturing pictures and instantly pinning them, news with the user’s recent activity, and profile displaying pints, boards, likes, the number of followers, and people followed.<br />
<br />
Pinterest founder Ben Silberman recently said that the transition to phones has been one of the biggest ways the company has changed. It started out as a website and now about 80% of its usage is by phone, something he could never have imagined five years ago<ref>Tech Insider Ben Silbermann Interview http://www.businessinsider.com/ben-silbermann-interview-pinterest-ceo-on-ipo-startups-2016-4</ref>.<br />
<br />
==Pinterest for Business==<br />
Many businesses use Pinterest as a marketing tool. They are able to use the site to increase awareness of their business and to monitor traffic by looking at the number of followers or engagement measures of likes, repins, and comments.<ref>9 Businesses Using Pinterest Contests to Drive Traffic and Exposure http://www.socialmediaexaminer.com/pinterest-contest/</ref> A number of companies such as [[Wikipedia:Procter_and_Gamble|Procter & Gamble]], [[Wikipedia:The_Wall_Street_Journal|The Wall Street Journal]], [[Wikipedia:Land%27s_End|Land’s End]], [[Etsy]], [[Ebay]], [[Wikipedia:Zappos|Zappos]], and [[Wikipedia: Whole_Foods_Market|Whole Foods Market]] use the social media platform for exposure to a large audience, attract new followers, engage with existing followers, increase visits to their websites, and generate sales.<ref>Pinterest tightens copyright rules http://www.cbsnews.com/8301-505124_162-57404630/pinterest-tightens-copyright-rules/</ref><ref>With Pinpointing, Zappos hooks up Pinterest with e-commerce http://news.cnet.com/8301-1023_3-57502559-93/with-pinpointing-zappos-hooks-up-pinterest-with-e-commerce/</ref> Pinterest is a great source for consumer insights, allowing businesses to understand their audience, and what they are discussing and sharing. Companies can check out their competition, and compare their products and services.<ref>Pinterest Contests and Sweeps, Turbocharged by Tech: This Holiday Season, Brands rely on Pinfluencer Promotions Platform to manage Holiday Promotions on Pinterest http://www.equities.com/news/news-headline-story?dt=2012-10-19&val=612380&d=1&cat=headline/</ref> Many brands are using Pinterest as an advertising strategy in order to drive sales via images and displays.<br />
<br />
===Promotions===<br />
Companies use Pinterest to promote their brands with contests and sweepstakes to improve user experience for their audience base. Companies like [[Wikipedia:Honda|Honda]], [[Wikipedia:Kotex|Kotex]], [[Wikipedia:Sephora|Sephora]], Gilt, [[Wikipedia:AMC_Theatres|AMC Theaters]], and [[Wikipedia:Victoria%27s_Secret|Victoria’s Secret]] have used Pinterest to connect with their audiences by offering giveaways. <ref name="jpl">Kautz, Kelly. [http://www.jplcreative.com/blog/index.php/2012/05/14/five-ways-pinterest-can-benefit-your-business/ "Five Ways Pinterest Can Benefit Your Business"] '''JPL'''(Retrieved 22 April 2017).</ref><br />
<br />
Contests allow brands to engage with consumers in a personal and cost-effective way as well as to help collect customer information, preferences, and feedback. The great majority of the above companies cater to women much more so than to men. Because of this, Pinterest, with its high percentage of users being women, was a successful and appropriate outlet for such promotions. With this, the collected consumer information, preferences, and feedback were for an appropriate population of the companies' markets.<br />
<br />
===Marketing Tools===<br />
[[File:12.jpeg|300px|right|thumb|PinReach Sign Up Site.]]<br />
There are tools that have been developed after the quick popularity of Pinterest growth. These marketing tools provide users with ways to measure their efforts and make it simple to pin content to boards, share and track better on Pinterest. Businesses use Pinterest to their advantage as the site provides the insights that they need to measure and optimize their content and engagement efforts on Pinterest.<ref>Di Gallo. [http://socialmediaweek.org/blog/tag/pinpuff/ "Getting Insights Into Your Pinterest Efforts"] '''Social Media Week''' (Retrieved 22 April 2017).</ref><br />
<br />
* [http://www.pinreach.com/ PinReach] provides insight and analytics to assist users to examine trends, and measure the success of the page. It allows users to see what their top five pins and boards are and provides the number of pins, boards, likes, followers, likes, repins, and comments.<br />
* [http://www.repinly.com/ Repinly] is a site that analyzes Pinterest users and content providing insights on popular content for pins and boards, how users spend their time, and most followed users.<ref>[Pinterest http://www.socialbrite.org/2012/06/27/5-tools-to-help-you-master-pinterest/ "5 Tools to Help You Master Pinterest"]</ref><br />
* [http://pinpuff.com/ PinPuff] is a site that allows users to explore social influence. It calculates a score and gives the user the number on a scale of 1-100 that indicates a user’s “pinfluence” measuring popularity, influence, and activity. The site gives suggestions of other users collecting similar content. This number can be used for marketing strategy for businesses and startups.<br />
*http://pinaquote.com/ Pin A Quote] allows users to easily pin any text found on the Internet.<ref>[http://www.huffingtonpost.com/2012/03/26/pinterest-terms-of-service-update_n_1379486.html#slide=more217065/ "Pinterest Terms of Service Get Updated"]</ref><br />
* [http://www.reachli.com/landing Reachli] is an analytic tool that helps keep track of repins, and likes that pins are receiving. It has an easy-to-use dashboard interface for browsing and pinning. The site helps devise the best strategy for content to increase user’s sales and increase traffic.<ref>[http://www.cypressnorth.com/blog/social-media/13-essential-tools-help-pin-share-track-better-pinterest/ "13 Essential Tools to Help Pin, Share & Track Better on Pinterest"]</ref><br />
* [http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration] is an app developed for Pinterest users on Windows Phones.<br />
* [http://home.pintics.com/login Pintics] provides the tools needed to manage activity and sales and help track and optimize their Pinterest traffic.<br />
* [http://pinalerts.com/index/login PinAlerts] is a site that alerts users via email when someone pins an image from their website onto Pinterest.<ref>[http://kleinconsult.net/2012/09/28/8-tools-for-managing-and-monitoring-pinterest/ "8Tools for Marketers Using Pinterest"]</ref><br />
* [http://www.pinalyzer.com/ Pinalyzer] is a service that suggests to users pins and people to follow based on analyzing the user’s followers and following people.<br />
* [http://www.pinwords.com/ Pinwords] allows a caption, description, or text to be added to an image instantly before it is pinned to Pinterest.<br />
* [https://itunes.apple.com/app/id544081731 PinDown] is an application which allows users to download multiple pictures at once from their Pinterest account.<ref>[http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html/ "Down for Pinterest"]</ref><br />
<br />
==Awards==<br />
[[File:pinterestaward.png|200px|right|thumb|Pinterest Wins Best Startup]]<br />
Pinterest won the Crunchies 2011 fifth annual competition award for Best New Startup of 2011. Hosted by GigaOm, VentureBeat, and TechCrunch, the Internet community is invited to choose the winner.<ref>The Crunchies Awards 2011 http://crunchies2011.techcrunch.com/about/</ref><br />
<br />
At South by Southwest Interactive 15th Annual Awards, Pinterest won the award for best Breakout Digital Trend 2012.<ref>SXSW Interactive Awards http://sxsw.com/interactive/awards/winners/</ref><br />
<br />
At the 2012 Webby Awards, Pinterest won awards for Best Social Media App and People’s Voice Winner in Best Visual Design Function.<ref>The Webby Awards http://www.webbyawards.com/webbys/current.php?season=16/</ref><br />
<br />
==Competition==<br />
Some competitors of Pinterest include: <br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable]<br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
All of these sites are some variation of social service for photo-clipping, which allows users to capture, share, and organize anything on the web.<br />
<br />
==Ethical Concerns==<br />
Pinterest users are told to read and agree to the Terms of Use for the company before signing for their account on the website. The Terms of Use at Pinterest requires its members to “acknowledge and agree” sole responsibility for any content or products generated by themselves on the website or any of its affiliates<ref>Exploring the Ethics of Pinterest http://ohmyhandmade.com/2012/entrepreneurship/pinterest-ethics/</ref>. Furthermore, regardless of whether the user is an individual or a business, the party that owns the Pinterest account also owns the content or products created on the site and its affiliates, also known as “Member Content”. This also applies to any sort of images stolen from other users; Pinterest clearly states in their Terms of Use that their Member Content must not misuse or appropriate content from a “third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights,” etc. <br />
<br />
<blockquote class="toccolours" style="float:none; padding: 10px 15px 10px 15px; display:table;"> "You acknowledge and agree that you are solely responsible for all Member Content that you make available through the Site, Application and Services. Accordingly, you represent and warrant that: (i) you either are the sole and exclusive owner of all Member Content that you make available through the Site, Application, and Services or you have all rights, licenses, consents and releases that are necessary to grant to Cold Brew Labs the rights in such Member Content, as contemplated under these Terms; and (ii) neither the Member Content nor your posting, uploading, publication, submission or transmittal of the Member Content or Cold Brew Labs’ use of the Member Content (or any portion thereof) on, through or by means of the Site, Application and the Services will infringe, misappropriate or violate a third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights, or rights of publicity or privacy, or result in the violation of any applicable law or regulation.” – Pinterest, Terms of Use.<br />
</blockquote><br />
<br />
===Copyright Issues===<br />
Due to its picture-based content and ability to replicate through sociotechnical processes such as “re-pinning,” Pinterest has experienced various copyright concerns since its founding. Members of the Pinterest community are unaware of copyright laws and trademark infringement possibilities in the content they post to their accounts. Pinterest’s social network model is based on users linking to any image found on the Internet, of which many are copyrighted. Since users pin texts or pictures onto their profiles without the permission of the copyright holder, this is an infringement of copyright law.<br />
<br />
To combat copyright infringement, Pinterest has implemented their own Copyright Policy that is in accordance with the [[Wikipedia: Digital_Millennium_Copyright_Act|Digital Millennium Copyright Act]], which is provided in their Terms of Service. Under the Pinterest Copyright Policy, “Pinterest respects the intellectual property rights of others and expects its users to do the same.”<ref>Pinterest Copyright & Trademark http://pinterest.com/about/copyright/</ref> With the policy, at its discretion, Pinterest may disable or terminate accounts that are repeatedly charged with infringement issues. Pinterest also has a protocol employed for copyright owners who would like to report copyright infringement within Pinterest, which includes writing to Pinterest and identifying the copyrighted work and the subject who infringed the copyright. When Pinterest complies with a copyright complaint, the pin, and its content is removed from Pinterest.<br />
<br />
Pinterest has attempted to comply with websites that do not want their content to appear on the site. They have implemented a "nopin" meta-tag that websites can put into their HTML codes that prevent users from pinning images that appear on that website. If a user tries to pin an image from a website that has the "nopin" meta-tag in place, the user will see a message that says "This site doesn't allow Pinning to Pinterest. Please contact the owner with any questions. Thanks for visiting!"<ref>Prevent saves to Pinterest from your site https://help.pinterest.com/en/articles/prevent-pinning-your-site</ref><br />
<br />
===Censorship===<br />
The Pinterest website describes the process of picture content removal if a user receives an excessive amount of copyright infringement notices: <br />
<br />
If you receive a notification that a Pin has been removed due a copyright complaint, it means that the Pin’s content has been deleted from Pinterest at the request of the content’s owner. If your account receives too many copyright complaints, you may lose the ability to Pin new content on Pinterest, and your account may be disabled completely.<br />
<br />
In a scenario where the user was not posting copyrighted material but was still asked to remove their content, the scenario reflects [[censorship]] by Pinterest. With digital editing materials available to users, it is hard to decipher the origin of pictures and other online material. Thus, it is hard to say who originally created or posted pictures, and the removal of pictures that do not infringe upon copyright laws could be described as censorship.<br />
<br />
Opponents believe stricter guidelines should be implemented with regards to properly citing or adding a source to the picture. Many pins have links attached to direct the viewer to the correct page, but if they have been screenshots or downloads there should be an option to add details regarding the origin of the picture.<br />
<br />
Indirect censorship is an ethical issue commonly overlooking Pinterest. Due to algorithms and the limitations of search results, users may not see a pin, while it may show up in another user's search result. This indirectly censors some pins since they are unable to access it due to the user's past history and pins. Although it seems reasonable for the search engine to display pins that match the user's interest, it should be up to the user to choose whether or not they want to see all relevant pins.<br />
<br />
===Scams and Hacks===<br />
Some pins often redirect the user to a separate link, which is often a third party website, which makes this site susceptible to scams and hacks. Women make up a large demographic of Pinterest users, so they can be baited by titles such as "Free Makeup Giveaways" or "10 Tips to Lose Weight", and when the link is clicked, malware could be downloaded or another scam may be in progress. Pinterest does not have filters for these scams, but filtering posts may prove to be difficult as scam posts are made to look exactly like the legitimate websites, making it difficult to differentiate between real and fake. Pinterest has yet to take action to mitigate this harm by checking linked websites are credible.<br />
<br />
=== PinDown ===<br />
PinDown is an application that allows users to download multiple images from their Pinterest boards and save them to their computer.<ref>Download http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html</ref> This may promote the idea of copyright infringement, as they could download an image, and post it elsewhere. If the user did not actively search for the image to download it, they may not even know where it originated, and cannot give credit. Pinterest and PinDown may increase copyright infringement by Pinterest users, without them knowing it. Another concern is the idea that some may not want their work to be shared on Pinterest, but are not given the option as the number of members submitting is too great.<br />
<br />
==See Also==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[[Facebook]]<br />
*[[Twitter]]<br />
*[[Instagram]]<br />
*[[Social Networking]]<br />
*[[StumbleUpon]]<br />
*[[Etsy]]<br />
*[[Ebay]]<br />
*[[Tumblr]]<br />
*[[Snapchat]]<br />
*[[Myspace]]<br />
</div><br />
<br />
==External Links==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable] <br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
*[http://crunchies2011.techcrunch.com/ Crunchies 2011]<br />
*[http://www.pinreach.com/ PinReach]<br />
*[http://www.repinly.com/ Repinly]<br />
*[http://pinpuff.com/ PinPuff]<br />
*[http://pinaquote.com/ Pin A Quote]<br />
*[http://www.pinerly.com/landing Pinerly]<br />
*[http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration]<br />
*[http://home.pintics.com/login Pintics]<br />
*[http://pinalerts.com/index/login PinAlerts]<br />
*[http://www.pinalyzer.com/ Pinalyzer]<br />
*[http://www.pinwords.com/ Pinwords]<br />
*[https://chrome.google.com/webstore/detail/pin-search--image-search-/okiaciimfpgbpdhnfdllhdkicpmdoakm Pin Search]<br />
*[http://pinterest.com/about/copyright/ Copyright Complaint Form]<br />
*[http://pinterest.com/about/terms/ Terms of Service]<br />
</div><br />
<br />
==References==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
<references/><br />
</div><br />
<br />
[[Category:Social Networking]]<br />
[[Category:Websites]]<br />
[[Category: Media Content]]<br />
[[Category:Corporations]]<br />
[[Category:GoldStar]]<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Pinterest&diff=72275Pinterest2018-04-22T04:27:40Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#A}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=430<br />
|NAME=Pinterest<br />
|LOGO=pin2.png<br />
|SCREENIMAGE=pin3.png<br />
|CAPTION=Pinterest Official Logo<br />
|IMAGEURL=http://pinterest.com<br />
|TEXT=<br />
|PLATFORM=Cloud Service, iOS, Android <br />
|PRODUCT=Social Networking Service<br />
|TYPE=Visual discovery and collection<br />
|SITEURL=http://pinterest.com<br />
|URLTEXT=www.pinterest.com<br />
|STATUS=Active<br />
|LAUNCH=2010 <ref>About Pinterest: Press https://about.pinterest.com/en/press/press</ref><br />
|AVAILABLE LANGUAGES= English, Français, Nederlands, Português(Europeu), Deutsch, Português (Brasil), Español (América), Español (España)<br />
<br />
}}<br />
{{initial|P}}'''interest''' is a website and mobile application that allows users to visually share and save ideas. Pinterest was founded as a [[Wikipedia: Silicon Valley|Silicon Valley]] start-up <ref>Forbes: Ben Silbermann, Evan Sharp, Co-founders, Pinterest http://www.forbes.com/pictures/mmj45ifhm/ben-silbermann-evan-sharp-co-founder-pinterest-2928/</ref> by [[Wikipedia: Ben_Silbermann|Ben Silbermann]], [[Wikipedia: Paul_Sciarra|Paul Sciarra]], and [[Wikipedia: Evan_Sharp|Evan Sharp]] in 2009. <ref>Founders: A group of eclectic collectors http://www.nypost.com/p/news/business/founders_group_of_eclectic_collecters_c6OCu79GSiJIs3oynbwliN/</ref> With over 150 million active users (as of October of 2016)<ref>Pinterest Has Reached a User Milestone http://www.businessinsider.com/pinterest-has-reached-a-user-milestone-2016-10</ref>, the platform is essentially a virtual vision board, where users can create and manage image collections of photos and other media content, often referred to as "pins." These pins are aggregated into groups called boards, which are determined by the individual users based on their various interests. Pinterest allows its users to both encounter and share photos and ideas of their favorite styles, tastes, and interests. As a medium, it relies heavily on interaction between users. Pinterest serves as a platform to find inspiration and motivation; suggested pins are given by a Pinterest algorithm and determined by user behavior and searches. Ethical concerns of copyright and censorship have been prevalent due to the sharing of information between users. <br />
<br />
<br />
<br />
<br />
==History==<br />
[[File:imgres.jpeg|300px|right|thumb|Pinterest Co-founders: Paul Sciarra, Ben Silbermann, and Evan Sharp]]<br />
Paul Sciarra left his job at a venture capital firm, [[Wikipedia:Radius_Ventures|Radius Ventures]], in New York, in 2008 and Ben Silbermann left his job at customer service and data entry at [[Google]] in California. The college friends came together to brainstorm ideas for a startup. The two started developing a product called Tote, a catalog for one's phone but struggled to gain necessary funds after the recession. After securing investors, the entrepreneurs turned away from Tote and began to work on Pinterest, going on to recruit Evan Sharp as another co-founder. <ref> Pinterest CEO: Here's How We Became The Web's Next Big Thing http://www.businessinsider.com/pinterest-founding-story-2012-4?op=1</ref> The three did not find immediate success with it. Pinterest’s initial slow growth concerned the trio, but only a year later, the site skyrocketed to success as it experienced wild growth. Created out of a childhood love to collect things from insects to stamps, Pinterest was built to let people continue their collections online.<ref>Meet Ben Silbermann<br />
http://articles.businessinsider.com/2012-03-13/tech/31158694_1_google-experience-products-silbermann-said/</ref><br />
<br />
Pinterest began as an exclusive website requiring an invitation to join and participate. In August 2012, Pinterest opened up to the public allowing anyone to sign up for an account and be a user.<ref>Pinterest Finally Ditches Invitations, Now Lets Anyone Sign Up http://techcrunch.com/2012/08/08/pinterest-open/</ref><br />
<br />
===Growth===<br />
Pinterest became the fastest site ever to break through the 10 million unique visitor mark when data reported from [[Wikipedia:comScore|comScore]] indicated the site had 11.7 million unique U.S. visitors on a monthly basis.<ref>Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Everhttp://techcrunch.com/2012/02/07/pinterest-monthly-uniques/</ref> Since early 2012, the number of Pinterest users to visit the site daily has increased 145%.<ref>This Is Everything You Need To Know About Pinterest http://techcrunch.com/2012/03/14/this-is-everything-you-need-to-know-about-pinterest-infographic/</ref> According to new data from social media marketer, Tamba, the number of daily unique visitors of Pinterest doubled in just two months from 2 million in January 2012 to 4 million in March 2012.<ref>Infographic Interest in Pinterest http://www.tamba.co.uk/blog/infographic-interest-in-pinterest-tamba/</ref><br />
<br />
According to the [[Wikipedia:Los_Angeles_Times|Los Angeles Times]], July of 2012 astonishingly saw over 29 million weekly visits to the site, over a 2183% increase from the previous year of 1.27 million weekly visits.<ref>Pinterest, Instagram continues meteoric growth http://articles.latimes.com/2012/aug/29/business/la-fi-tn-pinterest-instagram-growth-20120829/ </ref> As of now with over 150 million users, Pinterest's CEO attributes this growth not to better algorithms or engineering, but to the work of better marketing. Silbermann still believes what was needed and is still needed is simply a better way to distribute Pinterest to users. When Pinterest first started, Silbermann went to many local boutiques and other events and found people who had similar interests to his own and promoted Pinterest as a tool for an idea and interest sharing. <ref>The Secret Behind Pinterest’s Growth Was Marketing, Not Engineering, Says CEO Ben Silbermann http://allthingsd.com/20121020/the-secret-behind-pinterests-growth-was-marketing-not-engineering-says-ceo-ben-silbermann/</ref><br />
<br />
===User Statistics===<br />
Though Pinterest has become popular among a variety of social groups, it was reported in 2012 that 80% of U.S. users were women. In 2017, Pinterest showed similar statistics with 81% of its users being female.<ref name="omni">Pinterest by the Numbers: Stats, Demographics & Fun Facts https://www.omnicoreagency.com/pinterest-statistics/</ref> And although the site's main users are women, the site can also attract the interest of men, who make up 40% of new signups but only 7% of total pins. <ref name="omni"/>. Users in the U.S. are also more likely to be from Midwest. The average Pinterest users are ages 25 to 54, but a total of 67% of users fall under the age 40.<ref name="omni"/> <br />
<br />
===Funding===<br />
Since the launch of Pinterest, the company has raised millions from investors, including [[Wikipedia:Andreessen_Horowitz|Andreessen Horowitz]], [[Wikipedia:Firstmark_Capital|FirstMark Capital]], and [[Wikipedia: Bessemer_Venture_Partners|Bessemer Venture Partners]].<ref> Pinterest pins down $100M in new funding http://news.cnet.com/8301-1023_3-57435953-93/pinterest-pins-down-$100m-in-new-funding/</ref> In October 2011, venture capital firm Andreesen Horowitz gave Pinterest $27 million in funding that increased the value the social media site to $200 million.<ref>Pinterest valued at more than $1bn after raising $100m funding http://www.guardian.co.uk/technology/2012/may/17/pinterest-valued-at-more-than-1bn/</ref> Pinterest received a $100 million investment from a group led by Japanese online retailer [[Wikipedia:Rakuten|Rakuten Inc.]], further increasing the value of the company, bringing its total value to $1.5 billion.<ref>Pinterest Funding http://www.huffingtonpost.com/2012/05/17/pinterest-funding_n_1523253.html/</ref><br />
<br />
===Privacy===<br />
Users can browse any other users’ pins. Pinterest allows users to comment on or pin anything they desire, and visibility is not limited. On October 17, 2012, Pinterest announced that they had responded to the request for more privacy controls by adding new features. Now there is a flag icon on each user’s profile allowing anyone to block or report that individual’s profile for nudity or pornography, attacks on a group or individual, graphic violence, hateful speech or symbols, actively promotes self-harm, spam, or other. The block feature prevents users from the ability to follow each other’s boards and to repin and comment on one another’s pins. The report user feature alerts the Community team to evaluate the account that has been reported. <ref>Announcing Blocking & More Controls http://blog.pinterest.com/post/33785122869/announcing-blocking-more-controls/</ref><br />
<br />
[[File:pinterestpage.png|350px|thumb|right|Sample of a page]]<br />
[[File:pinterestcategory.png|200px|thumb|right|Categories]]<br />
<br />
==Features==<br />
'''Pins''': A pin is an image or video uploaded by the user, or taken from a website. A description can be added to the pin to explain or comment on if the purpose of the pin is not explicitly stated. If a pin is from an outside website, users can visit the website by clicking on the link located below each pin. There is direct user-to-user interaction when others “pin” the user's pictures. These pins allow the picture to appear on their own board. Pins represent the actual sharing of ideas between users. Without them, users would not be able to keep track of all of the ideas that they are fond of throughout the Pinterest application. Pinning is essentially a bookmark tool. It allows the user to refer back to a post at any given time and are organized and distributed throughout boards labeled by the user.<br />
<br />
'''Boards''': Pinboards are unique to each user’s page. Users can create and freely name as many boards as they desire by clicking the “Add” button on the navigation bar located on the top right. A pinboard categorizes pins properly onto specific boards in order to help others find the user's pins. These boards can be followed by anyone (depending on settings) and it enables the user to find their ideas in an efficient way when they actually are thinking about “trying” them. Within each board is an organized feed of all of the pins. It is easiest to process the pins if they are systematized and relatable to each other. The board can help the user specify the exact pin they would like to “try” out. <br />
<br />
*'''Secret Boards:''' From late 2012, Pinterest introduced a new type of board which users can mark as 'Secret.' Secret boards are not shared with followers and cannot be accessed by the public.<br />
<br />
'''Comments''': Users can add comments to pins on their own boards or others' boards, even if the users do not follow on another. A comment can be added by clicking on the pin and typing in the comment box, or by hovering over the picture of the pin and clicking on "Comment." Comments also allow for positive feedback and provide a user with motivation to finding even more pins that can relate themselves to other Pinterest users. <br />
<br />
'''Follow''': Users can follow other Pinterest members. There is the option to follow all of their boards or individual boards that the user likes. Friends on Pinterest can be easily found through connecting to [[Facebook]], [[Twitter]], and email accounts.<br />
<br />
'''Bookmarklet''': This “Pin it” button can be added to a browser’s bookmarks bar. Pinterest suggests this feature be installed due to its result of simplistic and easy pinning. Users can click on "bookmark" to open a menu from which one can pick the image they want to pin.<br />
<br />
'''Notifications''': Pinterest came out with new features that allow the user to filter their feed even more than they do. Pinterest interrupts a user’s day with posts that appeal to them. This creates constant connectivity between the Pinterest community and allows for the users to constantly be thinking of the pins they want to try. <br />
<br />
''Filters''': The people behind Pinterest created an algorithm that could filter a search query.<br />
<br />
''Buying/Selling''': Not only can users buy and sell products directly on Pinterest, but Pinterest is also used as an advertising website for items that are sold in stores. As a result, users may seek them out in the stores after pinning the product on Pinterest.<br />
<br />
''Trending''': The trending page allows the user to gain exposure to topics that they may not be following, but that majority of users are interested in at the moment. However, even though the posts below the most popular hashtags are trending, they are still filtered based on the user’s preferences. Posts become trending especially when users “try” them and love them. While this doesn’t necessarily maximize the number of new ideas being “tried” in the real world, it creates a desire for users to share their experiences of trying the same ideas by commenting and having conversations with other pinners on the post.<br />
<br />
==Usage==<br />
===Pinning===<br />
Pinning is the process of collecting pins and posting them and categorizing them onto boards. Members can pin any image from any website. There are three ways to pin.<br />
<br />
#Upload an image to Pinterest straight from a file on the computer by clicking the “Add” button. This is a great option to share personal pictures, ones that are not already hosted on the web.<br />
#If a user stumbles upon an image found on another site, like a blog, rather than saving the image to one’s computer, and re-uploading it to Pinterest, click the “Pin It” button that is installed. Clicking the “Pin It” button gives users the option to pin any of the images embedded on the webpage that they are currently visiting. The URL of the original source of the images are automatically set into the link. <br />
#“Repin” something that is already pinned. Browsing makes pinning simple. If one comes across an image of a photo they like on another's board, one has the option to “repin” or “like” it, which gives the owner of the original content the option to share the likes, without having them pinned on their board. This like will be added to the “likes” section of one's profile. Choosing “repin” cues the user to classify the pin to one of the user’s specific boards.<br />
<br />
It is an online bridge between the web and the real world. The site’s popularity is due to its simplicity. In general, it is all about ‘pinning’ things one finds interesting across the web and saving them in any ‘Board’ they like.<br />
<br />
===Pinterest Mobile Applications===<br />
[[File:120815074504-pinterest-mobile-apps-story-top.jpeg|300px|right|thumb|Pinterest Mobile Apps]]<br />
Pinterest has created apps for iPhone, iPad and [[Android]] that are available to download on the Pinterest website. The goal of these apps is to allow users to take Pinterest anywhere, so that users can pin, discover, and access information on the go.<ref>Pinterest for iPhone https://itunes.apple.com/us/app/pinterest/id429047995?mt=8/</ref> Pinterest launched the iPhone app and Pinterest Mobile in September 2011 and in May 2012, they redesigned and updated the app.<ref>Pinterest to Launch Android App at Google I/O 2012? http://siliconangle.com/blog/2012/06/25/pinterest-to-launch-android-app-at-google-io-2012/</ref> On August 14, 2012, Pinterest announced that an iPad app and Android app is now developed and available for download.<ref>Introducing Pinterest for Android, iPad and iPhone http://blog.pinterest.com/post/29392054155/introducing-pinterest-for-android-ipad-and-iphone/</ref><br />
<br />
These apps allow users to do almost everything capable of the Pinterest website. The app displays easy and accessible icons for browsing pins of people that users are following, exploring various pins from various categories, capturing pictures and instantly pinning them, news with the user’s recent activity, and profile displaying pints, boards, likes, the number of followers, and people followed.<br />
<br />
Pinterest founder Ben Silberman recently said that the transition to phones has been one of the biggest ways the company has changed. It started out as a website and now about 80% of its usage is by phone, something he could never have imagined five years ago<ref>Tech Insider Ben Silbermann Interview http://www.businessinsider.com/ben-silbermann-interview-pinterest-ceo-on-ipo-startups-2016-4</ref>.<br />
<br />
==Pinterest for Business==<br />
Many businesses use Pinterest as a marketing tool. They are able to use the site to increase awareness of their business and to monitor traffic by looking at the number of followers or engagement measures of likes, repins, and comments.<ref>9 Businesses Using Pinterest Contests to Drive Traffic and Exposure http://www.socialmediaexaminer.com/pinterest-contest/</ref> A number of companies such as [[Wikipedia:Procter_and_Gamble|Procter & Gamble]], [[Wikipedia:The_Wall_Street_Journal|The Wall Street Journal]], [[Wikipedia:Land%27s_End|Land’s End]], [[Etsy]], [[Ebay]], [[Wikipedia:Zappos|Zappos]], and [[Wikipedia: Whole_Foods_Market|Whole Foods Market]] use the social media platform for exposure to a large audience, attract new followers, engage with existing followers, increase visits to their websites, and generate sales.<ref>Pinterest tightens copyright rules http://www.cbsnews.com/8301-505124_162-57404630/pinterest-tightens-copyright-rules/</ref><ref>With Pinpointing, Zappos hooks up Pinterest with e-commerce http://news.cnet.com/8301-1023_3-57502559-93/with-pinpointing-zappos-hooks-up-pinterest-with-e-commerce/</ref> Pinterest is a great source for consumer insights, allowing businesses to understand their audience, and what they are discussing and sharing. Companies can check out their competition, and compare their products and services.<ref>Pinterest Contests and Sweeps, Turbocharged by Tech: This Holiday Season, Brands rely on Pinfluencer Promotions Platform to manage Holiday Promotions on Pinterest http://www.equities.com/news/news-headline-story?dt=2012-10-19&val=612380&d=1&cat=headline/</ref> Many brands are using Pinterest as an advertising strategy in order to drive sales via images and displays.<br />
<br />
===Promotions===<br />
Companies use Pinterest to promote their brands with contests and sweepstakes to improve user experience for their audience base. Companies like [[Wikipedia:Honda|Honda]], [[Wikipedia:Kotex|Kotex]], [[Wikipedia:Sephora|Sephora]], Gilt, [[Wikipedia:AMC_Theatres|AMC Theaters]], and [[Wikipedia:Victoria%27s_Secret|Victoria’s Secret]] have used Pinterest to connect with their audiences by offering giveaways. <ref name="jpl">Kautz, Kelly. [http://www.jplcreative.com/blog/index.php/2012/05/14/five-ways-pinterest-can-benefit-your-business/ "Five Ways Pinterest Can Benefit Your Business"] '''JPL'''(Retrieved 22 April 2017).</ref><br />
<br />
Contests allow brands to engage with consumers in a personal and cost-effective way as well as to help collect customer information, preferences, and feedback. The great majority of the above companies cater to women much more so than to men. Because of this, Pinterest, with its high percentage of users being women, was a successful and appropriate outlet for such promotions. With this, the collected consumer information, preferences, and feedback were for an appropriate population of the companies' markets.<br />
<br />
===Marketing Tools===<br />
[[File:12.jpeg|300px|right|thumb|PinReach Sign Up Site.]]<br />
There are tools that have been developed after the quick popularity of Pinterest growth. These marketing tools provide users with ways to measure their efforts and make it simple to pin content to boards, share and track better on Pinterest. Businesses use Pinterest to their advantage as the site provides the insights that they need to measure and optimize their content and engagement efforts on Pinterest.<ref>Di Gallo. [http://socialmediaweek.org/blog/tag/pinpuff/ "Getting Insights Into Your Pinterest Efforts"] '''Social Media Week''' (Retrieved 22 April 2017).</ref><br />
<br />
* [http://www.pinreach.com/ PinReach] provides insight and analytics to assist users to examine trends, and measure the success of the page. It allows users to see what their top five pins and boards are and provides the number of pins, boards, likes, followers, likes, repins, and comments.<br />
* [http://www.repinly.com/ Repinly] is a site that analyzes Pinterest users and content providing insights on popular content for pins and boards, how users spend their time, and most followed users.<ref>[Pinterest http://www.socialbrite.org/2012/06/27/5-tools-to-help-you-master-pinterest/ "5 Tools to Help You Master Pinterest"]</ref><br />
* [http://pinpuff.com/ PinPuff] is a site that allows users to explore social influence. It calculates a score and gives the user the number on a scale of 1-100 that indicates a user’s “pinfluence” measuring popularity, influence, and activity. The site gives suggestions of other users collecting similar content. This number can be used for marketing strategy for businesses and startups.<br />
*http://pinaquote.com/ Pin A Quote] allows users to easily pin any text found on the Internet.<ref>[http://www.huffingtonpost.com/2012/03/26/pinterest-terms-of-service-update_n_1379486.html#slide=more217065/ "Pinterest Terms of Service Get Updated"]</ref><br />
* [http://www.reachli.com/landing Reachli] is an analytic tool that helps keep track of repins, and likes that pins are receiving. It has an easy-to-use dashboard interface for browsing and pinning. The site helps devise the best strategy for content to increase user’s sales and increase traffic.<ref>[http://www.cypressnorth.com/blog/social-media/13-essential-tools-help-pin-share-track-better-pinterest/ "13 Essential Tools to Help Pin, Share & Track Better on Pinterest"]</ref><br />
* [http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration] is an app developed for Pinterest users on Windows Phones.<br />
* [http://home.pintics.com/login Pintics] provides the tools needed to manage activity and sales and help track and optimize their Pinterest traffic.<br />
* [http://pinalerts.com/index/login PinAlerts] is a site that alerts users via email when someone pins an image from their website onto Pinterest.<ref>[http://kleinconsult.net/2012/09/28/8-tools-for-managing-and-monitoring-pinterest/ "8Tools for Marketers Using Pinterest"]</ref><br />
* [http://www.pinalyzer.com/ Pinalyzer] is a service that suggests to users pins and people to follow based on analyzing the user’s followers and following people.<br />
* [http://www.pinwords.com/ Pinwords] allows a caption, description, or text to be added to an image instantly before it is pinned to Pinterest.<br />
* [https://itunes.apple.com/app/id544081731 PinDown] is an application which allows users to download multiple pictures at once from their Pinterest account.<ref>[http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html/ "Down for Pinterest"]</ref><br />
<br />
==Awards==<br />
[[File:pinterestaward.png|200px|right|thumb|Pinterest Wins Best Startup]]<br />
Pinterest won the Crunchies 2011 fifth annual competition award for Best New Startup of 2011. Hosted by GigaOm, VentureBeat, and TechCrunch, the Internet community is invited to choose the winner.<ref>The Crunchies Awards 2011 http://crunchies2011.techcrunch.com/about/</ref><br />
<br />
At South by Southwest Interactive 15th Annual Awards, Pinterest won the award for best Breakout Digital Trend 2012.<ref>SXSW Interactive Awards http://sxsw.com/interactive/awards/winners/</ref><br />
<br />
At the 2012 Webby Awards, Pinterest won awards for Best Social Media App and People’s Voice Winner in Best Visual Design Function.<ref>The Webby Awards http://www.webbyawards.com/webbys/current.php?season=16/</ref><br />
<br />
==Competition==<br />
Some competitors of Pinterest include: <br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable]<br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
All of these sites are some variation of social service for photo-clipping, which allows users to capture, share, and organize anything on the web.<br />
<br />
==Ethical Concerns==<br />
Pinterest users are told to read and agree to the Terms of Use for the company before signing for their account on the website. The Terms of Use at Pinterest requires its members to “acknowledge and agree” sole responsibility for any content or products generated by themselves on the website or any of its affiliates<ref>Exploring the Ethics of Pinterest http://ohmyhandmade.com/2012/entrepreneurship/pinterest-ethics/</ref>. Furthermore, regardless of whether the user is an individual or a business, the party that owns the Pinterest account also owns the content or products created on the site and its affiliates, also known as “Member Content”. This also applies to any sort of images stolen from other users; Pinterest clearly states in their Terms of Use that their Member Content must not misuse or appropriate content from a “third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights,” etc. <br />
<br />
<blockquote class="toccolours" style="float:none; padding: 10px 15px 10px 15px; display:table;"> "You acknowledge and agree that you are solely responsible for all Member Content that you make available through the Site, Application and Services. Accordingly, you represent and warrant that: (i) you either are the sole and exclusive owner of all Member Content that you make available through the Site, Application, and Services or you have all rights, licenses, consents and releases that are necessary to grant to Cold Brew Labs the rights in such Member Content, as contemplated under these Terms; and (ii) neither the Member Content nor your posting, uploading, publication, submission or transmittal of the Member Content or Cold Brew Labs’ use of the Member Content (or any portion thereof) on, through or by means of the Site, Application and the Services will infringe, misappropriate or violate a third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights, or rights of publicity or privacy, or result in the violation of any applicable law or regulation.” – Pinterest, Terms of Use.<br />
</blockquote><br />
<br />
===Copyright Issues===<br />
Due to its picture-based content and ability to replicate through sociotechnical processes such as “re-pinning,” Pinterest has experienced various copyright concerns since its founding. Members of the Pinterest community are unaware of copyright laws and trademark infringement possibilities in the content they post to their accounts. Pinterest’s social network model is based on users linking to any image found on the Internet, of which many are copyrighted. Since users pin texts or pictures onto their profiles without the permission of the copyright holder, this is an infringement of copyright law.<br />
<br />
To combat copyright infringement, Pinterest has implemented their own Copyright Policy that is in accordance with the [[Wikipedia: Digital_Millennium_Copyright_Act|Digital Millennium Copyright Act]], which is provided in their Terms of Service. Under the Pinterest Copyright Policy, “Pinterest respects the intellectual property rights of others and expects its users to do the same.”<ref>Pinterest Copyright & Trademark http://pinterest.com/about/copyright/</ref> With the policy, at its discretion, Pinterest may disable or terminate accounts that are repeatedly charged with infringement issues. Pinterest also has a protocol employed for copyright owners who would like to report copyright infringement within Pinterest, which includes writing to Pinterest and identifying the copyrighted work and the subject who infringed the copyright. When Pinterest complies with a copyright complaint, the pin, and its content is removed from Pinterest.<br />
<br />
Pinterest has attempted to comply with websites that do not want their content to appear on the site. They have implemented a "nopin" meta-tag that websites can put into their HTML codes that prevent users from pinning images that appear on that website. If a user tries to pin an image from a website that has the "nopin" meta-tag in place, the user will see a message that says "This site doesn't allow Pinning to Pinterest. Please contact the owner with any questions. Thanks for visiting!"<ref>Prevent saves to Pinterest from your site https://help.pinterest.com/en/articles/prevent-pinning-your-site</ref><br />
<br />
===Censorship===<br />
The Pinterest website describes the process of picture content removal if a user receives an excessive amount of copyright infringement notices: <br />
<br />
If you receive a notification that a Pin has been removed due a copyright complaint, it means that the Pin’s content has been deleted from Pinterest at the request of the content’s owner. If your account receives too many copyright complaints, you may lose the ability to Pin new content on Pinterest, and your account may be disabled completely.<br />
<br />
In a scenario where the user was not posting copyrighted material but was still asked to remove their content, the scenario reflects [[censorship]] by Pinterest. With digital editing materials available to users, it is hard to decipher the origin of pictures and other online material. Thus, it is hard to say who originally created or posted pictures, and the removal of pictures that do not infringe upon copyright laws could be described as censorship.<br />
<br />
Opponents believe stricter guidelines should be implemented with regards to properly citing or adding a source to the picture. Many pins have links attached to direct the viewer to the correct page, but if they have been screenshots or downloads there should be an option to add details regarding the origin of the picture.<br />
<br />
Indirect censorship is an ethical issue commonly overlooking Pinterest. Due to algorithms and the limitations of search results, users may not see a pin, while it may show up in another user's search result. This indirectly censors some pins since they are unable to access it due to the user's past history and pins. Although it seems reasonable for the search engine to display pins that match the user's interest, it should be up to the user to choose whether or not they want to see all relevant pins.<br />
<br />
===Scams and Hacks===<br />
Some pins often redirect the user to a separate link, which is often a third party website, which makes this site susceptible to scams and hacks. Women make up a large demographic of Pinterest users, so they can be baited by titles such as "Free Makeup Giveaways" or "10 Tips to Lose Weight", and when the link is clicked, malware could be downloaded or another scam may be in progress. Pinterest does not have filters for these scams, but filtering posts may prove to be difficult as scam posts are made to look exactly like the legitimate websites, making it difficult to differentiate between real and fake. Pinterest has yet to take action to mitigate this harm by checking linked websites are credible.<br />
<br />
=== PinDown ===<br />
PinDown is an application that allows users to download multiple images from their Pinterest boards and save them to their computer.<ref>Download http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html</ref> This may promote the idea of copyright infringement, as they could download an image, and post it elsewhere. If the user did not actively search for the image to download it, they may not even know where it originated, and cannot give credit. Pinterest and PinDown may increase copyright infringement by Pinterest users, without them knowing it. Another concern is the idea that some may not want their work to be shared on Pinterest, but are not given the option as the number of members submitting is too great.<br />
<br />
==See Also==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[[Facebook]]<br />
*[[Twitter]]<br />
*[[Instagram]]<br />
*[[Social Networking]]<br />
*[[StumbleUpon]]<br />
*[[Etsy]]<br />
*[[Ebay]]<br />
*[[Tumblr]]<br />
*[[Snapchat]]<br />
*[[Myspace]]<br />
</div><br />
<br />
==External Links==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable] <br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
*[http://crunchies2011.techcrunch.com/ Crunchies 2011]<br />
*[http://www.pinreach.com/ PinReach]<br />
*[http://www.repinly.com/ Repinly]<br />
*[http://pinpuff.com/ PinPuff]<br />
*[http://pinaquote.com/ Pin A Quote]<br />
*[http://www.pinerly.com/landing Pinerly]<br />
*[http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration]<br />
*[http://home.pintics.com/login Pintics]<br />
*[http://pinalerts.com/index/login PinAlerts]<br />
*[http://www.pinalyzer.com/ Pinalyzer]<br />
*[http://www.pinwords.com/ Pinwords]<br />
*[https://chrome.google.com/webstore/detail/pin-search--image-search-/okiaciimfpgbpdhnfdllhdkicpmdoakm Pin Search]<br />
*[http://pinterest.com/about/copyright/ Copyright Complaint Form]<br />
*[http://pinterest.com/about/terms/ Terms of Service]<br />
</div><br />
<br />
==References==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
<references/><br />
</div><br />
<br />
[[Category:Social Networking]]<br />
[[Category:Websites]]<br />
[[Category: Media Content]]<br />
[[Category:Corporations]]<br />
[[Category:GoldStar]]<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Pinterest&diff=72274Pinterest2018-04-22T04:18:36Z<p>Hillcm: </p>
<hr />
<div>{{nav-Bar|topics#A}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=430<br />
|NAME=Pinterest<br />
|LOGO=pin2.png<br />
|SCREENIMAGE=pin3.png<br />
|CAPTION=Pinterest Official Logo<br />
|IMAGEURL=http://pinterest.com<br />
|TEXT=<br />
|PLATFORM=Cloud Service, iOS, Android <br />
|PRODUCT=Social Networking Service<br />
|TYPE=Visual discovery and collection<br />
|SITEURL=http://pinterest.com<br />
|URLTEXT=www.pinterest.com<br />
|STATUS=Active<br />
|LAUNCH=2010 <ref>About Pinterest: Press https://about.pinterest.com/en/press/press</ref><br />
|AVAILABLE LANGUAGES= English, Français, Nederlands, Português(Europeu), Deutsch, Português (Brasil), Español (América), Español (España)<br />
<br />
}}<br />
{{initial|P}}'''interest''' is a website and mobile application that allows users to visually share and save ideas. Pinterest was founded as a [[Wikipedia: Silicon Valley|Silicon Valley]] start-up <ref>Forbes: Ben Silbermann, Evan Sharp, Co-founders, Pinterest http://www.forbes.com/pictures/mmj45ifhm/ben-silbermann-evan-sharp-co-founder-pinterest-2928/</ref> by [[Wikipedia: Ben_Silbermann|Ben Silbermann]], [[Wikipedia: Paul_Sciarra|Paul Sciarra]], and [[Wikipedia: Evan_Sharp|Evan Sharp]] in 2009. <ref>Founders: A group of eclectic collectors http://www.nypost.com/p/news/business/founders_group_of_eclectic_collecters_c6OCu79GSiJIs3oynbwliN/</ref> With over 150 million active users (as of October of 2016)<ref>Pinterest Has Reached a User Milestone http://www.businessinsider.com/pinterest-has-reached-a-user-milestone-2016-10</ref>, the platform is essentially a virtual vision board, where users can create and manage image collections of photos and other media content, nicknamed "pins." These pins are aggregated into groups called boards, which are determined by the individual users based on their various interests. Pinterest allows its users to both encounter and share photos and ideas of their favorite styles, tastes, and interests. As a medium, it relies heavily on interaction between users. For most, Pinterest serves as a platform to find inspiration and motivation, which is often achieved by browsing through a selection of pins posted by users in a network and pins suggested by the Pinterest algorithm. Because links are shared to many different boards on Pinterest, ethical concerns of copyright and censorship are some of the most relevant issues. <br />
<br />
<br />
==History==<br />
[[File:imgres.jpeg|300px|right|thumb|Pinterest Co-founders: Paul Sciarra, Ben Silbermann, and Evan Sharp]]<br />
Paul Sciarra left his job at a venture capital firm, [[Wikipedia:Radius_Ventures|Radius Ventures]], in New York, in 2008 and Ben Silbermann left his job at customer service and data entry at [[Google]] in California. The college friends came together to brainstorm ideas for a startup. The two started developing a product called Tote, a catalog for one's phone but struggled to gain necessary funds after the recession. After securing investors, the entrepreneurs turned away from Tote and began to work on Pinterest, going on to recruit Evan Sharp as another co-founder. <ref> Pinterest CEO: Here's How We Became The Web's Next Big Thing http://www.businessinsider.com/pinterest-founding-story-2012-4?op=1</ref> The three did not find immediate success with it. Pinterest’s initial slow growth concerned the trio, but only a year later, the site skyrocketed to success as it experienced wild growth. Created out of a childhood love to collect things from insects to stamps, Pinterest was built to let people continue their collections online.<ref>Meet Ben Silbermann<br />
http://articles.businessinsider.com/2012-03-13/tech/31158694_1_google-experience-products-silbermann-said/</ref><br />
<br />
Pinterest began as an exclusive website requiring an invitation to join and participate. In August 2012, Pinterest opened up to the public allowing anyone to sign up for an account and be a user.<ref>Pinterest Finally Ditches Invitations, Now Lets Anyone Sign Up http://techcrunch.com/2012/08/08/pinterest-open/</ref><br />
<br />
===Growth===<br />
Pinterest became the fastest site ever to break through the 10 million unique visitor mark when data reported from [[Wikipedia:comScore|comScore]] indicated the site had 11.7 million unique U.S. visitors on a monthly basis.<ref>Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Everhttp://techcrunch.com/2012/02/07/pinterest-monthly-uniques/</ref> Since early 2012, the number of Pinterest users to visit the site daily has increased 145%.<ref>This Is Everything You Need To Know About Pinterest http://techcrunch.com/2012/03/14/this-is-everything-you-need-to-know-about-pinterest-infographic/</ref> According to new data from social media marketer, Tamba, the number of daily unique visitors of Pinterest doubled in just two months from 2 million in January 2012 to 4 million in March 2012.<ref>Infographic Interest in Pinterest http://www.tamba.co.uk/blog/infographic-interest-in-pinterest-tamba/</ref><br />
<br />
According to the [[Wikipedia:Los_Angeles_Times|Los Angeles Times]], July of 2012 astonishingly saw over 29 million weekly visits to the site, over a 2183% increase from the previous year of 1.27 million weekly visits.<ref>Pinterest, Instagram continues meteoric growth http://articles.latimes.com/2012/aug/29/business/la-fi-tn-pinterest-instagram-growth-20120829/ </ref> As of now with over 150 million users, Pinterest's CEO attributes this growth not to better algorithms or engineering, but to the work of better marketing. Silbermann still believes what was needed and is still needed is simply a better way to distribute Pinterest to users. When Pinterest first started, Silbermann went to many local boutiques and other events and found people who had similar interests to his own and promoted Pinterest as a tool for an idea and interest sharing. <ref>The Secret Behind Pinterest’s Growth Was Marketing, Not Engineering, Says CEO Ben Silbermann http://allthingsd.com/20121020/the-secret-behind-pinterests-growth-was-marketing-not-engineering-says-ceo-ben-silbermann/</ref><br />
<br />
===User Statistics===<br />
Though Pinterest has become popular among a variety of social groups, it was reported in 2012 that 80% of U.S. users were women. In 2017, Pinterest showed similar statistics with 81% of its users being female.<ref name="omni">Pinterest by the Numbers: Stats, Demographics & Fun Facts https://www.omnicoreagency.com/pinterest-statistics/</ref> And although the site's main users are women, the site can also attract the interest of men, who make up 40% of new signups but only 7% of total pins. <ref name="omni"/>. Users in the U.S. are also more likely to be from Midwest. The average Pinterest users are ages 25 to 54, but a total of 67% of users fall under the age 40.<ref name="omni"/> <br />
<br />
===Funding===<br />
Since the launch of Pinterest, the company has raised millions from investors, including [[Wikipedia:Andreessen_Horowitz|Andreessen Horowitz]], [[Wikipedia:Firstmark_Capital|FirstMark Capital]], and [[Wikipedia: Bessemer_Venture_Partners|Bessemer Venture Partners]].<ref> Pinterest pins down $100M in new funding http://news.cnet.com/8301-1023_3-57435953-93/pinterest-pins-down-$100m-in-new-funding/</ref> In October 2011, venture capital firm Andreesen Horowitz gave Pinterest $27 million in funding that increased the value the social media site to $200 million.<ref>Pinterest valued at more than $1bn after raising $100m funding http://www.guardian.co.uk/technology/2012/may/17/pinterest-valued-at-more-than-1bn/</ref> Pinterest received a $100 million investment from a group led by Japanese online retailer [[Wikipedia:Rakuten|Rakuten Inc.]], further increasing the value of the company, bringing its total value to $1.5 billion.<ref>Pinterest Funding http://www.huffingtonpost.com/2012/05/17/pinterest-funding_n_1523253.html/</ref><br />
<br />
===Privacy===<br />
Users can browse any other users’ pins. Pinterest allows users to comment on or pin anything they desire, and visibility is not limited. On October 17, 2012, Pinterest announced that they had responded to the request for more privacy controls by adding new features. Now there is a flag icon on each user’s profile allowing anyone to block or report that individual’s profile for nudity or pornography, attacks on a group or individual, graphic violence, hateful speech or symbols, actively promotes self-harm, spam, or other. The block feature prevents users from the ability to follow each other’s boards and to repin and comment on one another’s pins. The report user feature alerts the Community team to evaluate the account that has been reported. <ref>Announcing Blocking & More Controls http://blog.pinterest.com/post/33785122869/announcing-blocking-more-controls/</ref><br />
<br />
[[File:pinterestpage.png|350px|thumb|right|Sample of a page]]<br />
[[File:pinterestcategory.png|200px|thumb|right|Categories]]<br />
<br />
==Features==<br />
'''Pins''': A pin is an image or video uploaded by the user, or taken from a website. A description can be added to the pin to explain or comment on if the purpose of the pin is not explicitly stated. If a pin is from an outside website, users can visit the website by clicking on the link located below each pin. There is direct user-to-user interaction when others “pin” the user's pictures. These pins allow the picture to appear on their own board. Pins represent the actual sharing of ideas between users. Without them, users would not be able to keep track of all of the ideas that they are fond of throughout the Pinterest application. Pinning is essentially a bookmark tool. It allows the user to refer back to a post at any given time and are organized and distributed throughout boards labeled by the user.<br />
<br />
'''Boards''': Pinboards are unique to each user’s page. Users can create and freely name as many boards as they desire by clicking the “Add” button on the navigation bar located on the top right. A pinboard categorizes pins properly onto specific boards in order to help others find the user's pins. These boards can be followed by anyone (depending on settings) and it enables the user to find their ideas in an efficient way when they actually are thinking about “trying” them. Within each board is an organized feed of all of the pins. It is easiest to process the pins if they are systematized and relatable to each other. The board can help the user specify the exact pin they would like to “try” out. <br />
<br />
*'''Secret Boards:''' From late 2012, Pinterest introduced a new type of board which users can mark as 'Secret.' Secret boards are not shared with followers and cannot be accessed by the public.<br />
<br />
'''Comments''': Users can add comments to pins on their own boards or others' boards, even if the users do not follow on another. A comment can be added by clicking on the pin and typing in the comment box, or by hovering over the picture of the pin and clicking on "Comment." Comments also allow for positive feedback and provide a user with motivation to finding even more pins that can relate themselves to other Pinterest users. <br />
<br />
'''Follow''': Users can follow other Pinterest members. There is the option to follow all of their boards or individual boards that the user likes. Friends on Pinterest can be easily found through connecting to [[Facebook]], [[Twitter]], and email accounts.<br />
<br />
'''Bookmarklet''': This “Pin it” button can be added to a browser’s bookmarks bar. Pinterest suggests this feature be installed due to its result of simplistic and easy pinning. Users can click on "bookmark" to open a menu from which one can pick the image they want to pin.<br />
<br />
'''Notifications''': Pinterest came out with new features that allow the user to filter their feed even more than they do. Pinterest interrupts a user’s day with posts that appeal to them. This creates constant connectivity between the Pinterest community and allows for the users to constantly be thinking of the pins they want to try. <br />
<br />
''Filters''': The people behind Pinterest created an algorithm that could filter a search query.<br />
<br />
''Buying/Selling''': Not only can users buy and sell products directly on Pinterest, but Pinterest is also used as an advertising website for items that are sold in stores. As a result, users may seek them out in the stores after pinning the product on Pinterest.<br />
<br />
''Trending''': The trending page allows the user to gain exposure to topics that they may not be following, but that majority of users are interested in at the moment. However, even though the posts below the most popular hashtags are trending, they are still filtered based on the user’s preferences. Posts become trending especially when users “try” them and love them. While this doesn’t necessarily maximize the number of new ideas being “tried” in the real world, it creates a desire for users to share their experiences of trying the same ideas by commenting and having conversations with other pinners on the post.<br />
<br />
==Usage==<br />
===Pinning===<br />
Pinning is the process of collecting pins and posting them and categorizing them onto boards. Members can pin any image from any website. There are three ways to pin.<br />
<br />
#Upload an image to Pinterest straight from a file on the computer by clicking the “Add” button. This is a great option to share personal pictures, ones that are not already hosted on the web.<br />
#If a user stumbles upon an image found on another site, like a blog, rather than saving the image to one’s computer, and re-uploading it to Pinterest, click the “Pin It” button that is installed. Clicking the “Pin It” button gives users the option to pin any of the images embedded on the webpage that they are currently visiting. The URL of the original source of the images are automatically set into the link. <br />
#“Repin” something that is already pinned. Browsing makes pinning simple. If one comes across an image of a photo they like on another's board, one has the option to “repin” or “like” it, which gives the owner of the original content the option to share the likes, without having them pinned on their board. This like will be added to the “likes” section of one's profile. Choosing “repin” cues the user to classify the pin to one of the user’s specific boards.<br />
<br />
It is an online bridge between the web and the real world. The site’s popularity is due to its simplicity. In general, it is all about ‘pinning’ things one finds interesting across the web and saving them in any ‘Board’ they like.<br />
<br />
===Pinterest Mobile Applications===<br />
[[File:120815074504-pinterest-mobile-apps-story-top.jpeg|300px|right|thumb|Pinterest Mobile Apps]]<br />
Pinterest has created apps for iPhone, iPad and [[Android]] that are available to download on the Pinterest website. The goal of these apps is to allow users to take Pinterest anywhere, so that users can pin, discover, and access information on the go.<ref>Pinterest for iPhone https://itunes.apple.com/us/app/pinterest/id429047995?mt=8/</ref> Pinterest launched the iPhone app and Pinterest Mobile in September 2011 and in May 2012, they redesigned and updated the app.<ref>Pinterest to Launch Android App at Google I/O 2012? http://siliconangle.com/blog/2012/06/25/pinterest-to-launch-android-app-at-google-io-2012/</ref> On August 14, 2012, Pinterest announced that an iPad app and Android app is now developed and available for download.<ref>Introducing Pinterest for Android, iPad and iPhone http://blog.pinterest.com/post/29392054155/introducing-pinterest-for-android-ipad-and-iphone/</ref><br />
<br />
These apps allow users to do almost everything capable of the Pinterest website. The app displays easy and accessible icons for browsing pins of people that users are following, exploring various pins from various categories, capturing pictures and instantly pinning them, news with the user’s recent activity, and profile displaying pints, boards, likes, the number of followers, and people followed.<br />
<br />
Pinterest founder Ben Silberman recently said that the transition to phones has been one of the biggest ways the company has changed. It started out as a website and now about 80% of its usage is by phone, something he could never have imagined five years ago<ref>Tech Insider Ben Silbermann Interview http://www.businessinsider.com/ben-silbermann-interview-pinterest-ceo-on-ipo-startups-2016-4</ref>.<br />
<br />
==Pinterest for Business==<br />
Many businesses use Pinterest as a marketing tool. They are able to use the site to increase awareness of their business and to monitor traffic by looking at the number of followers or engagement measures of likes, repins, and comments.<ref>9 Businesses Using Pinterest Contests to Drive Traffic and Exposure http://www.socialmediaexaminer.com/pinterest-contest/</ref> A number of companies such as [[Wikipedia:Procter_and_Gamble|Procter & Gamble]], [[Wikipedia:The_Wall_Street_Journal|The Wall Street Journal]], [[Wikipedia:Land%27s_End|Land’s End]], [[Etsy]], [[Ebay]], [[Wikipedia:Zappos|Zappos]], and [[Wikipedia: Whole_Foods_Market|Whole Foods Market]] use the social media platform for exposure to a large audience, attract new followers, engage with existing followers, increase visits to their websites, and generate sales.<ref>Pinterest tightens copyright rules http://www.cbsnews.com/8301-505124_162-57404630/pinterest-tightens-copyright-rules/</ref><ref>With Pinpointing, Zappos hooks up Pinterest with e-commerce http://news.cnet.com/8301-1023_3-57502559-93/with-pinpointing-zappos-hooks-up-pinterest-with-e-commerce/</ref> Pinterest is a great source for consumer insights, allowing businesses to understand their audience, and what they are discussing and sharing. Companies can check out their competition, and compare their products and services.<ref>Pinterest Contests and Sweeps, Turbocharged by Tech: This Holiday Season, Brands rely on Pinfluencer Promotions Platform to manage Holiday Promotions on Pinterest http://www.equities.com/news/news-headline-story?dt=2012-10-19&val=612380&d=1&cat=headline/</ref> Many brands are using Pinterest as an advertising strategy in order to drive sales via images and displays.<br />
<br />
===Promotions===<br />
Companies use Pinterest to promote their brands with contests and sweepstakes to improve user experience for their audience base. Companies like [[Wikipedia:Honda|Honda]], [[Wikipedia:Kotex|Kotex]], [[Wikipedia:Sephora|Sephora]], Gilt, [[Wikipedia:AMC_Theatres|AMC Theaters]], and [[Wikipedia:Victoria%27s_Secret|Victoria’s Secret]] have used Pinterest to connect with their audiences by offering giveaways. <ref name="jpl">Kautz, Kelly. [http://www.jplcreative.com/blog/index.php/2012/05/14/five-ways-pinterest-can-benefit-your-business/ "Five Ways Pinterest Can Benefit Your Business"] '''JPL'''(Retrieved 22 April 2017).</ref><br />
<br />
Contests allow brands to engage with consumers in a personal and cost-effective way as well as to help collect customer information, preferences, and feedback. The great majority of the above companies cater to women much more so than to men. Because of this, Pinterest, with its high percentage of users being women, was a successful and appropriate outlet for such promotions. With this, the collected consumer information, preferences, and feedback were for an appropriate population of the companies' markets.<br />
<br />
===Marketing Tools===<br />
[[File:12.jpeg|300px|right|thumb|PinReach Sign Up Site.]]<br />
There are tools that have been developed after the quick popularity of Pinterest growth. These marketing tools provide users with ways to measure their efforts and make it simple to pin content to boards, share and track better on Pinterest. Businesses use Pinterest to their advantage as the site provides the insights that they need to measure and optimize their content and engagement efforts on Pinterest.<ref>Di Gallo. [http://socialmediaweek.org/blog/tag/pinpuff/ "Getting Insights Into Your Pinterest Efforts"] '''Social Media Week''' (Retrieved 22 April 2017).</ref><br />
<br />
* [http://www.pinreach.com/ PinReach] provides insight and analytics to assist users to examine trends, and measure the success of the page. It allows users to see what their top five pins and boards are and provides the number of pins, boards, likes, followers, likes, repins, and comments.<br />
* [http://www.repinly.com/ Repinly] is a site that analyzes Pinterest users and content providing insights on popular content for pins and boards, how users spend their time, and most followed users.<ref>[Pinterest http://www.socialbrite.org/2012/06/27/5-tools-to-help-you-master-pinterest/ "5 Tools to Help You Master Pinterest"]</ref><br />
* [http://pinpuff.com/ PinPuff] is a site that allows users to explore social influence. It calculates a score and gives the user the number on a scale of 1-100 that indicates a user’s “pinfluence” measuring popularity, influence, and activity. The site gives suggestions of other users collecting similar content. This number can be used for marketing strategy for businesses and startups.<br />
*http://pinaquote.com/ Pin A Quote] allows users to easily pin any text found on the Internet.<ref>[http://www.huffingtonpost.com/2012/03/26/pinterest-terms-of-service-update_n_1379486.html#slide=more217065/ "Pinterest Terms of Service Get Updated"]</ref><br />
* [http://www.reachli.com/landing Reachli] is an analytic tool that helps keep track of repins, and likes that pins are receiving. It has an easy-to-use dashboard interface for browsing and pinning. The site helps devise the best strategy for content to increase user’s sales and increase traffic.<ref>[http://www.cypressnorth.com/blog/social-media/13-essential-tools-help-pin-share-track-better-pinterest/ "13 Essential Tools to Help Pin, Share & Track Better on Pinterest"]</ref><br />
* [http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration] is an app developed for Pinterest users on Windows Phones.<br />
* [http://home.pintics.com/login Pintics] provides the tools needed to manage activity and sales and help track and optimize their Pinterest traffic.<br />
* [http://pinalerts.com/index/login PinAlerts] is a site that alerts users via email when someone pins an image from their website onto Pinterest.<ref>[http://kleinconsult.net/2012/09/28/8-tools-for-managing-and-monitoring-pinterest/ "8Tools for Marketers Using Pinterest"]</ref><br />
* [http://www.pinalyzer.com/ Pinalyzer] is a service that suggests to users pins and people to follow based on analyzing the user’s followers and following people.<br />
* [http://www.pinwords.com/ Pinwords] allows a caption, description, or text to be added to an image instantly before it is pinned to Pinterest.<br />
* [https://itunes.apple.com/app/id544081731 PinDown] is an application which allows users to download multiple pictures at once from their Pinterest account.<ref>[http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html/ "Down for Pinterest"]</ref><br />
<br />
==Awards==<br />
[[File:pinterestaward.png|200px|right|thumb|Pinterest Wins Best Startup]]<br />
Pinterest won the Crunchies 2011 fifth annual competition award for Best New Startup of 2011. Hosted by GigaOm, VentureBeat, and TechCrunch, the Internet community is invited to choose the winner.<ref>The Crunchies Awards 2011 http://crunchies2011.techcrunch.com/about/</ref><br />
<br />
At South by Southwest Interactive 15th Annual Awards, Pinterest won the award for best Breakout Digital Trend 2012.<ref>SXSW Interactive Awards http://sxsw.com/interactive/awards/winners/</ref><br />
<br />
At the 2012 Webby Awards, Pinterest won awards for Best Social Media App and People’s Voice Winner in Best Visual Design Function.<ref>The Webby Awards http://www.webbyawards.com/webbys/current.php?season=16/</ref><br />
<br />
==Competition==<br />
Some competitors of Pinterest include: <br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable]<br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
All of these sites are some variation of social service for photo-clipping, which allows users to capture, share, and organize anything on the web.<br />
<br />
==Ethical Concerns==<br />
Pinterest users are told to read and agree to the Terms of Use for the company before signing for their account on the website. The Terms of Use at Pinterest requires its members to “acknowledge and agree” sole responsibility for any content or products generated by themselves on the website or any of its affiliates<ref>Exploring the Ethics of Pinterest http://ohmyhandmade.com/2012/entrepreneurship/pinterest-ethics/</ref>. Furthermore, regardless of whether the user is an individual or a business, the party that owns the Pinterest account also owns the content or products created on the site and its affiliates, also known as “Member Content”. This also applies to any sort of images stolen from other users; Pinterest clearly states in their Terms of Use that their Member Content must not misuse or appropriate content from a “third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights,” etc. <br />
<br />
<blockquote class="toccolours" style="float:none; padding: 10px 15px 10px 15px; display:table;"> "You acknowledge and agree that you are solely responsible for all Member Content that you make available through the Site, Application and Services. Accordingly, you represent and warrant that: (i) you either are the sole and exclusive owner of all Member Content that you make available through the Site, Application, and Services or you have all rights, licenses, consents and releases that are necessary to grant to Cold Brew Labs the rights in such Member Content, as contemplated under these Terms; and (ii) neither the Member Content nor your posting, uploading, publication, submission or transmittal of the Member Content or Cold Brew Labs’ use of the Member Content (or any portion thereof) on, through or by means of the Site, Application and the Services will infringe, misappropriate or violate a third party’s patent, copyright, trademark, trade secret, moral rights or other proprietary or intellectual property rights, or rights of publicity or privacy, or result in the violation of any applicable law or regulation.” – Pinterest, Terms of Use.<br />
</blockquote><br />
<br />
===Copyright Issues===<br />
Due to its picture-based content and ability to replicate through sociotechnical processes such as “re-pinning,” Pinterest has experienced various copyright concerns since its founding. Members of the Pinterest community are unaware of copyright laws and trademark infringement possibilities in the content they post to their accounts. Pinterest’s social network model is based on users linking to any image found on the Internet, of which many are copyrighted. Since users pin texts or pictures onto their profiles without the permission of the copyright holder, this is an infringement of copyright law.<br />
<br />
To combat copyright infringement, Pinterest has implemented their own Copyright Policy that is in accordance with the [[Wikipedia: Digital_Millennium_Copyright_Act|Digital Millennium Copyright Act]], which is provided in their Terms of Service. Under the Pinterest Copyright Policy, “Pinterest respects the intellectual property rights of others and expects its users to do the same.”<ref>Pinterest Copyright & Trademark http://pinterest.com/about/copyright/</ref> With the policy, at its discretion, Pinterest may disable or terminate accounts that are repeatedly charged with infringement issues. Pinterest also has a protocol employed for copyright owners who would like to report copyright infringement within Pinterest, which includes writing to Pinterest and identifying the copyrighted work and the subject who infringed the copyright. When Pinterest complies with a copyright complaint, the pin, and its content is removed from Pinterest.<br />
<br />
Pinterest has attempted to comply with websites that do not want their content to appear on the site. They have implemented a "nopin" meta-tag that websites can put into their HTML codes that prevent users from pinning images that appear on that website. If a user tries to pin an image from a website that has the "nopin" meta-tag in place, the user will see a message that says "This site doesn't allow Pinning to Pinterest. Please contact the owner with any questions. Thanks for visiting!"<ref>Prevent saves to Pinterest from your site https://help.pinterest.com/en/articles/prevent-pinning-your-site</ref><br />
<br />
===Censorship===<br />
The Pinterest website describes the process of picture content removal if a user receives an excessive amount of copyright infringement notices: <br />
<br />
If you receive a notification that a Pin has been removed due a copyright complaint, it means that the Pin’s content has been deleted from Pinterest at the request of the content’s owner. If your account receives too many copyright complaints, you may lose the ability to Pin new content on Pinterest, and your account may be disabled completely.<br />
<br />
In a scenario where the user was not posting copyrighted material but was still asked to remove their content, the scenario reflects [[censorship]] by Pinterest. With digital editing materials available to users, it is hard to decipher the origin of pictures and other online material. Thus, it is hard to say who originally created or posted pictures, and the removal of pictures that do not infringe upon copyright laws could be described as censorship.<br />
<br />
Opponents believe stricter guidelines should be implemented with regards to properly citing or adding a source to the picture. Many pins have links attached to direct the viewer to the correct page, but if they have been screenshots or downloads there should be an option to add details regarding the origin of the picture.<br />
<br />
Indirect censorship is an ethical issue commonly overlooking Pinterest. Due to algorithms and the limitations of search results, users may not see a pin, while it may show up in another user's search result. This indirectly censors some pins since they are unable to access it due to the user's past history and pins. Although it seems reasonable for the search engine to display pins that match the user's interest, it should be up to the user to choose whether or not they want to see all relevant pins.<br />
<br />
===Scams and Hacks===<br />
Some pins often redirect the user to a separate link, which is often a third party website, which makes this site susceptible to scams and hacks. Women make up a large demographic of Pinterest users, so they can be baited by titles such as "Free Makeup Giveaways" or "10 Tips to Lose Weight", and when the link is clicked, malware could be downloaded or another scam may be in progress. Pinterest does not have filters for these scams, but filtering posts may prove to be difficult as scam posts are made to look exactly like the legitimate websites, making it difficult to differentiate between real and fake. Pinterest has yet to take action to mitigate this harm by checking linked websites are credible.<br />
<br />
=== PinDown ===<br />
PinDown is an application that allows users to download multiple images from their Pinterest boards and save them to their computer.<ref>Download http://download.cnet.com/PinDown-for-Pinterest/3000-12511_4-75760861.html</ref> This may promote the idea of copyright infringement, as they could download an image, and post it elsewhere. If the user did not actively search for the image to download it, they may not even know where it originated, and cannot give credit. Pinterest and PinDown may increase copyright infringement by Pinterest users, without them knowing it. Another concern is the idea that some may not want their work to be shared on Pinterest, but are not given the option as the number of members submitting is too great.<br />
<br />
==See Also==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[[Facebook]]<br />
*[[Twitter]]<br />
*[[Instagram]]<br />
*[[Social Networking]]<br />
*[[StumbleUpon]]<br />
*[[Etsy]]<br />
*[[Ebay]]<br />
*[[Tumblr]]<br />
*[[Snapchat]]<br />
*[[Myspace]]<br />
</div><br />
<br />
==External Links==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
*[http://www.thefancy.com/ Fancy]<br />
*[https://bo.lt/app/explore/ Bo.lt]<br />
*[http://www.clipix.com/ Clipix]<br />
*[http://www.wookmark.com/ Woodmark]<br />
*[http://swell.stylehatch.co/ Swell for Tumblr]<br />
*[http://www.friendsheet.com/ Friendsheet]<br />
*[http://www.pixable.com/ Pixable] <br />
*[http://www.hunuku.com/ Hunuku]<br />
*[http://www.trippy.com/ Trippy]<br />
*[http://crunchies2011.techcrunch.com/ Crunchies 2011]<br />
*[http://www.pinreach.com/ PinReach]<br />
*[http://www.repinly.com/ Repinly]<br />
*[http://pinpuff.com/ PinPuff]<br />
*[http://pinaquote.com/ Pin A Quote]<br />
*[http://www.pinerly.com/landing Pinerly]<br />
*[http://www.windowsphone.com/en-us/store/app/pinspiration/1492c1ba-490d-4078-a529-1054028bac4c Pinspiration]<br />
*[http://home.pintics.com/login Pintics]<br />
*[http://pinalerts.com/index/login PinAlerts]<br />
*[http://www.pinalyzer.com/ Pinalyzer]<br />
*[http://www.pinwords.com/ Pinwords]<br />
*[https://chrome.google.com/webstore/detail/pin-search--image-search-/okiaciimfpgbpdhnfdllhdkicpmdoakm Pin Search]<br />
*[http://pinterest.com/about/copyright/ Copyright Complaint Form]<br />
*[http://pinterest.com/about/terms/ Terms of Service]<br />
</div><br />
<br />
==References==<br />
<div style="clear: both; margin: 1em 0 0 0; padding: 5px; border: 1px solid #AAA; background: #F0F8FF"><br />
<references/><br />
</div><br />
<br />
[[Category:Social Networking]]<br />
[[Category:Websites]]<br />
[[Category: Media Content]]<br />
[[Category:Corporations]]<br />
[[Category:GoldStar]]<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Google&diff=72273Google2018-04-22T04:10:08Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#G}}<br />
{{SoftwareInfoBox<br />
|HEIGHT=580<br />
|NAME=Google<br />
|LOGO=google_logo.jpeg<br />
|SCREENIMAGE=g1.png<br />
|CAPTION="Google"<br />
|IMAGEURL=http://google.com<br />
|TEXT=Site<br />
|PLATFORM=Cloud Service<br />
|PRODUCT=Search Engine<br>Gmail<br>Android<br />
|TYPE=E-Commerce<br>Cloud Based Storage<br>Software Developer<br>Hardware Developer<br />
|SITEURL=http://google.com<br />
|URLTEXT=www.google.com<br />
|STATUS=Active<br />
|LAUNCH=September 4, 1998<br />
}}<br />
'''Google''' is a worldwide search and advertising website wholly owned by the conglomerate Alphabet since its corporate restructuring in 2015<ref>Owens, Jeremy C. "Google Becomes Alphabet in 'crazy' Corporate Restructuring." N.p., 10 Aug. 2015. Web. 04 Apr. 2018.</ref>. Although the site's main focus is Internet services and software, Google is also pursuing cloud computing, hardware, and future technologies. Google is the largest U.S. based web company and Alphabet's largest subsidiary. Google has faced criticism for their data mining and targeted advertising practices, which were catalysts for an increased amount of debate surrounding the ethical implications of privacy online.<br />
<br />
==History==<br />
[[File:google.jpeg|200px|thumb|right|Larry Page and Sergey Brin]]<br />
<br />
Google was founded in 1998 by [[Larry Page]] and [[Wikipedia: Sergey Brin|Sergey Brin]]. Page graduated from the [[Wikipedia: University of Michigan|University of Michigan]] with a Bachelor of Science in Computer Engineering in 1994. Brin, originally born in Russia, graduated from the [[Wikipedia: University of Maryland|University of Maryland]], with a Bachelor of Science in Computer Science and Mathematics. Both Page and Brin later attended [[Wikipedia: Stanford University|Stanford University]] to complete their Master of Science degrees in Human Computer Interaction.<br />
<br />
Google began as a research project at Stanford, but Page and Brin quickly began working on it full-time.<ref name= History> Battelle, John [https://www.wired.com/2005/08/battelle/ Google's History]01. August. 2005. Web. 23. April. 2017</ref>. Google was founded on September 4th, 1998 in Menlo Park, California and has since moved its headquarters to Mountain View, California <ref name="History"/><br />
<br />
Page and Brinn's original intention was to create a product to "organize the world's information and make it universally accessible and useful".<ref>Thompson, Andrew. [http://panmore.com/google-vision-statement-mission-statement Google's Mission & Vision]''Panmore'' 28.January.2017.Web.23.April.2017.</ref> This feat was accomplished as a result of the PageRank algorithm, which sorted search results based on how many connections they have with other pages. This algorithm was based on the assumption that the more times a page is linked from another site, the more credible it is. This assumption proved to be accurate, and since then, the company has rapidly expanded by producing new suites of products and acquiring new companies in many different markets.<ref>Scores, [http://www.scores.org/graphics/google/ Google's Aquistion History] ''Scores' 'Retrieved. 23. April.2017</ref> These products include the [[Android]] operating system, the Chrome browser, and Google+, among others.<br />
<br />
Google's initial public offering occurred on August 19, 2004. The IPO sold over 18,605,052 shares for $85 each — one of the largest IPO at the time.<ref>CNN Business, [http://edition.cnn.com/2004/BUSINESS/08/19/google.ipo/ Google's IPO] ''CNN'' Retrieved. 23. April.2017</ref><br />
<br />
By 2018, Google's share price had risen to $1,009.95 and had greatly exceeded this initial market cap. Today, the firm is valued at over $700 billion with revenues exceeding $100 billion. <ref> Investopedia. [http://www.investopedia.com/articles/active-trading/081315/if-you-would-have-invested-right-after-googles-ipo.asp Looking back on Google's IPO] ''Investopedia''. 13. August. 2015. Retrieved. 23. April.2017</ref><br />
<br />
==Mantra==<br />
{{quotation|''"Don't be evil." ''<ref name="telecom"/>}}<br />
{{cquote<br />
|Don't be evil.<br />
|author=Google<br />
}}<br />
This mantra was established by Google employees [[Wikipedia: Paul Buchheit | Paul Buchheit]] and Amit Patel. Google claims that at the core of their company, "Don't be evil" encapsulates their values. Google has faced criticism from the public for actions viewed as inconsistent with their mantra. In 2006, Google struck a deal with China to censor Google's search results, and Steve Jobs publicly stated that he felt Google was not staying true to their mantra. After Alphabet bought Google in 2015, they replaced this mantra with "Do the right thing" in the company's Code of Conduct, though they have stated that "Don't be evil" remains Google's official mantra. <ref> Lawler, Richard. [https://www.engadget.com/2015/10/02/alphabet-do-the-right-thing/ "Alphabet replaces Google's 'Don't be evil' with 'Do the right thing'] '''Engadget''', (2 October 2015. Retrieved 21 April 2017.)</ref>9<br />
<br />
===Acquisitions===<br />
Since 2001, Google has acquired a significant number of technology companies, ranging from Keyhole, Inc, [[Android]], [[YouTube]], DoubleClick, and GrandCentral. Many of these acquisitions eventually became key aspects of Google's platform, including Google Groups, GoogleEarth, and Google Sites. <ref>Matt Reynolds, If you can't build it, buy it: Google's biggest acquisitions mapped,http://www.wired.co.uk/article/google-acquisitions-data-visualisation-infoporn-waze-youtube-android</ref> Google has also partnered with companies like NASA's Ames Research Center, Sun Microsystems, AOL, Time Warner, Microsoft, Nokia, and Ericsson to collaborate on product launches.<br />
<br />
===Alphabet Inc. Restructure===<br />
On August 10, 2015 Google founder and CEO Larry Page published a press release that announced the formation of Alphabet Inc. and the restructuring of Google and its subsidiary companies.<ref>Page, L. (2015). “G is for Google”. Google. https://googleblog.blogspot.com/2015/08/google-alphabet.html<br />
</ref> In the release, Page stated the motivation for the shakeup was to keep Google clean and accountable while making it easier for the company to work on new, ambitious projects. Alphabet allows each separate business or project to have more independence and freedom to grow since each initiative is treated as its own company.<ref>Goldman, D. (2015). “Google will become Alphabet today”. CNN Money. http://money.cnn.com/2015/10/02/technology/google-alphabet/</ref> As part of the restructure, Larry Page became Alphabet’s first CEO and fellow Google co-founder Sergey Brin became the company's first President. Senior Google member Eric Schmidt becomes Alphabet Inc.’s Executive Chairman. Page and Brin promoted Google Senior Vice President and Product Chief, Sundar Pichai, to the role of Google CEO.<ref>Yarow, J. (2015). “Google just announced a massive overhaul of its business structure” Business Insider. http://www.businessinsider.com/google-new-operating-structure-2015-8</ref> As of October 2, 2015, Alphabet Inc. replaced Google as the NASDAQ publicly traded entity of the company, at which point the company’s ticker symbol switched from “GOOGL” to just “GOOG”. <br />
<br />
During the restructure, Alphabet Inc. became the parent company for many of Google’s prominent ventures. Alphabet Inc. now oversees Nest, Calico, Fiber, Google Ventures and Capital, Verily, and X (formerly known Google X). Google remains the parent company of other projects and corporations such as Android, Search, YouTube, Ads, and Maps. Google’s shakeup and the formation of Alphabet Inc. was heralded by investors as a wise management move for the company.<ref>Alba, D. (2015). “After today, Google officially becomes Alphabet”. Wired. http://www.wired.com/2015/10/today-google-officially-becomes-alphabet/</ref><br />
<br />
===Data Centers===<br />
Google's approach to data centers is a major factor behind the company's growth. As of 2012, Google owns and operates seven data centers in the United States, three in Asia, and three in Europe. It has also recently began to offer inside looks into their data centers, capitalizing on the Google Street View technology.<ref>Google Data Centers, [http://www.google.com/about/datacenters/inside/locations/index.html]</ref>. However, in the past Google was well known for keeping information about even the number and locations of its data centers secret. <ref name="cnet_datacenters">Google uncloaks once-secret server, [http://news.cnet.com/8301-1001_3-10209580-92.html]</ref> Although it is difficult to form a complete picture, a rough outline of the history Google's data centers can be assembled indicating that Google has used a number of innovations and unconventional methods to build their data centers.<br />
<br />
====Data Center Structure====<br />
Google applied for a patent on using interchangeable modules in the form of standard shipping containers to build data centers in December of 2003.<ref name="guardian_datacpat">Metz, Cade. [http://www.theregister.co.uk/2007/10/10/google_patents_modular_data_centers/ Google nabs patent for Sun's Project Blackbox?], The Register. ''Situation Publishing'', 10 Oct. 2007. Web. 23 Apr.<br />
2017.</ref> However, the general idea may have come from an individual working at the Internet Archive project. <ref name="gcube-expired">The Google Cube: Taking over the digital world four ounces at a time, [http://www.pbs.org/cringely/pulpit/2005/pulpit_20051124_000474.html]</ref><ref name="gcube">Miller, Rich. [http://www.datacenterknowledge.com/archives/2007/10/09/google-patents-portable-data-centers/ Google Patents Portable Data Centers], Data Center Knowledge. ''Penton'', 9 Oct. 2007. Web. 23 Apr. 2017.</ref> Using enclosed components in this method allows Google to move large volumes of data quicker and more reliably than any other method in existence. <ref name="gcube"/> It also enables Google to quickly deploy customizable computing on a large scale, allowing it to build new services in new locations quickly. <ref name="gcube"/><br />
<br />
====Servers====<br />
In 2005, a Google employee published a paper warning that if the power usage and heat output of data centers was not reduced, the costs of cooling would render data centers prohibitively expensive. <ref name="PriceOfPerf">The Price Of Performance, [http://queue.acm.org/detail.cfm?id=1095420]</ref>. The same paper predicted that using more individual processing cores in parallel but at a slower speed would be more efficient than trying to eke out more performance from a single chip. It is likely that this line of thinking if not his direct recommendations were the reason that Google began to custom-design its own server hardware in 2005 <ref name="cnet_datacenters"/>. These custom servers included a number of features that increase efficiency as means to decrease the costs of each search query because Google's revenue per search query is very low<ref name="cnet_datacenters"/>. The differences included built-in batteries to circumvent the cost of monolithic battery backup systems as well as a unique power supply voltage of 12V to exploit both the differing costs of power supply hardware and the fact that copper wire transmits electricity more efficiently at 12V than the standard 5V. <ref name="cnet_datacenters"/>. <br />
<br />
====Networking Equipment====<br />
Google began designing custom networking equipment in their data centers in 2005. <ref name="wired_customhardware">Exclusive: Google, Amazon, and Microsoft Swarm China for Network Gear, [http://www.wired.com/wiredenterprise/2012/03/google-microsoft-network-gear/all/]</ref> Although the transition was partly motivated by the limitations of commercially available hardware, it was also motivated by the fact that Google could further decrease operational costs by ordering production runs of custom hardware from the same factories that equipment vendors use to outsource manufacturing. <ref name="wired_customhardware"/> A shipment of "Pluto" brand network switches determined to belong to Google was mistakenly delivered to the wrong destination in February of 2012 <ref name="wired_plutoswitch">Mystery Google Device Appears in Small-Town Iowa, [http://www.wired.com/wiredenterprise/2012/09/pluto-switch/all/]</ref> The recipients posted pictures of the hardware and some of the console output that resulted from attempting to interact with it to a thread on [http://www.networking-forum.com/ networking-forum.com]. <ref name="wired_plutoswitch"/><ref name="networkingpluto_1">[http://www.networking-forum.com/viewtopic.php?f=46&t=29803 “Exclusive Pictures of Google’s Pluto Switch"], 29 February 2012.</ref> They confirmed that Google is still using custom hardware and that since users could not identify some of the plugs on the hardware, Google is using esoteric or possibly proprietary cable standards on the hardware.<ref name="wired_plutoswitch"/><ref name="networkingpluto_1"/><br />
<br />
====Heat Management====<br />
Google has also attempted to decrease costs and increase revenue through unconventional methods of heat management.<ref name="wired_coolingdatac">Google Reincarnates Dead Paper Mill as Data Center of Future, [http://www.wired.com/wiredenterprise/2012/01/google-finland/]</ref> A past employee claimed in 2008 that Google uses CPUs that are rated to withstand higher temperatures than normal. <ref name="cputemp">Google Demanding Intel's Hottest Chips?, [http://www.theregister.co.uk/2008/10/15/google_and_intel/]</ref> This appears possible given that an employee later stated that in some cases, Google simply allows the hardware to run at higher temperatures and suspending any work that demands physical presence in any areas with unsafe temperatures instead of keeping a constant low temperature. <ref name="wired_coolingdatac"/> Google will also sometimes take advantage of existing cooling infrastructure by buying industrial properties that include it and transforming them into new data centers. <ref name="wired_coolingdatac">[http://www.google.com/about/datacenters/inside/locations/index.html]</ref><br />
<br />
===Advertising===<br />
Advertising is the number one revenue source for Google; 99% of their total revenue comes from advertising. Google helped to engineer a new type of competitive advertising that ensures the highest bidder pays only 1 cent above the second place bidder. Additionally, the company helped popularize the Pay Per Click (ppm) model now used by the majority of online advertisers.<br />
<br />
====Adwords====<br />
Adwords is a Google campaign that allows advertisers to rent out space and pay on a cost per click (CPC) basis. Before Adwords, sites were allowed to choose their own "keywords" - the words used by Google to determine the appropriate search results. But Larry Page, in developing his famous "Page Rank" system, decided that advertisers should have to do less work and developed an algorithm that mitigated users gaming the system.<br />
<br />
===Business===<br />
Google has business ventures in a variety of different web, software, and hardware products. Most of which are free to use and make Google little to no money. The majority of Google’s $109.65 Billion in 2017 revenue came from its search advertising in Google products which amount to $67.39 Billion. Advertising through AdWords, Google’s proprietary Ad engine which any site owner can use to sell Ads on their site, amounted for $17.54 Billion. The remaining revenue comes from a variety of sources ranging from corporate licensing of software, the Android store, Android smartphones, etc. <ref>"Google: Distribution of Revenue by Source 2017 | Statistic." Statista. N.p., n.d. Web. 04 Apr. 2018.</ref><br />
<br />
==Google Products==<br />
Google has an extensive list of [http://www.google.com/intl/en/about/products/ products].<br />
[[File:gapps.jpeg|200px|thumb|right|Some of Google Cloud Apps]]<br />
<br />
===Web===<br />
* [http://www.google.com/webhp?hl=en Web Search] Google is the most-used search engine on the web. Google uses a "PageRank" algorithm, named after Google founder Larry Page, to rank pages that show up in Google's results. The PageRank's main function is to search for text, on webpages in order to determine the relevancy to a user's search. Users also have the ability to filter their search result by category, including images, news, and books.<ref>[http://en.wikipedia.org/wiki/Google_Search/ Google Search]. ''Wikipedia''. Web. 23 Apr. 2017.</ref> Google's web search was the initial function of the website. Other features were added later, as the company expanded. Google web search also includes more specified databases that a user can use to more easily extract and find the information of the particular category they are looking for. Two specific examples of these types of searchable databases include Google Scholar and Google Trends which can be used to find academic journal articles backed with scholarly research or trends discovered under experimental condition respectively.<br />
<br />
*[http://www.google.com/chrome?hl=en&brand=CHMI Google Chrome] is Google's web browser. It has built-in malware and phishing protection, and auto-updates to ensure the latest security fixes. Google Chrome also has Google search embedded in the navigation bar, making searching fast and easy.<ref>[https://www.google.com/chrome/intl/en/more/index.html/ Explore the Chrome Browser]. ''Google''. Web. 23 Apr. 2017.</ref> <br />
<br />
*[http://support.google.com/websearch/bin/answer.py?hl=en&answer=30735 I'm Feeling Lucky] Feature - In addition to the standard Web search features, Google offers users the opportunity to click an "I'm Feeling Lucky" button, where it essentially predicts what a user is aiming to seek information about. Recently, Google has added other features that operate in the same way as the "I'm Feeling Lucky" button, only utilizing other emotions. For example, Google has added similar buttons such as "I'm Feeling Wonderful, Artistic, Playful, Hungry, etc.." which can be found and used by scrolling over the "I'm Feeling Lucky" button on the main search screen. The "I'm Feeling Hungry" feature will bring up a list of local restaurants with one click of the button. This, "I'm Feeling ________" feature is fun for users as long as aesthetically appealing. <ref>McEntegart, Jane. [http://www.tomshardware.com/news/Im-feeling-lucky-new-emotions-hungry-wonderful,17169.html "Google's 'I'm Feeling Lucky' Now Includes Other Emotions."], Tom's Hardware. ''Purch Group, Inc.'', 25 August 2012. Web. 23 Apr. 2017.</ref><br />
<br />
*[https://scholar.google.com/ Google Scholar] is a variant of the primary Google Search Engine launched in 2004 that focuses specifically searching for reputable scholarly articles that reference the desired terms or content matter. Search results are initially sorted into either articles or law case studies based on user preference but are further able to be sorted by the desired date of publishing. This search engine is particularly useful for users who are seeking officially published academic or research papers for the sake of further research or reference, and is widely accepted by universities as a reliable source for finding other reliable sources.<br />
<br />
===Mobile===<br />
*[http://www.android.com/ Android] Google's mobile platform, [[Android]] is the world's most popular mobile platform. In the worldwide OS market, Android leads the competition with 37.93% of the share, compared to Windows' 37%. <ref>[https://www.csoonline.com/article/3187011/mobile-wireless/android-is-now-the-worlds-most-popular-operating-system.html], ''CSO'', Web. 23 Apr. 2017.</ref> Android allows users to utilize Google Apps, in addition to the 600,000 apps available on Google Play.<ref>[http://www.android.com/about/ Android], ''Google, Inc.'', Web. 21 Apr. 2017.</ref> The Android operating system can be found on wearable devices, smartphones, tablet computers, and Android Auto. <br />
<br />
===Chromebook===<br />
Chromebooks are a new type of computer designed to help users get things done faster and easier. They run Chrome OS, an operating system that has multiple layers of security, cloud storage, and the most popular Google products built-in such as Google maps and Google Analytics.<ref>[http://www.google.com/intl/en/chrome/devices/features-different.html For No More Hassles], ''Google', Web. 21 April 2017.</ref> The Chromebook had originally been bashed by critics because of its inability to compete with laptops running operating systems such as windows. After its decline in price the Chromebook began to become very popular. Recently, Google has even offered the Chromebook to schools for a price as low as $99. With the increasing popularity of the Chromebook and its sibling the Pixelbook, there are rumors circulating that a new laptop sporting a 4k resolution is on the way.<ref>[https://www.theverge.com/circuitbreaker/2018/4/4/17199772/google-4k-atlas-chromebook-chrome-os-pixelbook-rumor], ''The Verge', Web. 4 April 2018.</ref><br />
<br />
===Media===<br />
*[[Google Books]] allows users to search for books, and in some cases, see a preview or view the entire book. If a book is in the public domain, users are also able to download a PDF copy.<br />
<br />
* [http://play.google.com/ Google Play] originally called Google Music, Google Play allows users to upload their music and other documents so that they can be accessed on other devices. Google Play syncs automatically, and can also be set to enable offline use.<br />
<br />
*[http://images.google.com/imghp?hl=en Google Images] is Google's specific search engine for photos.<br />
<br />
*[http://news.google.com/nwshp?hl=en Google News] is similar to Google images, Google News filter search results to only display news articles.<br />
<br />
*[http://picasa.google.com/intl/en/#utm_source=en-all-more&amp;utm_campaign=en-pic&amp;utm_medium=et Picasa] has been integrated into Google+, allowing users to easily share their images with their Circles on the social networking site.<ref>[https://support.google.com/picasa/answer/6383491?hl=en&visit_id=1-636284865804414848-2974375805&rd=3 "What's Happening to Picasa and Picasa Web Albums"], ''[[Google]]'', n.d.</ref><br />
<br />
*[http://www.picnik.com/ Picnik] After being acquired by Google in 2010, Picnik worked to create photo editing software for Google+. Though the site no longer exists, many of Picnik's features can be found in the Creative Kit in Google+.<ref>Picnick site [http://www.picnik.com/ picnik.com]</ref><br />
<br />
*[http://video.google.com/?hl=en Videos] Google Videos is Google's search engine for video content.<br />
<br />
*[[YouTube]], a video sharing site, was purchased by Google for 1.65 billion USD in November 2006.<ref>Youtube | http://en.wikipedia.org/wiki/Youtube</ref><br />
<br />
===Geo===<br />
*[http://earth.google.com/intl/en/ Earth] was originally created by Keyhole, Inc., a company funded by the Central Intelligence Agency. On October 27, 2004, Google acquired Keyhole, Inc. thus gaining the technology to begin the Google Earth platform. <ref> Google Acquisitions [http://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Google]</ref> Google Earth is a virtual globe incorporating many of Google's other platforms, including [[Google Street View]] to allow users access to view many parts of the world. In recent years, much of the focus has been in incorporating three-dimensional views into Google Earth's capabilities. Users can submit their own 3D structures by modeling them on [http://sketchup.google.com/intl/en/ SketchUp].<br />
** [http://www.google.com/sky/ Sky], an expansion of [http://earth.google.com/intl/en/ Earth], is an online sky viewer, collaborating images from multiple astronomical observatories. <br />
**[[Google Street View]] allows users to explore streets around the world in a 360-degree panoramic view. In Google Earth and Google Maps, the street view comes after the map has been zoomed in as far as possible.<br />
*[http://maps.google.com/?hl=en Maps] is a mapping system that allows map viewing and route planning, by car, foot, or public transportation. <br />
**[[Google Street View]] allows users to explore streets around the world in a 360-degree panoramic view. In Google Earth and Google Maps, the street view comes after the map has been zoomed in as far as possible.<br />
*[http://www.google.com/latitude?hl=en Latitude] is a mobile app allowing users to record their locations on Google Maps. Latitude was created from the software acquired from Dodgeball in 2005. The creators of Dodgeball eventually left Google to pursue the creation of Latitude competitor [https://foursquare.com/ Foursquare]. <ref> Google Latitude [http://en.wikipedia.org/wiki/Google_Latitude] </ref><br />
*[http://www.panoramio.com/ Panoramio] combines both photo sharing and location by allowing users to post pictures of given areas. This allows others to see user-generated images from sites.<br />
*[http://sketchup.google.com/intl/en/ SketchUp] is a program allowing for 3D models to be created and shared among users. SketchUp is the basis for user-generated 3D content within Google Earth.<br />
<br />
===Home & Office===<br />
*[http://www.google.com/calendar/render?hl=en Calendar] is a web-based system allowing Google account holders to manage time virtually. Advantages include being able to access the calendar from anywhere with internet access. Google calendar allows users to make different calendars for various parts of one's life. In addition, Google Calendar makes it simple to plan group meetings with its [https://blog.hubspot.com/marketing/google-calendar-tips "Find a Time"] feauture that syncs multiple calendars to find a free time for everyone. <br />
*[http://drive.google.com/?utm_medium=et&utm_source=about&utm_campaign=et-about Drive] allows users to access and edit files from anywhere by storing files on an external server rather than on one's computer drive. It is an expansion of the original Google Docs platform. Drive allows for collaborative editing on documents, spreadsheets, and presentations in addition to other features, such as creating forms. <br />
*[http://mail.google.com/mail?hl=en#utm_source=en-et-more&amp;utm_medium=et&amp;utm_campaign=en Gmail] is Google's e-mail platform. It offers Google searching abilities within mail, sorting capabilities, and the ability to link other Google applications to e-mail. As of June 2012, it is the most used e-mail platform in the world. <ref> Gmail Wikipedia [http://en.wikipedia.org/wiki/Gmail] </ref><br />
*[http://www.google.com/wallet/#utm_source=EMB&utm_medium=emb-more&utm_campaign=en-US Google Wallet] was launched in September of 2011. It allows users to store their credit/debit cards and store the information to pay online and in person, using one's mobile device. <br />
*[http://www.google.com/offers?utm_source=xsell&utm_medium=el&utm_campaign=moreproducts Google Offers] is a comprehensive search engine for online offers in discounted services and products. Google Offers is able to search through local, national, and internet retailers.<br />
*[http://sites.google.com/ Sites] is a component of Google that allows a user to create his or her own websites. Google Sites has an extensive list of "How to" pages to give any user the proper instruction to add content, create feeds, create advanced designs and coding, and limit who has access to the website. <br />
*[http://www.google.com/talk/ Talk] is a downloadable application that allows users to text chat other users in real time and make free PC-to-PC voice calls with other Google users in the U.S. <br />
*[http://translate.google.com/?hl=en Translate] gives users the ability to translate words and phrases into over 50 different languages.<br />
*[http://voice.google.com/ Voice] is a phone managing service that lets users create a "Google number" that can be linked and managed from their Google mail account. This Google number can be chosen by the user and can also be used to link several devices together. For example, one number can ring a home, work, and cell phone. <br />
**In addition, Google voice is directly integrated into one's e-mail enabling users to check their e-mail, call other phones, and text through their e-mail, all free of charge. Google voice can also manage voice mails, and maintain contact lists for specific phones. A new feature of Google Voice called "ListenIn" also lets users listen to an incoming caller's voice mail without having to answer the phone.<br />
*[http://www.google.com/cloudprint/learn/ Google Cloud Print] is a new service by Google that allow users to print documents from any printer that has a internet connection. Google Cloud Print can manage multiple printers and also lets users create a list of other users who are allowed to have access to those printers.<br />
<br />
===Social===<br />
*[http://www.Blogger.com Blogger] is a Google component that allows users to create and manage blogs through their Google account. Blogger also lets users subscribe to other bloggers within Google Blogger so they can follow posts.<br />
*[http://plus.google.com Google+] is a web community service that was created with a model very similar to [[Facebook]]. In addition to many of the same features of Facebook, users have the ability to group friends into various categories and give them unique access to their profile. Users can also create "Hangouts." "Hangouts" lets users create an event that can occur online or offline to communicate with other users through text, webcams, or in person. <br />
*[http://groups.google.com Groups] is a Google component that host forums that users can read, post, and reply to. Users can select specific categories or specific regions to find forums on specific topics. <br />
*[http://knol.google.com Knol] was a website for creating and managing written semi-professional documents through Google. The project was started in 2007, but was phased out as of April 2012 and replaced by another site called "Annotum."<ref>Wikipedia: Knol [http://en.wikipedia.org/wiki/Knol wikipedia.org]</ref> <br />
*[http://http://www.orkut.com/PreSignup Orkut] Is a social networking site that is very similar to Myspace and Facebook. Orkut was created in 2004 and currently is very popular in Brazil and India. Orkut does not have a real presence in the U.S. due to sites such as Facebook and Myspace. <br />
*[http://reader.google.com Reader] is a site that allows users to subscribe to and read news feeds. Google Reader also gives users to search for and subscribe to specific subjects, websites, companies, celebrities, sports teams, etc.<br />
<br />
===Innovation===<br />
*[http://www.google.com/drive/start/apps.html Google Drive] is a file creating, sharing, and managing system that is completely hosted through Google. The applications below are the main components of Google Drive. All of them are free to download and use. <br />
**Fusion Tables - used for created and combining multiple tables of data<br />
**Drawings - used to modify and enhance documents with graphs, charts, pictures, etc. <br />
**Forms - used to create and distribute online surveys<br />
**App Scripts - used to create and collaborate code with other Google users through Google's servers to enhance or create applications.<br />
*[http://en.wikipedia.org/wiki/PageRank PageRank] is an algorithm created by Google that ranks pages on the internet that appear in Google's search engine by the number of links that are connected to the site. A number of sites have created applications that will check a page's rank for you automatically.<br />
*[http://googleblog.blogspot.com/2010/10/what-were-driving-at.html Self-driving Cars] is a project that Google has been actively researching since 2005. The Google driverless car is supposed to completely navigate itself safely on the road with little to no control from the user. As of 2011, Google driverless cars have become legal to operate in Nevada and California. This link will give a better idea of what the capabilities of the Google driverless car could be:[http://www.youtube.com/watch?v=J17Qgc4a8xY A look inside Google's "Driverless Car"] The car has yet to get into an accident at Google's expense, and has driven thousands of miles with minimal interruptions. There is a growing concern for the artificial intelligence software that Google is using for the project, leaving many to worry whose fault an accident would be, the designer or the car itself.<br />
*[http://thenextweb.com/gadgets/2012/11/02/google-glass-best-invention-2012 Google Glass] or better known as "Project Glass," is a new Google innovation on augmented reality. The Google Glasses are minicomputers in the form of a pair of glasses that will give a user the ability to search, manage, and create data through the glasses seamlessly. Google Glass will be built around the existing Google Now and is currently in beta testing.<br />
[[File:googleTV.png|250px|thumb|right|Google TV]]<br />
*Google Labs existed from 2006 to 2011. It allowed developers to beta test new features on certain users, who could optionally choose to try the capabilities.<br />
*[[Google Clips]] is a smart camera that automatically captures short, seven second motion photographs through a machine learning algorithm called Moment IQ. This product is Google's attempt at entering the artificial intelligence market.<br />
<br />
===Google TV===<br />
Introduced in 2010, it is the first fully integrated web and TV platform that is expected to have a major impact in the internet TV market. Google TV is based on the [[Android]] operating system, the Chrome web browser and an Intel chipset. Google TV lets users surf the internet, download, and run Android apps full-screen or in a picture-in-picture window while watching TV. Viewers can even use their Android phones as remote controls. The service is available in two forms: Box buddy and integrated TV. Box buddy is a small box that sits between your existing cable (or satellite) receiver and the TV, that can connect to the internet through Wi-Fi. It also comes with a remote to control your cable box, TV, and stereo. The integrated TV setup is built right into specific TV models, such as many Vizio and Sony brand TVs.<br />
<br />
Google TV's launch was immensely hyped, however issues have arisen after Google failed to secure content deals with major media distributors before releasing the Google TV. Other issues included the hardware not being fully ready for release and the operating system inside the Google TV being almost at a beta level in it's completeness<ref>Lawler,<br />
Ryan. [https://gigaom.com/2011/11/11/logitech-google-tv-failure/ Logitech's Google TV failure: Too much, too soon], Gigaom. ''Knowingly, Inc.'', 11 Nov. 2011. Web. 23 Apr. 2017.</ref>. However, a second generation of Google TV products has shown more promise, as problems that plagued the previous generation have since been fixed. <ref>Conneally, Tim. [http://betanews.com/2012/07/09/google-tv-will-not-fail-again/ Google TV will not fail again]. ''Betanews'', 2012. Web. 23 Apr. 2017. </ref><br />
<br />
===Specialized Search===<br />
*[http://www.google.com/blogsearch?hl=en Blog Search] - used to find blogs on particular topics<br />
*[http://www.google.com/?tbm=pts&hl=en Patent Search] - used to find text of all U.S. patents<br />
*[http://www.google.com/finance Finance] - useful for finding business information, news, current event charts<br />
*[http://www.google.com/alerts?hl=en Alerts] - used to get email updates on the topics of a user's choice<br />
*[http://www.google.com/cse/?hl=en Custom Search] - used to create a customized search experience for a certain community<br />
*[http://www.google.com/shopping Google Shopping] - used to commercial uses to find products to buy<br />
*[http://scholar.google.com/schhp?hl=en Scholar] - used for academic research purposes to find scholarly articles<br />
*[http://www.google.com/trends/ Trends] - used for exploring past and present search trends<br />
<br />
==Ethical Implications==<br />
<br />
The use of search engines has generated a cluster of ethical concerns as the service gains prominence on the web.<br />
<br />
===Search Engine===<br />
Occupying approximately 65.5% of the search engine market, Google is the most widely-used search engine. Billions of users provide Google with data about their personal preferences by using the company's search engine. Google claims it uses this information to show its users more relevant advertisements and cater to their personal preferences. However, this information can also be used to create a detailed profile of a user. This profile can provide insights to the user's likes, dislikes, political inclinations, fashion preferences, sexuality, etc. In order to counteract, into what would be considered privacy intrusions, Google has an ''Incognito'' mode that can be used on their web browser, [[Wikipedia: Google Chrome|Google Chrome]], which allows the user to become anonymous to the company, avoiding the collection of the user's search and browsing data. Without this mode, users also have the chance to opt out of the data collection. <ref>Manjoo, Farhad. [http://www.alternet.org/story/14001/conspiracy_researcher_says_google%27s_no_good/ Conspiracy Researcher Says Google's No Good]. ''AlterNet'', 29 Aug.<br />
2002. Web. 23 Apr. 2017.</ref><ref>Wikipedia: Google [[Wikipedia:Google|wikipedia.org]]</ref> <ref>[https://privacy.google.com/take-control.html You have the controls to manage your privacy.], ''Google''.<br />
Web. 23 Apr. 2017.</ref> <br />
Google changes its algorithm around twice a week, and since it has not been patented, Google is not legally obliged to publish their algorithm for searches. The algorithm does have the ability to put certain websites before others, which has raised concern amongst pages shown. According to a study, <ref> https://www.theleverageway.com/blog/how-far-down-the-search-engine-results-page-will-most-people-go/ </ref> most users don't go past the fifth search. Google firmly states that they are not paid to put certain results at the top because they believe that paid inclusion is evil, but they do receive payments through advertisements. These advertisements are designed to look like a search result, but they have a small tag that says "Ad", which differentiates them.<br />
<br />
===Google Translate===<br />
[[File:Google_translate_1502382c.jpeg|250px|right|thumb|Google Translate]]<br />
There have been cases of students using Google Translate to cheat on foreign language assignments. Teachers and professors can typically detect when such translators are over-used, as they often translate phrases directly, losing their connotative meaning in the process. Google Translate has not implemented any mechanisms to prevent such cheating and thus certain instances of cheating have occurred with this program.<br />
<br />
===Google Street View===<br />
''Main Article: [[Google Street View]]''<br />
Privacy advocates argue that individuals should not appear in Google Street View without first giving Google consent to use their images. They are also concerned that other personal information such as vehicle license plate numbers or information concerning their children and pets could be revealed by Google Street View. As of 2010 and 2011, countries including India, Australia, and Germany have temporarily shut down [[Wikipedia: Google_Street_View|Google Street View]] and blocked new images from being uploaded.<br />
Users can report or flag images that they deem inappropriate. <ref>Mills, Elinor. [http://usatoday30.usatoday.com/tech/news/internetprivacy/2007-06-01-google-maps-privacy_N.htm/ Google's street-level maps raising privacy concerns.]. ''USA TODAY'', 4 June 2007. Web. 23 Apr. 2017.</ref><br />
<br />
===Google+===<br />
Google+ raises similar ethical concerns to other social media sites, like [[Facebook]]. Privacy, ownership, and censorship are three of the most prominent issues.<br />
<br />
As of July 31, 2011, it has been mandatory for all profiles to be public on Google+. While users can choose what specific information they wish to be made public, Google+ is mandating that a person's gender is publicly displayed on their profile (unlike Facebook, which does not require genders to be posted publicly on a person's profile page). <ref name="wonder"> [http://googleplus.wonderhowto.com/inspiration/4-possible-privacy-issues-pay-attention-google-0128578/ 4 Possible Privacy Issues to Pay Attention to in Google+.]. ''WonderHowTo, Inc.'', 8 July 2011. Web. 23 Apr. 2017.</ref> Comments made on public Google+ posts are also public, regardless of the privacy settings of the person who posts the comment. People who you have explicitly shared posts with can also repost your content without your permission to their own audiences. <ref name="wonder"/><br />
<br />
===Google Now===<br />
Google released a virtual personal assistant called Google Now, modeled after Apple's [[Siri]] with the latest update to [[Android]] 4.1 (Jelly Bean) for their Android phones. Google Now makes use of natural language processing to help respond to user questions. This technology is integrated with other Google/Android products to provide accurate responses. It simplifies many of the phone's functions to a simple voice command. There are concerns about GPS data being logged by default; this data has the potential to calculate how far users have traveled and to understand places and establishments that users travel every month. <ref>Chavez, Chris. [http://phandroid.com/2012/11/01/google-now-now-tracks-the-distance-you-walk-bike-or-travel-in-a-month/ Google Now tracks the distance you walk bike or travel in a month.], Phandroid.com. ''Neverstill Media, LLC.'', 1 November 2012.</ref> Google Now can also use GPS data to track local businesses nearby, based on users' previous searches. Google collects this data in order to improve the performance of their products. Ethical concern is found in whether this improvement of their instant service warrants the violation of user privacy; default privacy settings for Google Now are not explicitly communicated to users.<br />
<br />
===Copyright===<br />
Google, specifically [[Google Books]] and [[YouTube]] have been accused of breaching copyright law on numerous occasions. Particularly with YouTube, issues arise as content from created which is created by users. Google does not have internal moderating systems to search for copyrighted material. Instead, they rely on other users ability to report this content. The [[Stop Online Piracy Act]]. proposed a solution to the problem, but this solution would essentially deconstruct the fundamental principles behind content creation and upload on YouTube. YouTube does not prevent users from uploading copyright videos. However, the site will take down videos if complaints are filed from the copyright holder. If need be, YouTube has expressed the ability to ban users if they repeat the same copyright infringements.<br />
<br />
===Nymwars===<br />
Nymwars refers to the ongoing dispute regarding requiring internet service users to reveal their real names when using particular services. When Google+ launched in summer 2011, Google mandated users provide their real names; however, when users provided nicknames instead, Google expelled them from the site. This ignited a conflict within the blogging community concerning the perceived right to anonymity in online spaces. Google chairman Eric Schmidt responded to angry bloggers, explaining that Google+ is intended to be an identity service, and therefore, the usage of real names is imperative for it's intended function.<ref>Hill, Kashmir. [https://www.forbes.com/sites/kashmirhill/2011/08/29/googles-eric-schmidt-says-plus-is-an-identity-service-not-a-social-network/#5ce8a4ff5ce8 Google's Eric Schmidt Says Plus Is An 'Identity Service' Not A Social Network]. ''Forbes'', 29 Aug. 2011. Web. 23 Apr. 2017.</ref> Recently, Google has also encouraged [[YouTube]] users to supply their real name.<ref>[http://youtube-global.blogspot.com/2012/06/choosing-how-youre-seen-on-youtube.html Choosing how you’re seen on YouTube], Youtube Official Blog. ''Google'', 29 Jun. 2012. Web. 23 Apr. 2017.</ref><br />
<br />
===China===<br />
On March 22, 2010 Google China shut down due to disputes regarding censorship. It re-routed all mainland attempts from China to Hong-Kong's uncensored version of the site. This move by Google represented moral objections to repeated attacks from Chinese hackers on Google accounts. However, Google has maintained many of its Chinese operations and has not pulled out of the country completely. Its redirection of users was a step towards stopping internet censorship, though the Chinese government has clearly stated that self-censorship is a non-negotiable legal requirement.<br />
*'''Initial Censorship of Search Results''': In 2006, Google made the decision to censor search results for the Chinese version of their search service, located at [http://www.google.cn Google China]. Multiple groups spoke out about the company's decision, but Google responded to the negative feedback by stating that they felt they could make a more positive contribution in China by maintaining operations. They also stated that providing some results rather than none fit better with their company's mission.<ref>[http://news.bbc.co.uk/2/hi/technology/4645596.stm Google censors itself for China], ''BBC'', 25 Jan. 2006. Web. 23 Apr. 2017.</ref><br />
*'''Cyberattack and Removal of Censorship''': Google was a target of a cyberattack on January 12, 2010. The company reported that it was one of many targets, across multiple industries and that the attack had originated in China. Human rights activists interested in the well-being of those in China seemed to be the primary targets, according to Google. These attacks resulted in theft of intellectual property. Shortly after the event, Google threatened to leave China if the cyberattacks and intrusions did not stop.<ref>Arrington, Michael. [http://techcrunch.com/2010/01/12/google-china-attacks/ Google Defends Against Large Scale Chinese Cyber Attack: May Cease Chinese Operations], ''TechCrunch'', 12 Jan. 2010. Web. 23 Apr. 2017.</ref><ref name="nyt">Helft, Miguel, and David Barboza. [http://www.nytimes.com/2010/03/23/technology/23google.html Google Shuts China Site in Dispute Over Censorship]. ''The New York Times'', 22 Mar. 2010. Web. 23 Apr. 2017.</ref> In March of 2010, Google announced that they were going to redirect all Google.cn traffic to Google.hk, the domain for Google in Hong Kong. Doing so essentially removed all censorship that Chinese users were affected by prior to this change.<ref>[http://news.bbc.co.uk/2/hi/business/8581393.stm Google stops censoring search results in China], ''BBC'', 23 Mar. 2010. Web. 23 Apr. 2017.</ref> This seems to have been in response to continued cyberattacks after Google's warning.<br />
<br />
==See Also==<br />
{{resource<br />
|<br />
*[[Android]]<br />
*[[Censorship]]<br />
*[[Cloud Computing]]<br />
*[[Data Aggregation Online]]<br />
*[[Data Mining]]<br />
*[[Google Books]]<br />
*[[Google Street View]]<br />
*[[Information Transparency]]<br />
*[[Larry Page]]<br />
*[[Nymwars]]<br />
*[[Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Stop Online Piracy Act]]<br />
*[[Targeted Advertising]]<br />
}}<br />
<br />
==External Links==<br />
{{resource<br />
|<br />
*[http://www.google.com Google]<br />
}}<br />
<br />
==References==<br />
{{resource<br />
|<br />
<references/><br />
}}<br />
<br />
<br />
<br />
[[Category:Corporations]]<br />
[[Category:Services]]<br />
[[Category:Websites]]<br />
[[Category: Information Ethics]]<br />
[[Category:GoldStar]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Google&diff=72272Google2018-04-22T04:08:28Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#G}}<br />
{{SoftwareInfoBox<br />
|HEIGHT=580<br />
|NAME=google.com<br />
|LOGO=google_logo.jpeg<br />
|SCREENIMAGE=g1.png<br />
|CAPTION="Google"<br />
|IMAGEURL=http://google.com<br />
|TEXT=Site<br />
|PLATFORM=Cloud Service<br />
|PRODUCT=Search Engine<br>Gmail<br>Android<br />
|TYPE=E-Commerce<br>Cloud Based Storage<br>Software Developer<br>Hardware Developer<br />
|SITEURL=http://google.com<br />
|URLTEXT=www.google.com<br />
|STATUS=Active<br />
|LAUNCH=September 4, 1998<br />
}}<br />
'''Google''' is a worldwide search and advertising website wholly owned by the conglomerate Alphabet since its corporate restructuring in 2015<ref>Owens, Jeremy C. "Google Becomes Alphabet in 'crazy' Corporate Restructuring." N.p., 10 Aug. 2015. Web. 04 Apr. 2018.</ref>. Although the site's main focus is Internet services and software, Google is also pursuing cloud computing, hardware, and future technologies. Google is the largest U.S. based web company and Alphabet's largest subsidiary. Google has faced criticism for their data mining and targeted advertising practices, which were catalysts for an increased amount of debate surrounding the ethical implications of privacy online.<br />
<br />
==History==<br />
[[File:google.jpeg|200px|thumb|right|Larry Page and Sergey Brin]]<br />
<br />
Google was founded in 1998 by [[Larry Page]] and [[Wikipedia: Sergey Brin|Sergey Brin]]. Page graduated from the [[Wikipedia: University of Michigan|University of Michigan]] with a Bachelor of Science in Computer Engineering in 1994. Brin, originally born in Russia, graduated from the [[Wikipedia: University of Maryland|University of Maryland]], with a Bachelor of Science in Computer Science and Mathematics. Both Page and Brin later attended [[Wikipedia: Stanford University|Stanford University]] to complete their Master of Science degrees in Human Computer Interaction.<br />
<br />
Google began as a research project at Stanford, but Page and Brin quickly began working on it full-time.<ref name= History> Battelle, John [https://www.wired.com/2005/08/battelle/ Google's History]01. August. 2005. Web. 23. April. 2017</ref>. Google was founded on September 4th, 1998 in Menlo Park, California and has since moved its headquarters to Mountain View, California <ref name="History"/><br />
<br />
Page and Brinn's original intention was to create a product to "organize the world's information and make it universally accessible and useful".<ref>Thompson, Andrew. [http://panmore.com/google-vision-statement-mission-statement Google's Mission & Vision]''Panmore'' 28.January.2017.Web.23.April.2017.</ref> This feat was accomplished as a result of the PageRank algorithm, which sorted search results based on how many connections they have with other pages. This algorithm was based on the assumption that the more times a page is linked from another site, the more credible it is. This assumption proved to be accurate, and since then, the company has rapidly expanded by producing new suites of products and acquiring new companies in many different markets.<ref>Scores, [http://www.scores.org/graphics/google/ Google's Aquistion History] ''Scores' 'Retrieved. 23. April.2017</ref> These products include the [[Android]] operating system, the Chrome browser, and Google+, among others.<br />
<br />
Google's initial public offering occurred on August 19, 2004. The IPO sold over 18,605,052 shares for $85 each — one of the largest IPO at the time.<ref>CNN Business, [http://edition.cnn.com/2004/BUSINESS/08/19/google.ipo/ Google's IPO] ''CNN'' Retrieved. 23. April.2017</ref><br />
<br />
By 2018, Google's share price had risen to $1,009.95 and had greatly exceeded this initial market cap. Today, the firm is valued at over $700 billion with revenues exceeding $100 billion. <ref> Investopedia. [http://www.investopedia.com/articles/active-trading/081315/if-you-would-have-invested-right-after-googles-ipo.asp Looking back on Google's IPO] ''Investopedia''. 13. August. 2015. Retrieved. 23. April.2017</ref><br />
<br />
==Mantra==<br />
{{quotation|''"Don't be evil." ''<ref name="telecom"/>}}<br />
{{cquote<br />
|Don't be evil.<br />
|author=Google<br />
}}<br />
This mantra was established by Google employees [[Wikipedia: Paul Buchheit | Paul Buchheit]] and Amit Patel. Google claims that at the core of their company, "Don't be evil" encapsulates their values. Google has faced criticism from the public for actions viewed as inconsistent with their mantra. In 2006, Google struck a deal with China to censor Google's search results, and Steve Jobs publicly stated that he felt Google was not staying true to their mantra. After Alphabet bought Google in 2015, they replaced this mantra with "Do the right thing" in the company's Code of Conduct, though they have stated that "Don't be evil" remains Google's official mantra. <ref> Lawler, Richard. [https://www.engadget.com/2015/10/02/alphabet-do-the-right-thing/ "Alphabet replaces Google's 'Don't be evil' with 'Do the right thing'] '''Engadget''', (2 October 2015. Retrieved 21 April 2017.)</ref>9<br />
<br />
===Acquisitions===<br />
Since 2001, Google has acquired a significant number of technology companies, ranging from Keyhole, Inc, [[Android]], [[YouTube]], DoubleClick, and GrandCentral. Many of these acquisitions eventually became key aspects of Google's platform, including Google Groups, GoogleEarth, and Google Sites. <ref>Matt Reynolds, If you can't build it, buy it: Google's biggest acquisitions mapped,http://www.wired.co.uk/article/google-acquisitions-data-visualisation-infoporn-waze-youtube-android</ref> Google has also partnered with companies like NASA's Ames Research Center, Sun Microsystems, AOL, Time Warner, Microsoft, Nokia, and Ericsson to collaborate on product launches.<br />
<br />
===Alphabet Inc. Restructure===<br />
On August 10, 2015 Google founder and CEO Larry Page published a press release that announced the formation of Alphabet Inc. and the restructuring of Google and its subsidiary companies.<ref>Page, L. (2015). “G is for Google”. Google. https://googleblog.blogspot.com/2015/08/google-alphabet.html<br />
</ref> In the release, Page stated the motivation for the shakeup was to keep Google clean and accountable while making it easier for the company to work on new, ambitious projects. Alphabet allows each separate business or project to have more independence and freedom to grow since each initiative is treated as its own company.<ref>Goldman, D. (2015). “Google will become Alphabet today”. CNN Money. http://money.cnn.com/2015/10/02/technology/google-alphabet/</ref> As part of the restructure, Larry Page became Alphabet’s first CEO and fellow Google co-founder Sergey Brin became the company's first President. Senior Google member Eric Schmidt becomes Alphabet Inc.’s Executive Chairman. Page and Brin promoted Google Senior Vice President and Product Chief, Sundar Pichai, to the role of Google CEO.<ref>Yarow, J. (2015). “Google just announced a massive overhaul of its business structure” Business Insider. http://www.businessinsider.com/google-new-operating-structure-2015-8</ref> As of October 2, 2015, Alphabet Inc. replaced Google as the NASDAQ publicly traded entity of the company, at which point the company’s ticker symbol switched from “GOOGL” to just “GOOG”. <br />
<br />
During the restructure, Alphabet Inc. became the parent company for many of Google’s prominent ventures. Alphabet Inc. now oversees Nest, Calico, Fiber, Google Ventures and Capital, Verily, and X (formerly known Google X). Google remains the parent company of other projects and corporations such as Android, Search, YouTube, Ads, and Maps. Google’s shakeup and the formation of Alphabet Inc. was heralded by investors as a wise management move for the company.<ref>Alba, D. (2015). “After today, Google officially becomes Alphabet”. Wired. http://www.wired.com/2015/10/today-google-officially-becomes-alphabet/</ref><br />
<br />
===Data Centers===<br />
Google's approach to data centers is a major factor behind the company's growth. As of 2012, Google owns and operates seven data centers in the United States, three in Asia, and three in Europe. It has also recently began to offer inside looks into their data centers, capitalizing on the Google Street View technology.<ref>Google Data Centers, [http://www.google.com/about/datacenters/inside/locations/index.html]</ref>. However, in the past Google was well known for keeping information about even the number and locations of its data centers secret. <ref name="cnet_datacenters">Google uncloaks once-secret server, [http://news.cnet.com/8301-1001_3-10209580-92.html]</ref> Although it is difficult to form a complete picture, a rough outline of the history Google's data centers can be assembled indicating that Google has used a number of innovations and unconventional methods to build their data centers.<br />
<br />
====Data Center Structure====<br />
Google applied for a patent on using interchangeable modules in the form of standard shipping containers to build data centers in December of 2003.<ref name="guardian_datacpat">Metz, Cade. [http://www.theregister.co.uk/2007/10/10/google_patents_modular_data_centers/ Google nabs patent for Sun's Project Blackbox?], The Register. ''Situation Publishing'', 10 Oct. 2007. Web. 23 Apr.<br />
2017.</ref> However, the general idea may have come from an individual working at the Internet Archive project. <ref name="gcube-expired">The Google Cube: Taking over the digital world four ounces at a time, [http://www.pbs.org/cringely/pulpit/2005/pulpit_20051124_000474.html]</ref><ref name="gcube">Miller, Rich. [http://www.datacenterknowledge.com/archives/2007/10/09/google-patents-portable-data-centers/ Google Patents Portable Data Centers], Data Center Knowledge. ''Penton'', 9 Oct. 2007. Web. 23 Apr. 2017.</ref> Using enclosed components in this method allows Google to move large volumes of data quicker and more reliably than any other method in existence. <ref name="gcube"/> It also enables Google to quickly deploy customizable computing on a large scale, allowing it to build new services in new locations quickly. <ref name="gcube"/><br />
<br />
====Servers====<br />
In 2005, a Google employee published a paper warning that if the power usage and heat output of data centers was not reduced, the costs of cooling would render data centers prohibitively expensive. <ref name="PriceOfPerf">The Price Of Performance, [http://queue.acm.org/detail.cfm?id=1095420]</ref>. The same paper predicted that using more individual processing cores in parallel but at a slower speed would be more efficient than trying to eke out more performance from a single chip. It is likely that this line of thinking if not his direct recommendations were the reason that Google began to custom-design its own server hardware in 2005 <ref name="cnet_datacenters"/>. These custom servers included a number of features that increase efficiency as means to decrease the costs of each search query because Google's revenue per search query is very low<ref name="cnet_datacenters"/>. The differences included built-in batteries to circumvent the cost of monolithic battery backup systems as well as a unique power supply voltage of 12V to exploit both the differing costs of power supply hardware and the fact that copper wire transmits electricity more efficiently at 12V than the standard 5V. <ref name="cnet_datacenters"/>. <br />
<br />
====Networking Equipment====<br />
Google began designing custom networking equipment in their data centers in 2005. <ref name="wired_customhardware">Exclusive: Google, Amazon, and Microsoft Swarm China for Network Gear, [http://www.wired.com/wiredenterprise/2012/03/google-microsoft-network-gear/all/]</ref> Although the transition was partly motivated by the limitations of commercially available hardware, it was also motivated by the fact that Google could further decrease operational costs by ordering production runs of custom hardware from the same factories that equipment vendors use to outsource manufacturing. <ref name="wired_customhardware"/> A shipment of "Pluto" brand network switches determined to belong to Google was mistakenly delivered to the wrong destination in February of 2012 <ref name="wired_plutoswitch">Mystery Google Device Appears in Small-Town Iowa, [http://www.wired.com/wiredenterprise/2012/09/pluto-switch/all/]</ref> The recipients posted pictures of the hardware and some of the console output that resulted from attempting to interact with it to a thread on [http://www.networking-forum.com/ networking-forum.com]. <ref name="wired_plutoswitch"/><ref name="networkingpluto_1">[http://www.networking-forum.com/viewtopic.php?f=46&t=29803 “Exclusive Pictures of Google’s Pluto Switch"], 29 February 2012.</ref> They confirmed that Google is still using custom hardware and that since users could not identify some of the plugs on the hardware, Google is using esoteric or possibly proprietary cable standards on the hardware.<ref name="wired_plutoswitch"/><ref name="networkingpluto_1"/><br />
<br />
====Heat Management====<br />
Google has also attempted to decrease costs and increase revenue through unconventional methods of heat management.<ref name="wired_coolingdatac">Google Reincarnates Dead Paper Mill as Data Center of Future, [http://www.wired.com/wiredenterprise/2012/01/google-finland/]</ref> A past employee claimed in 2008 that Google uses CPUs that are rated to withstand higher temperatures than normal. <ref name="cputemp">Google Demanding Intel's Hottest Chips?, [http://www.theregister.co.uk/2008/10/15/google_and_intel/]</ref> This appears possible given that an employee later stated that in some cases, Google simply allows the hardware to run at higher temperatures and suspending any work that demands physical presence in any areas with unsafe temperatures instead of keeping a constant low temperature. <ref name="wired_coolingdatac"/> Google will also sometimes take advantage of existing cooling infrastructure by buying industrial properties that include it and transforming them into new data centers. <ref name="wired_coolingdatac">[http://www.google.com/about/datacenters/inside/locations/index.html]</ref><br />
<br />
===Advertising===<br />
Advertising is the number one revenue source for Google; 99% of their total revenue comes from advertising. Google helped to engineer a new type of competitive advertising that ensures the highest bidder pays only 1 cent above the second place bidder. Additionally, the company helped popularize the Pay Per Click (ppm) model now used by the majority of online advertisers.<br />
<br />
====Adwords====<br />
Adwords is a Google campaign that allows advertisers to rent out space and pay on a cost per click (CPC) basis. Before Adwords, sites were allowed to choose their own "keywords" - the words used by Google to determine the appropriate search results. But Larry Page, in developing his famous "Page Rank" system, decided that advertisers should have to do less work and developed an algorithm that mitigated users gaming the system.<br />
<br />
===Business===<br />
Google has business ventures in a variety of different web, software, and hardware products. Most of which are free to use and make Google little to no money. The majority of Google’s $109.65 Billion in 2017 revenue came from its search advertising in Google products which amount to $67.39 Billion. Advertising through AdWords, Google’s proprietary Ad engine which any site owner can use to sell Ads on their site, amounted for $17.54 Billion. The remaining revenue comes from a variety of sources ranging from corporate licensing of software, the Android store, Android smartphones, etc. <ref>"Google: Distribution of Revenue by Source 2017 | Statistic." Statista. N.p., n.d. Web. 04 Apr. 2018.</ref><br />
<br />
==Google Products==<br />
Google has an extensive list of [http://www.google.com/intl/en/about/products/ products].<br />
[[File:gapps.jpeg|200px|thumb|right|Some of Google Cloud Apps]]<br />
<br />
===Web===<br />
* [http://www.google.com/webhp?hl=en Web Search] Google is the most-used search engine on the web. Google uses a "PageRank" algorithm, named after Google founder Larry Page, to rank pages that show up in Google's results. The PageRank's main function is to search for text, on webpages in order to determine the relevancy to a user's search. Users also have the ability to filter their search result by category, including images, news, and books.<ref>[http://en.wikipedia.org/wiki/Google_Search/ Google Search]. ''Wikipedia''. Web. 23 Apr. 2017.</ref> Google's web search was the initial function of the website. Other features were added later, as the company expanded. Google web search also includes more specified databases that a user can use to more easily extract and find the information of the particular category they are looking for. Two specific examples of these types of searchable databases include Google Scholar and Google Trends which can be used to find academic journal articles backed with scholarly research or trends discovered under experimental condition respectively.<br />
<br />
*[http://www.google.com/chrome?hl=en&brand=CHMI Google Chrome] is Google's web browser. It has built-in malware and phishing protection, and auto-updates to ensure the latest security fixes. Google Chrome also has Google search embedded in the navigation bar, making searching fast and easy.<ref>[https://www.google.com/chrome/intl/en/more/index.html/ Explore the Chrome Browser]. ''Google''. Web. 23 Apr. 2017.</ref> <br />
<br />
*[http://support.google.com/websearch/bin/answer.py?hl=en&answer=30735 I'm Feeling Lucky] Feature - In addition to the standard Web search features, Google offers users the opportunity to click an "I'm Feeling Lucky" button, where it essentially predicts what a user is aiming to seek information about. Recently, Google has added other features that operate in the same way as the "I'm Feeling Lucky" button, only utilizing other emotions. For example, Google has added similar buttons such as "I'm Feeling Wonderful, Artistic, Playful, Hungry, etc.." which can be found and used by scrolling over the "I'm Feeling Lucky" button on the main search screen. The "I'm Feeling Hungry" feature will bring up a list of local restaurants with one click of the button. This, "I'm Feeling ________" feature is fun for users as long as aesthetically appealing. <ref>McEntegart, Jane. [http://www.tomshardware.com/news/Im-feeling-lucky-new-emotions-hungry-wonderful,17169.html "Google's 'I'm Feeling Lucky' Now Includes Other Emotions."], Tom's Hardware. ''Purch Group, Inc.'', 25 August 2012. Web. 23 Apr. 2017.</ref><br />
<br />
*[https://scholar.google.com/ Google Scholar] is a variant of the primary Google Search Engine launched in 2004 that focuses specifically searching for reputable scholarly articles that reference the desired terms or content matter. Search results are initially sorted into either articles or law case studies based on user preference but are further able to be sorted by the desired date of publishing. This search engine is particularly useful for users who are seeking officially published academic or research papers for the sake of further research or reference, and is widely accepted by universities as a reliable source for finding other reliable sources.<br />
<br />
===Mobile===<br />
*[http://www.android.com/ Android] Google's mobile platform, [[Android]] is the world's most popular mobile platform. In the worldwide OS market, Android leads the competition with 37.93% of the share, compared to Windows' 37%. <ref>[https://www.csoonline.com/article/3187011/mobile-wireless/android-is-now-the-worlds-most-popular-operating-system.html], ''CSO'', Web. 23 Apr. 2017.</ref> Android allows users to utilize Google Apps, in addition to the 600,000 apps available on Google Play.<ref>[http://www.android.com/about/ Android], ''Google, Inc.'', Web. 21 Apr. 2017.</ref> The Android operating system can be found on wearable devices, smartphones, tablet computers, and Android Auto. <br />
<br />
===Chromebook===<br />
Chromebooks are a new type of computer designed to help users get things done faster and easier. They run Chrome OS, an operating system that has multiple layers of security, cloud storage, and the most popular Google products built-in such as Google maps and Google Analytics.<ref>[http://www.google.com/intl/en/chrome/devices/features-different.html For No More Hassles], ''Google', Web. 21 April 2017.</ref> The Chromebook had originally been bashed by critics because of its inability to compete with laptops running operating systems such as windows. After its decline in price the Chromebook began to become very popular. Recently, Google has even offered the Chromebook to schools for a price as low as $99. With the increasing popularity of the Chromebook and its sibling the Pixelbook, there are rumors circulating that a new laptop sporting a 4k resolution is on the way.<ref>[https://www.theverge.com/circuitbreaker/2018/4/4/17199772/google-4k-atlas-chromebook-chrome-os-pixelbook-rumor], ''The Verge', Web. 4 April 2018.</ref><br />
<br />
===Media===<br />
*[[Google Books]] allows users to search for books, and in some cases, see a preview or view the entire book. If a book is in the public domain, users are also able to download a PDF copy.<br />
<br />
* [http://play.google.com/ Google Play] originally called Google Music, Google Play allows users to upload their music and other documents so that they can be accessed on other devices. Google Play syncs automatically, and can also be set to enable offline use.<br />
<br />
*[http://images.google.com/imghp?hl=en Google Images] is Google's specific search engine for photos.<br />
<br />
*[http://news.google.com/nwshp?hl=en Google News] is similar to Google images, Google News filter search results to only display news articles.<br />
<br />
*[http://picasa.google.com/intl/en/#utm_source=en-all-more&amp;utm_campaign=en-pic&amp;utm_medium=et Picasa] has been integrated into Google+, allowing users to easily share their images with their Circles on the social networking site.<ref>[https://support.google.com/picasa/answer/6383491?hl=en&visit_id=1-636284865804414848-2974375805&rd=3 "What's Happening to Picasa and Picasa Web Albums"], ''[[Google]]'', n.d.</ref><br />
<br />
*[http://www.picnik.com/ Picnik] After being acquired by Google in 2010, Picnik worked to create photo editing software for Google+. Though the site no longer exists, many of Picnik's features can be found in the Creative Kit in Google+.<ref>Picnick site [http://www.picnik.com/ picnik.com]</ref><br />
<br />
*[http://video.google.com/?hl=en Videos] Google Videos is Google's search engine for video content.<br />
<br />
*[[YouTube]], a video sharing site, was purchased by Google for 1.65 billion USD in November 2006.<ref>Youtube | http://en.wikipedia.org/wiki/Youtube</ref><br />
<br />
===Geo===<br />
*[http://earth.google.com/intl/en/ Earth] was originally created by Keyhole, Inc., a company funded by the Central Intelligence Agency. On October 27, 2004, Google acquired Keyhole, Inc. thus gaining the technology to begin the Google Earth platform. <ref> Google Acquisitions [http://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Google]</ref> Google Earth is a virtual globe incorporating many of Google's other platforms, including [[Google Street View]] to allow users access to view many parts of the world. In recent years, much of the focus has been in incorporating three-dimensional views into Google Earth's capabilities. Users can submit their own 3D structures by modeling them on [http://sketchup.google.com/intl/en/ SketchUp].<br />
** [http://www.google.com/sky/ Sky], an expansion of [http://earth.google.com/intl/en/ Earth], is an online sky viewer, collaborating images from multiple astronomical observatories. <br />
**[[Google Street View]] allows users to explore streets around the world in a 360-degree panoramic view. In Google Earth and Google Maps, the street view comes after the map has been zoomed in as far as possible.<br />
*[http://maps.google.com/?hl=en Maps] is a mapping system that allows map viewing and route planning, by car, foot, or public transportation. <br />
**[[Google Street View]] allows users to explore streets around the world in a 360-degree panoramic view. In Google Earth and Google Maps, the street view comes after the map has been zoomed in as far as possible.<br />
*[http://www.google.com/latitude?hl=en Latitude] is a mobile app allowing users to record their locations on Google Maps. Latitude was created from the software acquired from Dodgeball in 2005. The creators of Dodgeball eventually left Google to pursue the creation of Latitude competitor [https://foursquare.com/ Foursquare]. <ref> Google Latitude [http://en.wikipedia.org/wiki/Google_Latitude] </ref><br />
*[http://www.panoramio.com/ Panoramio] combines both photo sharing and location by allowing users to post pictures of given areas. This allows others to see user-generated images from sites.<br />
*[http://sketchup.google.com/intl/en/ SketchUp] is a program allowing for 3D models to be created and shared among users. SketchUp is the basis for user-generated 3D content within Google Earth.<br />
<br />
===Home & Office===<br />
*[http://www.google.com/calendar/render?hl=en Calendar] is a web-based system allowing Google account holders to manage time virtually. Advantages include being able to access the calendar from anywhere with internet access. Google calendar allows users to make different calendars for various parts of one's life. In addition, Google Calendar makes it simple to plan group meetings with its [https://blog.hubspot.com/marketing/google-calendar-tips "Find a Time"] feauture that syncs multiple calendars to find a free time for everyone. <br />
*[http://drive.google.com/?utm_medium=et&utm_source=about&utm_campaign=et-about Drive] allows users to access and edit files from anywhere by storing files on an external server rather than on one's computer drive. It is an expansion of the original Google Docs platform. Drive allows for collaborative editing on documents, spreadsheets, and presentations in addition to other features, such as creating forms. <br />
*[http://mail.google.com/mail?hl=en#utm_source=en-et-more&amp;utm_medium=et&amp;utm_campaign=en Gmail] is Google's e-mail platform. It offers Google searching abilities within mail, sorting capabilities, and the ability to link other Google applications to e-mail. As of June 2012, it is the most used e-mail platform in the world. <ref> Gmail Wikipedia [http://en.wikipedia.org/wiki/Gmail] </ref><br />
*[http://www.google.com/wallet/#utm_source=EMB&utm_medium=emb-more&utm_campaign=en-US Google Wallet] was launched in September of 2011. It allows users to store their credit/debit cards and store the information to pay online and in person, using one's mobile device. <br />
*[http://www.google.com/offers?utm_source=xsell&utm_medium=el&utm_campaign=moreproducts Google Offers] is a comprehensive search engine for online offers in discounted services and products. Google Offers is able to search through local, national, and internet retailers.<br />
*[http://sites.google.com/ Sites] is a component of Google that allows a user to create his or her own websites. Google Sites has an extensive list of "How to" pages to give any user the proper instruction to add content, create feeds, create advanced designs and coding, and limit who has access to the website. <br />
*[http://www.google.com/talk/ Talk] is a downloadable application that allows users to text chat other users in real time and make free PC-to-PC voice calls with other Google users in the U.S. <br />
*[http://translate.google.com/?hl=en Translate] gives users the ability to translate words and phrases into over 50 different languages.<br />
*[http://voice.google.com/ Voice] is a phone managing service that lets users create a "Google number" that can be linked and managed from their Google mail account. This Google number can be chosen by the user and can also be used to link several devices together. For example, one number can ring a home, work, and cell phone. <br />
**In addition, Google voice is directly integrated into one's e-mail enabling users to check their e-mail, call other phones, and text through their e-mail, all free of charge. Google voice can also manage voice mails, and maintain contact lists for specific phones. A new feature of Google Voice called "ListenIn" also lets users listen to an incoming caller's voice mail without having to answer the phone.<br />
*[http://www.google.com/cloudprint/learn/ Google Cloud Print] is a new service by Google that allow users to print documents from any printer that has a internet connection. Google Cloud Print can manage multiple printers and also lets users create a list of other users who are allowed to have access to those printers.<br />
<br />
===Social===<br />
*[http://www.Blogger.com Blogger] is a Google component that allows users to create and manage blogs through their Google account. Blogger also lets users subscribe to other bloggers within Google Blogger so they can follow posts.<br />
*[http://plus.google.com Google+] is a web community service that was created with a model very similar to [[Facebook]]. In addition to many of the same features of Facebook, users have the ability to group friends into various categories and give them unique access to their profile. Users can also create "Hangouts." "Hangouts" lets users create an event that can occur online or offline to communicate with other users through text, webcams, or in person. <br />
*[http://groups.google.com Groups] is a Google component that host forums that users can read, post, and reply to. Users can select specific categories or specific regions to find forums on specific topics. <br />
*[http://knol.google.com Knol] was a website for creating and managing written semi-professional documents through Google. The project was started in 2007, but was phased out as of April 2012 and replaced by another site called "Annotum."<ref>Wikipedia: Knol [http://en.wikipedia.org/wiki/Knol wikipedia.org]</ref> <br />
*[http://http://www.orkut.com/PreSignup Orkut] Is a social networking site that is very similar to Myspace and Facebook. Orkut was created in 2004 and currently is very popular in Brazil and India. Orkut does not have a real presence in the U.S. due to sites such as Facebook and Myspace. <br />
*[http://reader.google.com Reader] is a site that allows users to subscribe to and read news feeds. Google Reader also gives users to search for and subscribe to specific subjects, websites, companies, celebrities, sports teams, etc.<br />
<br />
===Innovation===<br />
*[http://www.google.com/drive/start/apps.html Google Drive] is a file creating, sharing, and managing system that is completely hosted through Google. The applications below are the main components of Google Drive. All of them are free to download and use. <br />
**Fusion Tables - used for created and combining multiple tables of data<br />
**Drawings - used to modify and enhance documents with graphs, charts, pictures, etc. <br />
**Forms - used to create and distribute online surveys<br />
**App Scripts - used to create and collaborate code with other Google users through Google's servers to enhance or create applications.<br />
*[http://en.wikipedia.org/wiki/PageRank PageRank] is an algorithm created by Google that ranks pages on the internet that appear in Google's search engine by the number of links that are connected to the site. A number of sites have created applications that will check a page's rank for you automatically.<br />
*[http://googleblog.blogspot.com/2010/10/what-were-driving-at.html Self-driving Cars] is a project that Google has been actively researching since 2005. The Google driverless car is supposed to completely navigate itself safely on the road with little to no control from the user. As of 2011, Google driverless cars have become legal to operate in Nevada and California. This link will give a better idea of what the capabilities of the Google driverless car could be:[http://www.youtube.com/watch?v=J17Qgc4a8xY A look inside Google's "Driverless Car"] The car has yet to get into an accident at Google's expense, and has driven thousands of miles with minimal interruptions. There is a growing concern for the artificial intelligence software that Google is using for the project, leaving many to worry whose fault an accident would be, the designer or the car itself.<br />
*[http://thenextweb.com/gadgets/2012/11/02/google-glass-best-invention-2012 Google Glass] or better known as "Project Glass," is a new Google innovation on augmented reality. The Google Glasses are minicomputers in the form of a pair of glasses that will give a user the ability to search, manage, and create data through the glasses seamlessly. Google Glass will be built around the existing Google Now and is currently in beta testing.<br />
[[File:googleTV.png|250px|thumb|right|Google TV]]<br />
*Google Labs existed from 2006 to 2011. It allowed developers to beta test new features on certain users, who could optionally choose to try the capabilities.<br />
*[[Google Clips]] is a smart camera that automatically captures short, seven second motion photographs through a machine learning algorithm called Moment IQ. This product is Google's attempt at entering the artificial intelligence market.<br />
<br />
===Google TV===<br />
Introduced in 2010, it is the first fully integrated web and TV platform that is expected to have a major impact in the internet TV market. Google TV is based on the [[Android]] operating system, the Chrome web browser and an Intel chipset. Google TV lets users surf the internet, download, and run Android apps full-screen or in a picture-in-picture window while watching TV. Viewers can even use their Android phones as remote controls. The service is available in two forms: Box buddy and integrated TV. Box buddy is a small box that sits between your existing cable (or satellite) receiver and the TV, that can connect to the internet through Wi-Fi. It also comes with a remote to control your cable box, TV, and stereo. The integrated TV setup is built right into specific TV models, such as many Vizio and Sony brand TVs.<br />
<br />
Google TV's launch was immensely hyped, however issues have arisen after Google failed to secure content deals with major media distributors before releasing the Google TV. Other issues included the hardware not being fully ready for release and the operating system inside the Google TV being almost at a beta level in it's completeness<ref>Lawler,<br />
Ryan. [https://gigaom.com/2011/11/11/logitech-google-tv-failure/ Logitech's Google TV failure: Too much, too soon], Gigaom. ''Knowingly, Inc.'', 11 Nov. 2011. Web. 23 Apr. 2017.</ref>. However, a second generation of Google TV products has shown more promise, as problems that plagued the previous generation have since been fixed. <ref>Conneally, Tim. [http://betanews.com/2012/07/09/google-tv-will-not-fail-again/ Google TV will not fail again]. ''Betanews'', 2012. Web. 23 Apr. 2017. </ref><br />
<br />
===Specialized Search===<br />
*[http://www.google.com/blogsearch?hl=en Blog Search] - used to find blogs on particular topics<br />
*[http://www.google.com/?tbm=pts&hl=en Patent Search] - used to find text of all U.S. patents<br />
*[http://www.google.com/finance Finance] - useful for finding business information, news, current event charts<br />
*[http://www.google.com/alerts?hl=en Alerts] - used to get email updates on the topics of a user's choice<br />
*[http://www.google.com/cse/?hl=en Custom Search] - used to create a customized search experience for a certain community<br />
*[http://www.google.com/shopping Google Shopping] - used to commercial uses to find products to buy<br />
*[http://scholar.google.com/schhp?hl=en Scholar] - used for academic research purposes to find scholarly articles<br />
*[http://www.google.com/trends/ Trends] - used for exploring past and present search trends<br />
<br />
==Ethical Implications==<br />
<br />
The use of search engines has generated a cluster of ethical concerns as the service gains prominence on the web.<br />
<br />
===Search Engine===<br />
Occupying approximately 65.5% of the search engine market, Google is the most widely-used search engine. Billions of users provide Google with data about their personal preferences by using the company's search engine. Google claims it uses this information to show its users more relevant advertisements and cater to their personal preferences. However, this information can also be used to create a detailed profile of a user. This profile can provide insights to the user's likes, dislikes, political inclinations, fashion preferences, sexuality, etc. In order to counteract, into what would be considered privacy intrusions, Google has an ''Incognito'' mode that can be used on their web browser, [[Wikipedia: Google Chrome|Google Chrome]], which allows the user to become anonymous to the company, avoiding the collection of the user's search and browsing data. Without this mode, users also have the chance to opt out of the data collection. <ref>Manjoo, Farhad. [http://www.alternet.org/story/14001/conspiracy_researcher_says_google%27s_no_good/ Conspiracy Researcher Says Google's No Good]. ''AlterNet'', 29 Aug.<br />
2002. Web. 23 Apr. 2017.</ref><ref>Wikipedia: Google [[Wikipedia:Google|wikipedia.org]]</ref> <ref>[https://privacy.google.com/take-control.html You have the controls to manage your privacy.], ''Google''.<br />
Web. 23 Apr. 2017.</ref> <br />
Google changes its algorithm around twice a week, and since it has not been patented, Google is not legally obliged to publish their algorithm for searches. The algorithm does have the ability to put certain websites before others, which has raised concern amongst pages shown. According to a study, <ref> https://www.theleverageway.com/blog/how-far-down-the-search-engine-results-page-will-most-people-go/ </ref> most users don't go past the fifth search. Google firmly states that they are not paid to put certain results at the top because they believe that paid inclusion is evil, but they do receive payments through advertisements. These advertisements are designed to look like a search result, but they have a small tag that says "Ad", which differentiates them.<br />
<br />
===Google Translate===<br />
[[File:Google_translate_1502382c.jpeg|250px|right|thumb|Google Translate]]<br />
There have been cases of students using Google Translate to cheat on foreign language assignments. Teachers and professors can typically detect when such translators are over-used, as they often translate phrases directly, losing their connotative meaning in the process. Google Translate has not implemented any mechanisms to prevent such cheating and thus certain instances of cheating have occurred with this program.<br />
<br />
===Google Street View===<br />
''Main Article: [[Google Street View]]''<br />
Privacy advocates argue that individuals should not appear in Google Street View without first giving Google consent to use their images. They are also concerned that other personal information such as vehicle license plate numbers or information concerning their children and pets could be revealed by Google Street View. As of 2010 and 2011, countries including India, Australia, and Germany have temporarily shut down [[Wikipedia: Google_Street_View|Google Street View]] and blocked new images from being uploaded.<br />
Users can report or flag images that they deem inappropriate. <ref>Mills, Elinor. [http://usatoday30.usatoday.com/tech/news/internetprivacy/2007-06-01-google-maps-privacy_N.htm/ Google's street-level maps raising privacy concerns.]. ''USA TODAY'', 4 June 2007. Web. 23 Apr. 2017.</ref><br />
<br />
===Google+===<br />
Google+ raises similar ethical concerns to other social media sites, like [[Facebook]]. Privacy, ownership, and censorship are three of the most prominent issues.<br />
<br />
As of July 31, 2011, it has been mandatory for all profiles to be public on Google+. While users can choose what specific information they wish to be made public, Google+ is mandating that a person's gender is publicly displayed on their profile (unlike Facebook, which does not require genders to be posted publicly on a person's profile page). <ref name="wonder"> [http://googleplus.wonderhowto.com/inspiration/4-possible-privacy-issues-pay-attention-google-0128578/ 4 Possible Privacy Issues to Pay Attention to in Google+.]. ''WonderHowTo, Inc.'', 8 July 2011. Web. 23 Apr. 2017.</ref> Comments made on public Google+ posts are also public, regardless of the privacy settings of the person who posts the comment. People who you have explicitly shared posts with can also repost your content without your permission to their own audiences. <ref name="wonder"/><br />
<br />
===Google Now===<br />
Google released a virtual personal assistant called Google Now, modeled after Apple's [[Siri]] with the latest update to [[Android]] 4.1 (Jelly Bean) for their Android phones. Google Now makes use of natural language processing to help respond to user questions. This technology is integrated with other Google/Android products to provide accurate responses. It simplifies many of the phone's functions to a simple voice command. There are concerns about GPS data being logged by default; this data has the potential to calculate how far users have traveled and to understand places and establishments that users travel every month. <ref>Chavez, Chris. [http://phandroid.com/2012/11/01/google-now-now-tracks-the-distance-you-walk-bike-or-travel-in-a-month/ Google Now tracks the distance you walk bike or travel in a month.], Phandroid.com. ''Neverstill Media, LLC.'', 1 November 2012.</ref> Google Now can also use GPS data to track local businesses nearby, based on users' previous searches. Google collects this data in order to improve the performance of their products. Ethical concern is found in whether this improvement of their instant service warrants the violation of user privacy; default privacy settings for Google Now are not explicitly communicated to users.<br />
<br />
===Copyright===<br />
Google, specifically [[Google Books]] and [[YouTube]] have been accused of breaching copyright law on numerous occasions. Particularly with YouTube, issues arise as content from created which is created by users. Google does not have internal moderating systems to search for copyrighted material. Instead, they rely on other users ability to report this content. The [[Stop Online Piracy Act]]. proposed a solution to the problem, but this solution would essentially deconstruct the fundamental principles behind content creation and upload on YouTube. YouTube does not prevent users from uploading copyright videos. However, the site will take down videos if complaints are filed from the copyright holder. If need be, YouTube has expressed the ability to ban users if they repeat the same copyright infringements.<br />
<br />
===Nymwars===<br />
Nymwars refers to the ongoing dispute regarding requiring internet service users to reveal their real names when using particular services. When Google+ launched in summer 2011, Google mandated users provide their real names; however, when users provided nicknames instead, Google expelled them from the site. This ignited a conflict within the blogging community concerning the perceived right to anonymity in online spaces. Google chairman Eric Schmidt responded to angry bloggers, explaining that Google+ is intended to be an identity service, and therefore, the usage of real names is imperative for it's intended function.<ref>Hill, Kashmir. [https://www.forbes.com/sites/kashmirhill/2011/08/29/googles-eric-schmidt-says-plus-is-an-identity-service-not-a-social-network/#5ce8a4ff5ce8 Google's Eric Schmidt Says Plus Is An 'Identity Service' Not A Social Network]. ''Forbes'', 29 Aug. 2011. Web. 23 Apr. 2017.</ref> Recently, Google has also encouraged [[YouTube]] users to supply their real name.<ref>[http://youtube-global.blogspot.com/2012/06/choosing-how-youre-seen-on-youtube.html Choosing how you’re seen on YouTube], Youtube Official Blog. ''Google'', 29 Jun. 2012. Web. 23 Apr. 2017.</ref><br />
<br />
===China===<br />
On March 22, 2010 Google China shut down due to disputes regarding censorship. It re-routed all mainland attempts from China to Hong-Kong's uncensored version of the site. This move by Google represented moral objections to repeated attacks from Chinese hackers on Google accounts. However, Google has maintained many of its Chinese operations and has not pulled out of the country completely. Its redirection of users was a step towards stopping internet censorship, though the Chinese government has clearly stated that self-censorship is a non-negotiable legal requirement.<br />
*'''Initial Censorship of Search Results''': In 2006, Google made the decision to censor search results for the Chinese version of their search service, located at [http://www.google.cn Google China]. Multiple groups spoke out about the company's decision, but Google responded to the negative feedback by stating that they felt they could make a more positive contribution in China by maintaining operations. They also stated that providing some results rather than none fit better with their company's mission.<ref>[http://news.bbc.co.uk/2/hi/technology/4645596.stm Google censors itself for China], ''BBC'', 25 Jan. 2006. Web. 23 Apr. 2017.</ref><br />
*'''Cyberattack and Removal of Censorship''': Google was a target of a cyberattack on January 12, 2010. The company reported that it was one of many targets, across multiple industries and that the attack had originated in China. Human rights activists interested in the well-being of those in China seemed to be the primary targets, according to Google. These attacks resulted in theft of intellectual property. Shortly after the event, Google threatened to leave China if the cyberattacks and intrusions did not stop.<ref>Arrington, Michael. [http://techcrunch.com/2010/01/12/google-china-attacks/ Google Defends Against Large Scale Chinese Cyber Attack: May Cease Chinese Operations], ''TechCrunch'', 12 Jan. 2010. Web. 23 Apr. 2017.</ref><ref name="nyt">Helft, Miguel, and David Barboza. [http://www.nytimes.com/2010/03/23/technology/23google.html Google Shuts China Site in Dispute Over Censorship]. ''The New York Times'', 22 Mar. 2010. Web. 23 Apr. 2017.</ref> In March of 2010, Google announced that they were going to redirect all Google.cn traffic to Google.hk, the domain for Google in Hong Kong. Doing so essentially removed all censorship that Chinese users were affected by prior to this change.<ref>[http://news.bbc.co.uk/2/hi/business/8581393.stm Google stops censoring search results in China], ''BBC'', 23 Mar. 2010. Web. 23 Apr. 2017.</ref> This seems to have been in response to continued cyberattacks after Google's warning.<br />
<br />
==See Also==<br />
{{resource<br />
|<br />
*[[Android]]<br />
*[[Censorship]]<br />
*[[Cloud Computing]]<br />
*[[Data Aggregation Online]]<br />
*[[Data Mining]]<br />
*[[Google Books]]<br />
*[[Google Street View]]<br />
*[[Information Transparency]]<br />
*[[Larry Page]]<br />
*[[Nymwars]]<br />
*[[Social Networking]]<br />
*[[Social Networking Services]]<br />
*[[Stop Online Piracy Act]]<br />
*[[Targeted Advertising]]<br />
}}<br />
<br />
==External Links==<br />
{{resource<br />
|<br />
*[http://www.google.com Google]<br />
}}<br />
<br />
==References==<br />
{{resource<br />
|<br />
<references/><br />
}}<br />
<br />
<br />
<br />
[[Category:Corporations]]<br />
[[Category:Services]]<br />
[[Category:Websites]]<br />
[[Category: Information Ethics]]<br />
[[Category:GoldStar]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Instagram&diff=71823Instagram2018-04-17T15:05:52Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#F}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=590<br />
|NAME=Instagram<br />
|LOGO=icon.jpeg<br />
|SCREENIMAGE=49803d8eb5ea235a5860ac942caece70_download-png-download-eps-instagram-logo-clipart-png_1024-1024.png<br />
|CAPTION=Official App Icon<br />
|IMAGEURL=<br />
|TEXT=<br />
|PLATFORM=Cloud Service<br>[[iOS]]<br>[[Android]] <br />
|PRODUCT=Instagram<br />
|TYPE=Photo Sharing Service <br />
|SITEURL=http://instagram.com<br />
|URLTEXT=www.instagram.com <br />
|STATUS=Active<br />
|LAUNCH=October 6, 2010 <ref> Desreumaux, Geoff. [http://wersm.com/the-complete-history-of-instagram/ Complete History of Instagram]''wersm''. 3. January. 2014. Web. 23. April. 2017</ref><br />
}}<br />
'''Instagram''' is a free [[Social Networking|social networking]] and photo sharing service that allows users to share aspects of their life through photos and short videos. Profiles can be public and private. Users can edit photographs with filters and share them with "followers" over the app and contacts in other social networks. Instagram originally required photos to have a 1:1 aspect ratio reminiscent of Kodak and Polaroid images, but new upgrades allow users to post photos with different dimensions. Initially only supported by Apple devices and the iTunes App Store, Instagram added support for the [[Android]] Camera phones running 2.2 or higher through [[Google]] Play in 2012.<ref>Murph,<br />
Darren. [http://www.engadget.com/2012/04/03/instagram-android-download-now-available/ Instagram Comes to Android, Available to Download Now], engadget. ''AOL Inc.'', 3 April 2012. Web. 23 Apr.<br />
2017.</ref> After reaching 30 million [[iOS]] users, Instagram won Apple's "iPhone App of the Year" award in 2011.<ref>Perez, Sarah. [http://techcrunch.com/2011/12/08/apple-picks-instagram-as-the-iphone-app-of-the-year/ Apple Picks Instagram As The “iPhone App Of The Year”]. ''TechCrunch'', 08 Dec. 2011. Web. 23 Apr. 2017.</ref> As of April 2017, the app has over 400 million registered users.<ref> Instagram Blog. [http://blog.instagram.com/post/129662501137/150922-400million Celebrating a Community of 400 Million] ''Instagram'', 22 Sept. 2015. Web. 23 Apr. 2017. </ref> In April 2012, [[Facebook]] made an offer to purchase Instagram for approximately $1 billion in cash and stock, completing the transaction on September 5th, 2012.<ref>Rusli, Evelyn M. [http://dealbook.nytimes.com/2012/04/09/facebook-buys-instagram-for-1-billion Facebook Buys Instagram for $1 Billion]. ''The New York Times'', 9 Apr. 2012. Web. 23 Apr. 2017.</ref> Instagram has fallen under criticism for issues regarding privacy, nudity, and the impact of the application felt by professional photographers.<br />
<br />
== History ==<br />
===Creation===<br />
The development of Instagram began in early 2010 in San Francisco when [[Wikipedia:Kevin Systrom|Kevin Systrom]], CEO and co-founder, left a job in marketing at NextStop to pursue his side project Burbn. He had been working on programming a prototype in basic [[Wikipedia:HTML5|HTML5]] in his free time, aiming to combine elements of [[Wikipedia:FourSquare|FourSquare]] and Mafia Wars. [[Wikipedia: Mike Krieger|Mike Krieger]], a former classmate of Systrom, joined Systrom's project in early 2010. Together, the pair raised $500k from investors [[Wikipedia: Andreessen Horowitz|Andreessen Horowitz]] and [[Wikipedia: Baseline Ventures|Baseline Ventures]] by March 5, 2010. <ref>Siegler, MG.[http://techcrunch.com/2010/03/05/burbn-funding/ TechCrunch: Burbn's Funding Goes Down Smooth. Baseline, Andreessen Back Stealthy Location Startup.]''Tech Crunch'', 5 Mar. 2010. Web 23 April 2017</ref> After full completion, the creators felt that the iPhone app Burbn was too cluttered with features. The app included checking into locations, posting pictures, making plans, and earning points for hanging out with friends. Krieger and Systrom later decided to focus on the photo-sharing aspect. Within eight weeks of switching tracks, Instagram was complete and ready to be launched at the end of March 2010. <ref>Synstrom, Kevin. [http://www.quora.com/Instagram/What-is-the-genesis-of-Instagram Quora: What is the genesis of Instagram?]''Quora'', 12. Jan. 2011. Web. 23 April 2017</ref><br />
<br />
<br />
In January 2011, hashtags were implemented by Instagram. When version 2.0 came out later that year in the App Store, it included photo filters, instant tilt-shift, high-resolution photos, optional borders, one click rotation, and an updated icon. Finally, on April 3, 2012, Instagram released the app for [[Android]] mobile devices after being exclusively available for iPhone users for 18 months. It was downloaded more than one million times in less than a day. Currently, there are no future plans to release the app for BlackBerry devices. <br />
<br />
<br />
The [[Android]] interface is slightly different, following a familiar [[Android]] [[Wikipedia:user-interface|user-interface]] design as opposed to the [[iOS]] featured design. The two platforms also have features that are available exclusively to each platform. <ref>Instagram Blog [http://blog.instagram.com/post/20411305253/instagram-for-android-available-now/ Instagram Blog: Instagram for Android — Available Now]''Instagram'', 3. April. 2012. Web. 23 April 2017</ref> The [[Android]] app allows users to use the phone’s native camera by changing the camera settings on the profile settings page to not “Use Instagram’s Advanced Camera,” a feature unavailable on the iOS platform. Until May, 2012, the Android app did not have the popular Tilt-Shift feature that allows users to create a blurring effect and add depth to the picture. <ref>Murphy, Savannah [http://mashable.com/2012/05/09/instagram-tilt-shift-android/ Mashable: Instagram Adds Popular Tilt-Shift Feature to Android App]''Mashable'', 9. May. 2012. Web. 23 April 2017</ref> Unlike on the iOS platform, the Android app does not allow users to apply different filters or effects before the photo is taken using the camera within Instagram. <br />
<br />
[[File:NewInstagramMobile.jpg|250px|thumb|right|Mobile View]]<br />
<br />
=== Facebook Acquisition ===<br />
In 2012, [[Facebook]] made an offer equating to $1 billion in cash and stock to purchase Instagram and all 13 of its employees in April 2012, a month before Facebook went public. The acquisition plans intended to keep the company independently managed, as many were concerned their photo sharing capabilities on Instagram would be thwarted by Facebook. The Office of Fair Trading approved the deal on August 14, 2012, and on August 22, 2012, the [[Wikipedia:Federal Trade Commission|Federal Trade Commission]] in the United States closed its investigation.<ref>BBC News [http://mashable.com/2012/05/09/instagram-tilt-shift-android/ Mashable: Instagram Adds Popular Tilt-Shift Feature to Android App]''BBC News'', 14. August. 2012. Web. 23 April 2017</ref> On September 6, 2012, the deal between Instagram and [[Facebook]] officially closed. Instagram is now currently operating under the ownership of [[Facebook]].<ref>Upbin,Bruce.[http://www.forbes.com/sites/bruceupbin/2012/04/09/facebook-buys-instagram-for-1-billion-wheres-the-revenue/ Forbes: Facebook Buys Instagram For $1 Billion. Smart Arbitrage.]''Forbes'', 09. April. 2012. Web. 23 April 2017</ref><br />
<br />
===Instagram and Twitter===<br />
When Instagram first launched, users were able to share their photos directly to [[Twitter]] as Twitter cards. On December 4, 2012, Instagram disabled the ability for Twitter to properly display Instagram photos on its website and coinciding applications. The move escalated tensions between the two companies, which were once friends in the battle against Facebook but have now become direct competitors. <ref name= Display>Bilton, Nick.[http://bits.blogs.nytimes.com/2012/12/05/twitter-loses-ability-to-properly-display-instagram-photos/ Twitter Loses Ability to Properly Display Instagram Photos]''New York Times''.05. December. 2012. Web. 23 April 2017</ref> Although Instagram and Twitter worked closely together during Instagram’s early days, relations between the two companies have soured since the Facebook acquisition. <ref name= 'Display'/><br />
<br />
Since shutting off users' abilities to use Instagram, Twitter has released its own photo filter features, allowing users to create effects quite similar to those available on Instagram.<ref>Terdiman, Daniel. [http://news.cnet.com/8301-1023_3-57558617-93/instagram-photos-still-visible-in-tweets-in-tweetdeck/ Some Instagram photos still viewable on Twitter] ''Cnet'' .11. December. 2012. Web. 23 April 2017</ref> Instagram users can still share their photos to Twitter, but instead of tweeting the photo as a Twitter card, they can only tweet the link to the photo, which will take Twitter users to the Instagram app or website.<br />
<br />
== Use ==<br />
After the application is downloaded, an icon appears on the home screen of the user's device through which they can access the application. Once they access the app, the user must register and create a free account with a username and password. They can optionally add an email address or phone number to the account. The user can also add a photograph, which will appear on the user's profile along with their posted photos and username. Once an account has been registered, a user has the option to find friends through Facebook or by simply searching. Unlike Facebook, however, users do not have to follow friends who are following them and vice versa. Instagram also provides a list of recommended users to follow. Once a user follows other users, photos posted to the application will appear in a stream on the home page. A user can like or comment on those photos, which will send a notification to the user who posted the photos as well as appear with that photo on all other users' homepages. Along the bottom of the screen are five navigation icons. The first is the home page. The second is a magnifying glass that represents the "Explore" page. In addition to being able to search for other users or hashtags, the user can also find a list of suggested images that the app curates based on who the user follows and what photos they have liked. The middle button is a camera icon where users can select photos to edit from their phone's camera reels or take photos from the app's camera. The third is the notification page, which consists of two tabs: the first is a newsfeed of new followers, comments, and likes, and the second is a "following" section that serves as a short news feed of other users' activities. The last icon in the bottom right corner leads to the registered user's profile. <br />
<br />
From the settings page, the user has the option to make their profile private. This means that all of that user's photos are private unless other users request to follow that user. Upon acceptance of that request, other users can see those private photos. Users can also turn on photo sharing to other social networks through their settings. <br />
<br />
To post a picture, users click the bottom center camera icon where they can proceed to take a picture or use a previously taken photo. Once a user chooses a photo, filters can be added as well as a number of photo editing effects. Users can then add a caption or geotag and post it for all of that user's followers to see. <br />
<br />
===Users===<br />
As of 2016, Instagram reported having over 400 million accounts that are active monthly. The Pew Research Center found that 28% of all Americans on the internet have an Instagram account. 31% of all internet-using American women use Instagram versus 24% of Internet-using American men. In the United States, Instagram is most popular with people in the 18-29 age bracket, with over 50% of this demographic with Instagram accounts. <ref>Duggan, Maeve. [http://www.pewinternet.org/2015/08/19/the-demographics-of-social-media-users/ Pew Internet: Instagram User Demogrpahics] ''Pew Internet''. 19. August. 2015. Web. 23 April 2017</ref> Instagram's user base extends beyond just the United States, as almost 80% of users are from outside the US. <ref>Booton, Jenifer. [http://www.marketwatch.com/story/most-instagram-users-are-outside-the-us-2016-06-21 Market Watch: Instagram User Demogrpahics] ''Market Watch''. 21 June 2016. Web. 23 April 2017</ref> On average, Instagram users collectively share over 80 million photos, and like 3.5 billion posts per day. <br />
<br />
[[File:instagrampics.png|left|350px|thumb|right|Sample of a page]]<br />
<br />
===Professional Instagrammers===<br />
Some people have been able to use their huge following on Instagram as a way to gain endorsements, and even use their photos as a sort of social currency. For instance, Cole Rise, a professional wilderness photographer with over 900,000 Instagram followers, paid for his stay at a Nicaraguan hotel by posting a photo endorsement of the location on his Instagram account <ref name="insta"> Heath, Alex. [http://www.businessinsider.com/what-its-like-to-be-a-professional-instagrammer-2015-7 Life of A professional Instagrammer] ''Business Insider''. July 30, 2015. </ref>. Rise has also done professional posts on his page for the Norwegian Tourism Board, NASA, and jewelry companies <ref name="insta"/>. Though Cory Staudacher was not originally a professional photographer, he still entered into the realm of professional Instagram posting. With over 563,000 followers, Staudacher has done endorsed posts for big-name companies including Apple, Ford, Gap, Nordstrom, Acura, Dos Equis, Warby Parker, and Marriott Hotels <ref name="insta"/>. He refers to these types of posts as "social influencer campaigns", in which companies provide the poster with royalties in return for their endorsement post on Instagram. For example, Acura provided Staudacher with a vehicle to drive at the Sundance Film Festival with the promise that he would photograph the car amid the scenery of Park City, Utah <ref name="insta"/>. These kinds of campaigns on social media reach consumers in a way that billboards of TV spots cannot. Both of these individuals belong to a collective of similar visual artists with large followings on social media known as Tinker Street <ref name="insta"/>. This is just one example of a number of these kinds of agencies that promote this new genre of social media endorsement and advertising.<br />
<br />
== Features ==<br />
====Timeline====<br />
Instagram displays a feed on the home page for users to view all of the photos that have been posted by their followers in chronological order. In 2016, Instagram began testing an algorithmic timeline that would organize posts on the home display based on popularity personalized to the user<ref>Isaac, Mike. [https://www.nytimes.com/2016/03/16/technology/instagram-feed.html?_r=0 Instagram may Personalize your Feed]"New York Times". 15. March. 2016. Web. 23. April. 2017. </ref>, similar to the way that [[Facebook]] and [[Twitter]] organize one's newsfeed and [[Twitter]] feed.<br />
<br />
==== Hashtags ====<br />
The hashtag was adopted from Twitter as a means for categorizing photos. Users can implement [[Wikipedia:hashtags|hashtags]] to tag photos and help other users discover photos. Instagram encourages users to use specific and relevant tags to help users find photos more easily. The hashtags feature has created a new Instagram phenomenon. Some users have adopted a habit to come up with as many hashtags as possible that are relevant to a picture. This is an attempt to have their pictures seen by as many Instagram users as possible through certain hashtags. Hashtags are generally collated by the app as part of the Discover feature, which offers image suggestions based on a user's individual preferences and patterns.<br />
<br />
==== Liking ====<br />
Users can like photos by clicking the heart-shaped button or by double tapping the photograph itself. With enough likes, a photo can make it to the Popular Page, which is broadcasted to every Instagram user and is constantly in flux. Depending on the number of likes, either each individual's username is displayed or the number of likes is displayed, as to not exceed four lines of text on the screen.<br />
<br />
====Commenting====<br />
Users can comment on photos to share their thoughts on a post. The most frequent comments are displayed on a user's Timeline. Tapping on "View all comments" on a photo in the Timeline expands the comments section on a new screen.<br />
<br />
====Tagging====<br />
Instagram users can tag their friends, family, businesses, and places in their Instagram posts. When uploading a post, users search for a name or Instagram handle to tag an account. <br />
<br />
==== Notifications ====<br />
Users can now turn on post notifications for accounts that they follow. This means they will receive a notification every time this account posts anything to Instagram. It's a way for users to stay informed and never miss a post from certain desired accounts. Celebrities and popular accounts often post pictures asking their followers to turn the notifications on to ensure their loyal following. <br />
<br />
==== Geotagging ====<br />
Photos can be tagged at a certain location where other users can view all photos tagged at that same location. This enables followers and friends to explore different places while browsing through Instagram. Geotagging is frequently used for pictures related to restaurants and tourist destinations to [[Facebook]]'s "Check-in" feature. Geotagging allows the user to check-in anywhere. The user does not have to physically be in the location they are tagging. Additionally, geotagging allows the user to select a suggested location or make up a location of their own.<br />
<br />
====Sharing====<br />
Users have the ability to share photos posted on their Instagram to their [[Facebook]], [[Twitter]], [[Tumblr]], or [[Wikipedia:Flickr|Flickr]] profiles. Instagram's privacy settings do not apply when users choose to share their picture to an external social media account. Instead, it will depend on the privacy settings set on their other profile.<br />
<br />
====Bookmarks====<br />
Users can now bookmark Instagram posts to save and look at later. The feature, which debuted in December of 2016, allows users to maintain a collection of photos and videos by simply tapping a bookmark icon located next to all posts. Bookmarked posts are saved in a gallery that only the user has access to and users are never notified when one of their posts have been bookmarked<ref>Garun, Natt. [http://www.theverge.com/2016/12/14/13941522/instagram-bookmark-tool-creepy The Verge: You can now bookmark Instagram posts to look at later]''The Verge'', 14. Dec. 2016. Web. 23 April 2017</ref>.<br />
<br />
====Multiple Photos====<br />
Users can now upload up to ten photos at one time, all under one post. The change, according to Instagram, was made so users would "no longer have to choose the single best photo or video from an experience you want to remember.” The feature was introduced in February of 2017<ref>Wagner, Kurt. [https://www.recode.net/2017/2/22/14693256/instagram-facebook-upload-photos-video-carousel Instagram will now let you upload 10 photos at once]''Recode'', 22. Feb. 2017. Web. 23 April 2017</ref>.<br />
<br />
====Instagram Direct====<br />
Instagram Direct is an instant messaging system within the Instagram app that allows users to share pictures or videos with a selected person or group of people. It features threaded messaging in which users can name their chats and also share other posts from Instagram in their messages. In addition to sharing images directly through this chat, members of a chat group can send text messages and heart icons that indicate liking.<br />
<br />
==== Filters ====<br />
[[File:Instagramfilters.jpeg|thumb|The same photo under different filters <ref name = theatlantic> Garber, Megan. [http://www.theatlantic.com/technology/archive/2012/04/a-guide-to-the-instagram-filters-youll-soon-be-seeing-on-facebook/255650/ Guide to Instagram Filters ]''The Atlantic'' 10. April . 2012. Web. 23. April. 2017.</ref>.]]<br />
Users have the ability to add different filters to their photos, which consist of different lighting, saturation, contrast, frames and color effects:<ref name = theatlantic/><br />
<br /><br />
<br />
*'''Aden'''- This filter gives a blue/green natural look. <br /><br />
*'''Amaro'''- Light with minimal fading and emphasis on beige <br /><br />
*'''Ashby'''- By adding a gold overlay, it creates a vintage feel to images without emphasizing shadows <ref name = theatlantic/> <br /><br />
*'''Brannan'''- Low-key with an emphasis on grays and greens <br /><br />
*'''Brooklyn'''- Purple undertones <br /><br />
*'''Clarendon'''- Creates a stronger contrast between shadows and light for images <ref name = theatlantic/> <br /><br />
*'''Charmes'''- Saturates red tones and tints warm colors <ref name = theatlantic/><br /><br />
*'''Crema'''- Adds a creamy look that both warms and cools the image. <br /><br />
*'''Dogpatch'''- Increases contrast and tints warm colors <ref name = theatlantic/><br /><br />
*'''Earlybird'''- Sepia- like, faded with blurred colors and an emphasis on yellow and beige<br /><br />
*'''Gingham'''- Adds yellow tone to create a brighter, faded look<ref name = theatlantic/><br /><br />
*'''Ginza'''- Overlays image with warm colors from the color wheel <ref name = theatlantic/> <br /><br />
*'''Hefe'''- Fuzzy with an emphasis on golden tones<br /><br />
*'''Helena'''- Saturates orange and teal colors in images <ref name = theatlantic/><br /><br />
*'''Hudson'''- Warm and saturated with an emphasis on blues and yellows<br /><br />
*'''Inkwell'''- Black and white feature <br /><br />
*'''Juno'''- Saturates warm colors on color wheel and shades darker colors <ref name = theatlantic/><br /><br />
*'''Kelvin'''- Saturated, retro photos with a distinctive scratchy border <br /><br />
*'''Lark'''- Saturates all colors except for red hues <ref name = theatlantic/><br /><br />
*'''Lo-Fi'''- Dreamy with a slight blur and saturated yellows and greens<br /><br />
*'''Ludwig'''- A slight hint of desaturation that also enhances light. <br /><br />
*'''Maven'''- Shades the image,lowers contrast of hues, and also has a yellow overlay <ref name = theatlantic/><br /><br />
*'''Mayfair'''- Applies a warm pink tone, subtle vignetting to brighten the photograph center and a thin black border <br /><br />
*'''Moon'''- Black and white feature <br /><br />
*'''Nashville'''- Sharpens the image with a magenta-purple tint and framed with a film strip border<br /><br />
*'''Normal'''- No effect<br /><br />
*'''Perpetua'''- Adding a pastel look, this filter is ideal for portraits. <br /><br />
*'''Reyes'''- Uses tint effects to create a more vintage look to images <ref name = theatlantic/><br /><br />
*'''Rise'''- Warm with an emphasis on yellow and light browns<br /><br />
*'''Sierra'''- Light with a slight blur and emphasis on beige<br /><br />
*'''Skyline'''- Adds tint to images acting as an auto-correct feature <ref name = theatlantic/><br /><br />
*'''Slumber'''- Desaturates the image as well as adds haze for a retro, dreamy look – with an emphasis on blacks and blues. <br /><br />
*'''Stinson'''- A subtle filter that brightens your image, washing out the colors ever so slightly. <br />
*'''Sutro'''- Sepia effect with an emphasis on purple and brown <br /><br />
*'''Toaster'''- High exposure with vignette corners and an emphasis on red<br /><br />
*'''Valencia'''- High contrast with a slightly brown and gray overtone<br /><br />
*'''Vesper'''- Decreases sharpness of photos and adds a warmer tint to the colors <ref name = theatlantic/><br /><br />
*'''X-Pro II'''- Warm and saturated with an emphasis on aquas and greens<br /><br />
*'''Walden'''- Washed out color with slight blue overtone<br /><br />
*'''Willow'''- Washed out black and white feature <br /><br />
*'''1977'''- 70's style flair<br /><br />
<br />
Frames can be added or taken away but are different depending on the filter used. One filter's frame cannot be used with another filter's look.<br />
<br />
==== Lux ====<br />
The Lux feature allows users to adjust saturation and contrast in photos simultaneously. Users can adjust the Lux slider to control the amount of saturation and contrast.<br />
<br />
==== Adjustments ====<br />
In addition to filters, users can adjust a number of aspects of their photos. These include:<br />
*'''Adjust'''- Users can tilt or skew the photo<br />
*'''Brightness'''- Users can make the photo lighter or darker<br />
*'''Contrast'''- Users can increase or decrease the contrast in their photos<br />
*'''Structure'''- Users can enhance lines, details, and textures in their photos<br />
*'''Warmth'''- Users can make their photos warmer or cooler <br />
*'''Saturation'''- Users can increase or decrease saturation<br />
*'''Color'''- Users have the ability to add different shades of yellow, orange, red, purple, blue, and green to either the shadows or highlights of their photos<br />
*'''Fade'''- Users can add a faded effect to their photos<br />
*'''Highlights'''- Users can increase or decrease the brightness of the highlighted portions of their photos<br />
*'''Shadows'''- Users can increase or decrease the darkness of the shadowy portions of their photos<br />
*'''Vignette'''- Users can add a vignette effect to the border of their photos<br />
*'''Tilt shift'''- Users can add an adjustable radial or linear blur to their photos<br />
*'''Sharpen'''- Users can sharpen their photos<br />
<br />
==== Video ====<br />
Instagram users can upload videos that are between 3 and 15 seconds long. When the user selects which video they would like to upload, they have the option of applying a filter to the video just as they would with a still photo. There are more restrictions on editing videos than photos. In March 2016, Instagram allowed users to post videos up to 60 seconds in length, putting more emphasis on videos than in previous years <ref> Soper, Taylor. [http://www.geekwire.com/2016/instagram-extends-video-length-limit-15-seconds-60-seconds/ "Instagram extends video length limit from 15-seconds to 60-seconds"] (29 March 2016. Retrieved on 23 April 2017.)</ref>. <br />
<br />
==== Boomerang ====<br />
On October 22, 2015, Instagram announced "Boomerang" <ref> [http://blog.instagram.com/post/131684343987/boomerang-from-instagram "Introducing Boomerang from Instagram"] (22 October 2015. Retrieved on 23 April 2017.)</ref> . A boomerang is a mix between a photo and a GIF. Boomerang takes a burst of photos and puts them in a video loop to add motion to what would otherwise be a static photo. <br />
<br />
====Stories====<br />
[[File:Instagramstories.jpg|thumbnail|right]]<br />
On August 2, 2016, Instagram launched their "Stories" feature. Similar to Snapchat Stories, this feature allows users to upload multiple pictures or videos throughout their day, which their followers are able to view for up to 24 hours. Users can also add various effects to the images or videos on their story including filters, text, drawings, geotags, rewind, etc. Stories appear in a bar at the top of the app, where an orange circle around someone's profile picture indicates an unwatched story. Users can view which of their followers have seen the post on their story by swiping up when looking at their own story. <ref>[http://blog.instagram.com/post/148348940287/160802-stories Instagram Blog] ''Instagram Blog''. 2. August. 2016. Web. 23. April. 2017. </ref><br />
<br />
====Instagram Business Tools====<br />
On May 31, 2016, Instagram announced the launch of its tools for business owners. Some of these new features include business profiles, insights, promote, and product tagging. <br />
=====Business Profile=====<br />
Business profiles are a free feature for Instagram accounts that want to be recognized as a business. To enable this feature, accounts must be on public mode and must have a Facebook page for their business that can be linked to their Instagram account. This filters out users on Instagram that use the platform for self-promotion (gaining followers, likes, etc.) and not for a commercial purpose. Business profiles have several exclusive features, such as the contact button. Businesses have the ability to link their email, phone number, and provide directions to their business through Google Maps, allowing their customers to reach them easier. <ref>[https://techcrunch.com/2016/05/31/instagram-officially-announces-its-new-business-tools/] "Instagram Officially Announces Its New Business Tools", 31 May. 2016</ref><br />
=====Insights=====<br />
The Insights feature provides businesses actionable information so that businesses can improve their reach. Insights focus on two main areas: post analytics and follower demographics. Utilizing the insights feature, users can compare their content easily and find information of how each of their posts is performing.<ref>Wright, Victoria. “4 Ways to Use Instagram Insights to Improve Your Marketing.” Social Media Examiner, 16 Feb. 2018, [[www.socialmediaexaminer.com/4-ways-to-use-instagram-insights-to-improve-marketing/]].</ref> In terms of positive marketing, businesses can observe target audiences, certain times of the day that are successful, and even trying out new content. Engagement insight is a significant feature for many users of Instagram.<br />
<br />
======Post Analytics======<br />
Post analytics allows businesses to learn about the performance of their Instagram content. The business can track data regarding impressions, reach, website clicks, and follower activity. Impressions refer to the number of times the post has been seen, whereas reach refers to the number of distinct Instagram accounts that have seen the post. Website clicks allow the business to track the number of users who have clicked on the website linked to their profile (if they have one). Follower activity provides the most popular times throughout the day where the accounts' followers are active so that businesses can better time their post and expand their reach.<ref> "Instagram Analytics Will Offer Audience Demographics Post Impressions Reach & More" 16 May. 2016, [https://beta.techcrunch.com/2016/05/16/instagrams-analytics-will-offer-audience-demographics-post-impressions-reach-more/?_ga=2.141467122.1134991809.1523478568-1924318621.1522084683]</ref><br />
<br />
======Follower Demographics======<br />
Follower demographics allows businesses to better understand their audience. Demographic details such as a follower's age, location (by country and city), and gender allow businesses of large and small scale to better time their post and cater their content to their consumers. In addition, the follower analytics section allows businesses to track the number of recent followers hourly and daily, allowing them to pinpoint which posts converted users into followers. <ref>"Instagram Analytics Will Offer Audience Demographics Post Impressions Reach & More" 16 May. 2016, [https://beta.techcrunch.com/2016/05/16/instagrams-analytics-will-offer-audience-demographics-post-impressions-reach-more/?_ga=2.141467122.1134991809.1523478568-1924318621.1522084683]</ref><br />
<br />
====Promote====<br />
The promote feature allows businesses to turn well-performing posts into advertisements within the Instagram application itself. Businesses can pick a post already featured on their Instagram page and add a button telling users to "take action". Instagram allows the business to select their target audience or let Instagram suggest an audience itself. After deciding on how long the ad will run and the budget spent on it, the post then becomes promoted as an advertisement.<br />
<ref>[https://business.instagram.com/blog/coming-soon-new-instagram-business-tools "Coming Soon: New Instagram Business Tools"].</ref><br />
=====Product Tagging=====<br />
One of Instagram's most recent business feature, product tagging, allows business profiles the ability to integrate an in-app shopping experience. This feature is currently only available to approved businesses in the United States, United Kingdom, Australia, Canada, France, Germany, Italy, Spain, and Brazil. Businesses can tag up to five products per image or twenty products per carousel, allowing consumers to shop directly within the app. Users have access to pricing and product details on the post itself and through the shop button on the business profile. From there, the user can click on the link provided on the post, forwarding them to the business's website where they can purchase the product.<ref>https://help.instagram.com/307876842935851/?helpref=hc_fnav&bc[0]=Instagram%20Help&bc[1]=Instagram%20for%20Businesses</ref><br />
<br />
====Other Platforms====<br />
<br />
'''Instagram.com Web Profiles''':<br />
Aside from Followgram.me, Instagram announced the release of Instagram profiles on the web in November of 2012. These web profiles feature a user's profile photo, bio, and a selection of their recently shared photographs. Through these profiles, you can like and comment on photos, edit your profile directly from the web, and follow other users. Each user's profile can be found by typing in their username in the search bar provided at the top of the page. If a user is private, you cannot see their web profile unless they accept you as a follower and you are logged on to Instagram. If a user's photos are set to public, any viewer who types their username into the browser will be able to see their profile. All photos a user has ever shared on Instagram can be accessed through their web profile. Currently, users cannot upload photos directly from the web, as Instagram focuses their application on uploading photos from mobile devices. The main goal of their web profiles is to make it easier for users to browse the shared content of their own content and the content of those they follow. <ref> [http://blog.instagram.com/post/35068144047/announcing-instagram-profiles-on-the-web Instagram.com Web Profiles] ''Instagram Blog'' 5. November. 2012. Web. 23. April. 2017. </ref><br />
<br />
== Ethical Concerns ==<br />
===Privacy===<br />
Instagram's privacy settings allow users to have a private or a public account. With a private account, a user must accept a friend request in order for their content to be seen by others. A public account allows anyone to follow their account and access their content. Users have permission to view posts and stories, in addition to performing activities like commenting and liking. If a user with a private account shares their photo to another social media site, such as Facebook or Twitter, the content will be visible to anyone on that social media network or anyone who has the permalink that accompanies the shared image. <ref name="instaprivacy">[https://help.instagram.com/196883487377501 "Privacy Settings & Information"] (Retrieved 23 April 2017).</ref> <br />
<br />
[[File: Instad.png|frame|App icon for Insta Download]]<br />
<br />
Many users, especially celebrities, have been susceptible to their Instagram accounts being hacked. This includes adding personal content from their phones as well as troll content; therefore spreading false information.<br />
<br />
===Stalking===<br />
Instagram's mapping feature has led to new privacy concerns. Geotagging picture locations share the user's location associated with his or her picture on the Instagram map. Privacy concerns take place when users do not want their home address or current location publicized on their Instagram profile, which can cause concerns such as stalking. Instagram uses [http://www.en.wikipedia.org/wiki/Foursquare Foursquare] for its geotagging feature, which in return taps into [http://en.wikipedia.org/wiki/Google_maps Google Maps]. <ref name=Kim>Holt, Kris.[http://www.dailydot.com/news/instagram-map-geotagging-privacy/ Geotagging and Privacy] ''Daily Dot'' 11. Dec. 2015. Web. 23. April. 2017</ref> An example of this ethical concern can be demonstrated by [http://www.iknowwhereyourcatlives.com I Know Where Your Cat Lives], which is a website that uses data from Instagram location tagging to display those Instagrams' and where the cat is located. The goal of the website was to encourage users to make their profiles private in order to prevent this potential stalking threat.<br />
<br />
Kim Kardashian West fell victim to this when she was in Paris on October 3rd, 2016. She was there for the biannual fashion week when a group of men broke into her room and held her at gunpoint. The men gagged her and tied her to the bed while they stole ten million dollars worth of jewelry from the celebrity. <ref name= 'Kim'/> Kim had taken multiple photos in the hotel room, some of which showing off the jewelry she had with her. While she did not geotag these pictures, they were easily recognizable by the hotel's iconic windows, giving the robbers information on her location. <ref>Buxton, Madeline. [http://www.refinery29.com/2016/10/125184/kim-kardashian-robbery-privacy-snapchat-instagram What Kim Kardashian's Robbery can teach us about Social Media Privacy ]. ''Refinery 29'' 4. October. 2016. Web. 23. April. 2016</ref><br />
<br />
===Security Research===<br />
In December 2015, a security researcher named Wesley Wineberg independently breached Instagram's servers. In November 2015, he reported to Facebook, owner of Instagram, about how he accessed internal data from Instagram servers such as passwords, private keys for encryption, as well as certificates. Earning him and another researcher $2,500 from Facebook as part of their bug bounty program. From these current findings, he probed further and found login credentials to access the digital storage units that Instagram used to store data. Once Wineberg released his new findings in December 2015, Facebook's security chief, Alex Stamos, threatened to file a lawsuit against Wineberg claiming that he violated Facebook's bug bounty program because he was potentially able to access personal user data. Wineberg claims that he followed the bug bounty program and was concerned that if he were able to successfully breach Instagram's systems, then an adversarial hacker could breach Instagram as well. While there was rhetoric from both sides, Wineberg exhibited his findings to Facebook and Facebook never filed a lawsuit against Wineberg. Since Wineberg's disclosure, Facebook announced that these bugs were fixed <ref name="insta"> "Researcher Finds 'Shocking' Instagram Flaws And Ends Up In A Fight With Facebook" Forbes. December 17, 2015. https://www.forbes.com/sites/thomasbrewster/2015/12/17/facebook-instagram-security-research-threats/#6c69daae2fb5 </ref> This raises the question about how far is too far in security research. Although the outcome was positive for Instagram users, the company was publicly embarrassed and credibility of Instagram was questioned by users. This raises questions whether it was appropriate for Facebook to restrict security research to protect user information. <br />
<br />
=== Copyright and Third Party Apps ===<br />
When a user posts a picture or video to Instagram, that piece of media is their personal property under copyright laws. The owner of the photo or video retains exclusive rights regarding its use, display, and distribution. Instagram's terms of use state that Instagram doesn't claim ownership of the content posted on its platform, which grants Instagram a non-exclusive, no-cost license to use the user's content that is subject to the private policy. This clause states that Instagram may sub-license its user's content to outside companies for a fee without providing any compensation to the user. <ref>Deslak, Craig. [http://www.nyccounsel.com/business-blogs-websites/who-owns-photos-and-videos-posted-on-facebook-or-twitter/ Who owns Instagram Content?] ''Law Offices of Craig Deslak'' 19. December. 2012. Web. 23. April. 2017</ref> Despite this loophole, Instagram does not allow users to download any content directly from the app or website due to copyright concerns. However, there are third-party apps and software that can be downloaded that circumvent this. Apps like [https://play.google.com/store/apps/details?id=com.originalgeek.instasave&hl=en Photo Saver] and [https://play.google.com/store/apps/details?id=com.znstudio.instadownload&hl=en Insta Download] allow users to bypass Instagram's copyright protocols and download and save any content from any user at will. This content then has the potential to be re-posted or circulated without the original poster's consent, further muddying how Instagram deals with copyright issues.<br />
<br />
=== Professional Photography ===<br />
According to Kate Bevan, a freelance writer for the UK's "The Guardian," many professional photographers believe the art of photography lies in the editing, not just capturing the picture. Some professional photographers feel that applications like Instagram are debasing genuine photography because simply adding a filter on a photograph degrades the integrity of the original picture.<ref>Bevan, Kate. [http://www.guardian.co.uk/technology/2012/jul/19/instagram-debasing-real-photography?INTCMP=SRCH Instagram is Debasing Photography]. ''The Guardian''. 19. July. 2012. Web. 23. April. 2017</ref> Others believe that Instagram standardizes the look of the photos because it offers nothing but basic filters and leaves minimal room for alterations. Rather than encouraging creativity, opponents feel it thwarts artistic ability.<ref>Burden. James [http://www.quora.com/Instagram/Why-do-real-photographers-hate-Instagram-so-much Why photographers hate Instagram ] ''Quora''. 22. March. 2012. Web. 23. April. 2017 </ref> Thus, there is a wide debate on whether or not popular applications such as Instagram that offer filtering and editing options cheat the photography game and more importantly professional photographers who make their living based on the artistic quality of their photography.<br />
<br />
Some professional photographers have suggested creating a professional version of Instagram for connoisseurs who wish to have more editing features.<br />
On the other hand, many people also believe the application has benefits. Due to the simplicity of the application, Instagram has managed to attract more people to photography by making it more accessible. Many photographers see Instagram as a practical on-the-go tool. Since professional cameras can sometimes be inconvenient to carry around, not to mention expensive, Instagram allows its user to capture pictures in spontaneous moments with their own handheld devices. This puts the power of photography, art, and creativity in the hands of people who normally would not have access to such an opportunity.<ref> Prives, Guy. [http://digital-photography-school.com/instagram-and-its-impact-on-the-world-of-photography How Instagram impacts Photography] ''Digital Photography School'' Retrieved December 4, 2012. Web. </ref><br />
<br />
=== Authenticity ===<br />
====Editing====<br />
As photos are the primary medium for Instagram, users want to have the most aesthetically pleasing pictures to get the most traction on their account. This often requires heavy editing, such as modifying the brightness of the original photo, adding filters, and changing the opacity of the photo. Small-scale edits are common in photography; however, the need for larger-scale editing is now so common that editing apps have been developed. For example, Facetune allows users to modify their appearance, such as making their nose appear smaller, eyes bigger, and face thinner.<ref>Keating, Lauren. [http://www.techtimes.com/articles/138731/20160420/facetune-vs-faceup-best-selfie-editing-app-ios.htm Facetune vs. BeautyPlus: The Best Selfie Editing App For iOS]. ''TechTimes Inc.'', 20 Apr. 2016. Web. Retrieved 23 Apr. 2017.</ref>. Users can also modify larger body parts, such as enlarging breast size and creating abs. This raises the question of authenticity and whether material being shared on photo sharing apps represent reality. Selfie-editing apps such as these often find such success on the market because many feel pressured to represent themselves in the best light possible, especially when it is uncertain how long their uploaded material will remain on the app or how long the impression it gives will last. <ref>Bosker, Bianca. [http://www.huffingtonpost.com/2013/12/05/selfie-instagram_n_4391220.html? New Selfie-Help Apps Are Airbrushing Us All Into Fake Instagram Perfection]. ''TheHuffingtonPost.com, Inc.'', 5 Dec. 2013. Web. Retrieved 23 Apr. 2017.</ref>.<br />
<br />
====Endorsements====<br />
As of late 2016, 32% of online adults reported using Instagram. Within that 32%, 38% were female while 26% were male. <ref>Greenwood, Shannon, Andrew Perrin, and Maeve Duggan.<br />
[http://www.pewinternet.org/2016/11/11/social-media-update-2016/ Social Media Update 2016], Pew Research Center: Internet, Science & Tech. ''Pew Research Center'', 11 Nov. 2016. Web. Retrieved 23 Apr. 2017.</ref>. With women, a lot of accounts are targeted towards bloggers, who show off their clothes and fashion accessories. Oftentimes, these bloggers are promoted by brands that pay them to wear certain clothing items and fashion accessories. Users do not realize the authenticity of the bloggers' lives and often splurge on the items the bloggers are wearing. However, it may be that the bloggers are being professionally dressed by others for the posted photo, and dress normally when without brand promotion.<br />
<br />
There have been many cases where brand influencers have not disclosed that their Instagram posts are paid placement. It goes against Federal Trade Commission's rules if brand influencers do not include #ad or #sponsored in their social media posts that they are getting paid for. <ref name="brandinfluencers">Coffee, Patrick. [http://www.adweek.com/brand-marketing/did-lord-taylors-hot-instagram-campaign-thumb-its-nose-ftc-disclosure-rules-163858/ "Did Lord & Taylor's Hot Instagram Campaign Thumb Its Nose at FTC Disclosure Rules?"] ''Adweek'' (3 April 2015. Retrieved 23 April 2017). </ref> Lord & Taylor received backlash when they sold out of a dress that 50 fashion influencers were wearing on Instagram. Lord & Taylor and the influencers never disclosed that it was a paid ad campaign. <ref name="brandinfluencers"/> The CEO of Izea, Ted Murphy, has said that while Instagram campaigns show the medium's power, the lack of disclosure by marketers may make it more of a norm. <ref name="brandinfluencers"/> "What are you legally required to do, and what's the right thing to do?" was stated by Murphy in terms of the two issues often involved in nondisclosure controversies. <ref name="brandinfluencers"/> The FTC does not always enforce its regulations. <br />
<br />
Many celebrities also promote products on Instagram and people have called into question their disclosure of sponsored content. The FTC has been planning on becoming more strict with its guidelines, also claiming that the #ad or #sponsored hashtags may not be strong enough indicators that the Instagram post is a paid advertisement. <ref name="bloomberg">Frier & Townsend. [https://www.bloomberg.com/news/articles/2016-08-05/ftc-to-crack-down-on-paid-celebrity-posts-that-aren-t-clear-ads "FTC to Crack Down on Paid Celebrity Posts That Aren't Clear Ads"] ''Bloomberg'' (5 August 2016. Retrieved 23 April 2017). </ref> Michael Ostheimer, a deputy in the FTC's Ad Practices Division, noted that the enforcements may make Instagram endorsements seem less authentic and therefore hurt the medium's marketing power for businesses. <ref name="bloomberg"/> <br />
<br />
In a recent April 2017 press release from the FTC, it was stated that they sent out more than 90 letters to influencers reminding them that they need to disclose their content as an advertisement and their affiliation with the brand. <ref name="ftc">[https://www.ftc.gov/news-events/press-releases/2017/04/ftc-staff-reminds-influencers-brands-clearly-disclose "FTC Staff Reminds Influencers and Brands to Clearly Disclose Relationship"] (19 April 2017. Retrieved 23 April 2017). </ref> The press release also included that the frequently used #sp, #partner, or thank you to a brand, is often still unclear to consumers that the accompanying post is a paid advertisement. <ref name="ftc"/><br />
<br />
====Followers====<br />
Some users choose to purchase followers through third-party apps. This is often motivated by the desire to have more followers on one's account, and subsequent increases in likes and comments, in order to appear more popular among one's social network on Instagram. Multiple celebrities or bloggers are presumed to have paid for followers as evidenced by dramatic increases in followers, comments, and likes, sometimes within a mere few hours <ref> Lieber, Chavie. [http://www.racked.com/2014/9/11/7577585/buy-instagram-followers-bloggers The Dirty Business of Buying Instagram Followers]. ''Racked''. 11, September, 2014. Web . 23. April. 2017</ref>. This raises ethical concerns related to authenticity in that these followers are not autonomous users who chose to follow the account, but rather they are purchased. Furthermore, this adds to the growing pressure on social media to appear popular on these social network sites.<br />
<br />
==="Finstas"===<br />
As Instagram has grown more popular and users have accumulated larger numbers of followers, some Instagram users, mainly teenage girls, have created "Finstagram" (short for fake Instagram) accounts, better known as "Finstas." These accounts are also known as "Sinstas" (short for second Instagram) accounts. A users main Instagram account is then referred to as a 'Rinsta", short for real Instagram. Finsta accounts aren't subject to the same norms usually present on social media, and users are able to share more personal photos with a smaller audience where the pressure to get a lot of likes is significantly lower. These kinds of accounts are typically set to “private,” making it difficult to identify their owners without first seeing the photos the account owner has posted. A finsta account is a place to share ugly or embarrassing photos, post about inside jokes, go on long rants, or post about anything that should not be seen in the public eye. <ref> [http://www.bewebsmart.com/social-media/instagram-social-media/what-is-a-finsta/ What is a Finsta?]. ''Be Web Smart'' 25. June. 2016. Web. 23 . April. 2017</ref><br />
<br />
Although Finsta accounts are intended for a smaller audience, Paul Booth, associate professor at DePaul University’s College of Communication, warns that users who have created Finstas still run the risk of the content they have created being leaked to the public. Booth noted, “Someone could also share it, or maybe a friend gets angry at you and sends it to everyone.” He continued, “You can also get hacked. Nothing that is online is ever private – that’s why it’s important to make sure everything you put online you’d be comfortable with your grandparents and teachers seeing.” <ref> Pennell, Julie. [http://www.teenvogue.com/story/how-teens-use-finsta-accounts-hide-on-social-media How Teens hide Finsta accounts] ''Teen Vogue''14. August 2016. Web. 23 . April. 201 </ref><br />
<br />
Younger users have also taken advantage of Finstas for the ability to post without judgment from their family members or educators. The National Cybersecurity Alliance released a study that found 60% of teen Internet users have created online accounts of which their parents were unaware. <ref>[https://kidsprivacy.net/2016/09/08/what-parents-need-to-know-about-finstaspam-accounts/ What Parents need to Know about Finsta Accounts]. 8. September. 2016. Web. 23. April. 2017</ref>The growing prevalence of Finsta accounts may be increasing this percentage, making it more difficult for parents to monitor their children’s social media usage and ensure that they are using it safely and responsibly.<br />
<br />
The New York Times warned that the creation of Finsta accounts may be indicative of adolescent insecurity and an increasing reliance on “likes” for self-validation. Finstas act as a vehicle to escape the pressure to get a lot of likes or to present a perfectly manicured self-portrayal online. <ref> Safronova, Valeriya. [https://www.nytimes.com/2015/11/19/fashion/instagram-finstagram-fake-account.html?_r=0 Fake Instagram as a chance to be real] ''New York Times'' 18. November 2015. Web. 23. April. 2017 </ref><br />
<br />
=== Nudity ===<br />
In the Terms of Use section on Instagram, it explicitly prohibits the posting of nude, partially nude, or sexually suggestive photos.<ref>[http://instagram.com/about/legal/terms/ Instagram: Terms of Use] ''Instagram'', Retrieved on 23 April 2017.</ref> However, porn sites and spammers maliciously use hashtags to gain a presence on Instagram and spam posts of inappropriate content. Since there is no way to flag inappropriate comments, the only way to rid these spammers is to delete their accounts. In spite of this, spammers are quick to repost images under newly created accounts while Instagram is unable to keep up with deleting the new accounts, consequently struggling to prevent the problem.<ref>Howie, Jason A. [http://aptsonic.com/instagram-facebooks-newest-porn-problem/ Instagram: Facebook’s newest Porn Problem], ''Aptsonic'', 14 June 2012.</ref><br />
As a result of the nudity clause, popular photographer [[Wikipedia:Daniel Arnold|Daniel Arnold]] was blocked out of Instagram after posting a photo of topless women. Instagram stated that even though he considered the nudity to be art, it violated their policy of use.<ref>Chen, Adrian. [http://gawker.com/5927104/the-best-photographer-on-instagram-got-banned-for-posting-boobs The Best Photographer on Instagram Got Banned for Posting Boobs], Gawker, 18 July 2012.</ref><br />
<br />
'''Free the Nipple''':<br />
Due to censorship issues surrounding the differences between female and male nudity, people identifying as women break rules outlined in Instagram's guidelines. While this is considered to be graphic content for women, men on Instagram are allowed to post images with their nipples showing. Their policies surrounding the appropriateness of certain nude images states "It also includes some photos of female nipples, but photos of post-mastectomy scarring and women actively breastfeeding are allowed". <ref>[https://help.instagram.com/477434105621119/ Community Guidelines], ''Instagram'', Retrieved 24 April 2016 </ref> This raises questions about consistency in enforcing their policies and how they define nudity. The exception of post-mastectomy scarring and active breastfeeding also represent Instagram's openness to certain kinds of nudity which is considered appropriate. Celebrity advocates include Miley Cyrus, Rihanna, and Caitlin Stasey, who publish content surrounding the issue. In a public statement, CEO Kevin Systrom explicitly referenced Apple's policies and standards concerning nudity. To remain available for download on Apple devices, the application must abide by Apple's rules.<ref>Friedman, Megan. [http://www.marieclaire.com/culture/news/a16199/instagram-nudity-free-the-nipple/ Instagram Finally Explains Why It Won't #FreetheNipple], 05 October 2015. Retrieved 24 April 2016.</ref><br />
<br />
In October 2014, comedienne Chelsea Handler protested Instagram's nudity policy by posting a topless photo of her side-by-side with Vladimir Putin. She mimicked a photo of Putin shirtless on a horse and appeared topless on a horse in her own photo. Instagram removed the photo, and she called the app "sexist" on Twitter when she tweeted the photo and said, "Taking this down is sexist. I have every right to show I have a better body than Putin." Twitter did not remove her photo. <ref>[http://www.hollywoodreporter.com/news/chelsea-handler-posts-topless-pic-745446 Chelsea Handler Posts Topless Pic in Protest of Instagram Policy]. ''The Hollywood Reporter'', 31 October 2014. Web. 23 Apr. 2017.</ref> She continued with her backlash by tweeting, "If a man posts a photo of his nipples, it's ok, but not a woman? Are we in 1825?"<ref>Handler, Chelsea. [https://twitter.com/chelseahandler/status/528002042498146304?ref_src=twsrc%5Etfw Chelsea Handler Tweet], 30 October 2014.</ref> She continued to speak out against Instagram in 2015 by posting a number of partially-nude photos that were eventually deleted by the app.<ref>Dicson, EJ. [http://www.dailydot.com/entertainment/chelsea-handler-nipple-instagram/ Chelsea Handler furthers Instagram-censorship fight with new topless photos], 29 December 2014</ref><br />
<br />
=== Spam ===<br />
Instagram has become notorious for spam-based accounts where users are spammed with generic comments asking them to go to external websites. Users are asked to report the comments and then delete them. Instagram has stated that they tackle spam every day and are trying to improve the app for users.<ref>Shetty, Anuradha. [http://tech2.in.com/news/general/instagram-promises-to-tackle-spam/631622 Instagram Promises to Tackle Spam] ''Tech2.in.com'', 10 December 2012.</ref> However, this spam problem is tedious and frustrating for the app's regular users to deal with. Currently, Instagram is still suffering heavily from spam accounts; a 2015 research study by a group of Italian security analysts found that about 30% of Instagram accounts are inactive and an estimated 8% of the total accounts behave like automated spam bots.<ref>Ingram, Matthew. [http://fortune.com/2015/07/02/instagram-fraud-spam/ Instagram has a problem it needs to solve if it wants to be an ad platform], ''Fortune'', 02 July 2015. Web. 23 Apr. 2017.</ref> There is a huge "follower economy" where people make money by using thousands of fake accounts to like content and follow other accounts. Instagram users can purchase thousands of followers and likes at bundle prices, such as 1000 followers for $5.<ref>Price, Shayla. [http://www.huffingtonpost.com/shayla-r-price/big-business-buying-fake_b_6322362.html Big Business: Buying Fake Instagram Followers], ''TheHuffingtonPost.com, Inc.'', 14 December 2014. Web. 23 Apr. 2017.</ref><br />
<br />
This is a large ethical issue because the business of selling bot followers and likes is legally murky and violates Instagram's terms of use. It also poses ethical concerns for users who build up their following organically; account users using the money to purchase the appearance of popularity could be perceived as 'cheating'. The reputations of celebrities, companies, or politicians may be harmed if the public finds out they are artificially boosting their Instagram presence and impact via bots. Some hotels actually offer free rooms and other free services to Instagram users who have enough followers, which also raises ethical concerns because some people might exploit the system by using the black market of spam bots.<ref>Newman, Lily Hay. [http://gizmodo.com/people-with-10k-instagram-followers-stay-free-in-this-h-1318364597 People With 10k Instagram Followers Stay Free In This Hotel], ''Gizmodo'', 15 September 2013.</ref> Instagram is also a place for heavy advertising to occur, but the existence of automated spam bots obscures the quality of Instagram's advertising capabilities.<br />
<br />
===Cyberbullying===<br />
Harassment is a significant problem on most social media platforms. On Instagram, users can post embarrassing photos of other users, post rude comments under another user’s photo, and tag users in public photos.<ref>(2013). “Cyberbullying on Instagram”. Cyberbullying Research Center. Retrieved 23 April, 2017, from http://cyberbullying.org/cyberbullying-on-instagram</ref> In 2016, Instagram introduced several new features aimed at alleviating cyberbullying on the platform. Users are now able to disable comments, “like” comments, and remove followers from private accounts.<ref name=features>Wiggers, K. (2016). “Instagram Rolls Out New Features in an Effort to Combat Cyberbullying”. Digital Trends. Retrieved 23 April, 2017, from http://www.digitaltrends.com/mobile/instagram-anti-abuse-tools/</ref> These features are meant to promote positivity and reduce the presence of negative content and problematic users from the platform.<ref name=features/> Users can also take advantage of Instagram’s new filtering tool, which allows for the hiding of particular words and phrases that an individual user doesn’t want to see in their comments.<ref name=comments>Heath, A. (2016). “Instagram has a new way to keep you from seeing offensive comments”. Business Insider. Retrieved 23 April, 2017, from http://www.businessinsider.com/instagram-lets-you-hide-inappropriate-comments-2016-9</ref> The feature was primarily made available to business and celebrities, but Instagram quickly implemented the feature for all users to promote a more positive culture on their platform: “‘To empower each individual, we need to promote a culture where everyone feels safe to be themselves without criticism or harassment.’”<ref name=comments/><br />
<br />
=== Hashtag Bans ===<br />
In 2015, Instagram banned a certain number of hashtags by making certain terms unsearchable. Users could still use the hashtags, but they were rendered useless because no other users could find the photos through those tags. Most notably, they banned the hashtag "#curvy," which had been used to celebrate body positivity among many female users. An Instagram rep explained that they banned the term because it was being used to share content that violated the site's community guidelines around nudity.<ref>Whelan, Nora. [http://www.buzzfeed.com/norawhelan/curvy-is-a-banned-search-term-on-instagram?bffbstyle&utm_term=.kkAM4reMP#.smQP0BzP9 Instagram Has Banned #Curvy As A Search Term]. ''Buzzfeed'', 14 Jul. 2015. Web. 23 Apr. 2017.</ref> Many users were upset with this ban since it targeted a certain body type. Ultimately, Instagram reversed the ban for this particular hashtag.<ref>Brouswell, Lauren. [http://www.cio.com/article/2969838/social-networking/why-instagram-started-banning-hashtags-and-why-its-a-bad-idea.html Why Instagram started banning hashtags (and why it's a bad idea)]. ''IDG Communications'', 12 Aug. 2015. Web. 23 Apr.<br />
2017.</ref> However, there are some hashtags that are still banned (especially relating to sex, drugs, or illegal activity).<ref>Edwards, Jim.<br />
[http://www.businessinsider.com/banned-instagram-hashtags-2013-8#ixzz2k4Eh7M1X These 12 Banned Hashtags Tell Us What Instagram Is Afraid Of Becoming]. ''Business Insider'', 27 Aug. 2013. Web. 23 Apr. 2017.</ref> These hashtag bans serve as a way for the company to impose its set of views and ideas on its users while enforcing a particular set of values and inherently passing judgment on particular terms.<br />
<br />
=== Incrimination ===<br />
The popularity of posting pictures and videos on Instagram of one's possessions and extravagant vacations has led to incrimination. Investigators commonly follow their subjects on social media to track their spending and potentially illegal activity <ref> Kibs, Kate. [http://www.digitaltrends.com/social-media/the-new-inside-source-for-police-forces-social-networks/ In the online hunt for criminals, social media is the ultimate snitch]. ''Digital Threads''. 13 July 2013. </ref>. For instance, after actor and rapper 50 Cent declared bankruptcy and shortly thereafter posted a picture of him surrounded by stacks of $100 bills, he received a court summons to explain the situation. In other cases, federal agents have used Instagram posts as evidence for fraud. For instance, children of wealthy individuals under investigation have incriminated their families of fraud and tax evasion by means of posting purchases or undocumented assets on the platform <ref> Knapton, Sarah. [http://www.telegraph.co.uk/news/2016/04/03/super-rich-caught-out-by-childrens-instagram--accounts/ Super-rich caught out by children’s Instagram accounts]. ''The Telegraph''. 3 April 2016. </ref>. In December 2013, a Florida man was charged with 142 felonies after investigators found incriminating evidence on Instagram containing illegal guns, drugs, and money. He had been under investigation for theft, and police were able to fortify his involvement in the case using this evidence <ref> Taylor, Victoria. [http://www.nydailynews.com/news/crime/man-instagram-leads-142-felony-charges-article-1.1547932 Florida man's Instagram photos lead to 142 felony charges]. ''New York Daily News''. 14 Dec. 2013. </ref>.<br />
<br />
== Controversies ==<br />
''Wealthy Kids Stir Up Controversy''<br />
In April 2012, trending habits among wealthy teens on Instagram sparked an online controversy, resulting in harsh criticism from the media and community. Wealthy kids used special hashtags to designate images that revealed their family's assets. These images were all edited with a gold frame surrounding the image. The collection of photos were assembled and posted to a popular blogging site, Tumblr, under the title "Rich Kids Of Instagram." The online community responded to these images with hateful messages and tweets.<ref>Imperatore, Tara.<br />
[http://www.justluxe.com/luxe-insider/trends/feature-1815082.php Disturbing or Expected? Wealthy Teens Stir Up Instagram Controversy], Luxe Inside/News & Trends. ''JustLuxe'', 22 Aug. 2012. Web. 23 Apr. 2017.</ref><br />
<br />
The 'Rich Kids of Instagram' inspired E! to create a reality television show based on them called '#Rich Kids of Beverly Hills.' It chronicled their luxurious lives and centered around their obsession with social media. The show has had mixed reviews. It has been criticized for promoting a materialistic lifestyle.<br />
<br />
In 2017, California teenager, Obdulia Sanchez, was on Instagram, live-streaming while driving with her younger sister, Jacqueline Sanchez. Sanchez was live streaming the drive when her car swerved and her sister, Jacqueline, was ejected out of the window, killing her. After the crash, Sanchez continued to film her sister's death on Instagram, which someone saved and shared before it was deleted. In a PS section of a letter, justifying her actions, Sanchez claimed, "I made that video because I knew I had more than 5K followers. It was the only way my sister would get a decent burial." <ref> Dailymail.com, Valerie Edwards For. [http://www.dailymail.co.uk/news/article-5369531/Teen-livestreamed-sisters-death-gets-6-years-jail.html “Girl, 19, Is given Six Years in Prison for Killing Her Sister, 14, in Horror Car Crash She Livestreamed While Drunk behind the Wheel.”] Daily Mail Online, Associated Newspapers, 8 Feb. 2018.<br />
</ref>. As of February 8, 2018, Sanchez has been guilty of gross vehicular manslaughter, DUI and child endangerment. The DUI came from Sanchez's reported 0.1% BAC at the time of the crash. She has been sentenced to six years with a maximum punishment of 12 <ref> Horton, Alex, and Cleve R. Wootson Jr. [http://www.washingtonpost.com/news/true-crime/wp/2018/02/09/i-killed-my-sister-okay-teen-who-live-streamed-fatal-crash-is-sentenced-to-prison/?noredirect=on&utm_term=.345f33150ee3 “'I Killed My Sister, Okay?': Teen Who Live-Streamed Fatal Crash Is Sentenced to Prison.”] The Washington Post, WP Company, 9 Feb. 2018. </ref>.<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Facebook]]<br />
*[[Twitter]]<br />
*[[Pinterest]]<br />
*[[Tumblr]]<br />
*[[Social Networking]]<br />
*[[Privacy in Social Networking]]<br />
}}<br />
<br />
== External Links ==<br />
{{resource<br />
|*[http://instagram.com/instagram Instagram's Official Website]<br />
*[https://twitter.com/instagram Instagram on Twitter]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
[[category: Websites]]<br />
[[Category: Media Content]]<br />
[[Category: Social Media]]<br />
<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Privacy_in_the_Online_Environment&diff=71822Privacy in the Online Environment2018-04-17T14:59:33Z<p>Hillcm: </p>
<hr />
<div>{{Box|<br />
{{width|224}}<br />
{{height|24}}<br />
{{multiBox\layout\lightShadow}}<br />
{{padding|5|0|0|10}}<br />
{{box\radius|15}}<br />
|←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[Topics#Topics|Topics]]'' • ↑''[[Topics#Categories|Categories]]''<br />
}}<br />
<br />
'''Privacy in the Online Environment''' (also referred to as information privacy and Internet privacy) refers to a user's rights and control over his [[Wikipedia:Personal_information|personal information]] in the digital realm. It allows for the many tiers of privacy (expressed in three theories), while simultaneously letting the users freely express themselves in whichever manner they choose, without jeopardizing their real identities (refer to [[Anonymous_Behavior_in_Virtual_Environments|Anonymous Behavior in Virtual Environments]]). Privacy in the Online Environment is related to the fields of information privacy and [[Wikipedia:Anonymity|anonymity]] in [[Wikipedia:Cyberspace|cyberspace]]. <br />
<br />
== The Complexity of Privacy in Virtual Environments ==<br />
Because there are various types of [[Virtual_Environment|environments]] in the web, we must distinguish the need for privacy in each kind of environment. For example, the amount of information one would give to other users when playing a [[Wikipedia:Massively_multiplayer_online_role-playing_game|massively multiplayer online role-playing game]] (MMORPG), such as [[World_of_Warcraft|World of Warcraft]], is probably not the same as the content one might share with friends when playing [[Wikipedia:Halo_3|Halo 3]] or interacting on [[Wikipedia:Facebook|Facebook]]. The dynamics of privacy become increasingly complex as the number of users increases. If other users in the environment are exclusively friends, one may not want to hide their real name, phone number and home address. However, if the environment is occupied by millions of unknown people, an individual may not want to share as much of their [[Wikipedia:Personal_information|personal information]]. One may choose to remain completely [[Wikipedia:Anonymity|anonymous]] or could configure privacy settings to ensure greater protection over such information.<br />
<br />
===Presentation of ''Self''===<br />
Information privacy has been directly linked to [[Wikipedia:Personal_identity|personal identity]]. According to David Shoemaker, "a threat to informational privacy is a threat to our personal identity <ref> Shoemaker, David. "Self-exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity." Ethics and Information Technology 12.1 (2009): 3-15. SpringerLink. 3 Apr. 2009. Web. <http://dx.doi.org/10.1007/s10676-009-9186-x>. </ref>." <br />
<br />
Dean Cocking (2008) describes the social psychological presentation of ''self'' as two-fold, active and passive. In offline environments, individuals vary between multiple selves circumstantially. However, at any given time, s/he is presenting a voluntarily-communicated active self (clothing, body piercings/tattoos, external behaviors, etc...) and an involuntary, more intimate passive self (one's personal history, vocal tone, facial contortions, etc...) In online environments, an ''active self'' is malleable. <ref> Cocking, D. (2008). Plural selves and relational identity: Intimacy and privacy online. In Information technology and moral philosophy. J. van der Hoven <br />
& J Weckert. (pp. 123-141). Cambridge University Press. </ref> A user can portray dishonest, inaccurate personal information through their avatars and profiles. <ref> Ellison, N., Hancock, J., & Toma, C. (2012). Profile as a promise: A framework for conceptualizing veracity in online dating self-presentations. New Media and Society, 14(1). doi:10.1177/1461444811410395. </ref> <br />
<br />
Even though what Cocking (2008) means a ''passive-self'' online is ambiguous at best, limitations to Internet privacy and example cases, where one's privacy is threatened or violated, are easily imaginable.<br />
<br />
==Theories==<br />
Privacy is one area of Information Ethics where the function and implementation of value-laden ICTs can be considered in conjunction with Floridi’s [[infosphere|Infosphere]]. Floridi's ontological model of privacy is a robust and sufficiently broad model of privacy that more effectively handles information privacy that others' also prominent and influential theories of privacy: the Control Theory, the Restricted Access Theory, and the combined Restricted Access/Limited Control Theory.<br />
<br />
===Ontological Model of Privacy===<br />
<br />
[[Luciano Floridi| Luciano Floridi]] (2005) argues that one can infer the amount of privacy held by an individual as a measure of ontological friction, or the degree to which “forces oppose the information flow within (a region of) the infosphere” Consider a real-world example to describe offline ontological friction: Two people are on a road walking towards each other from far away, and they are trying to read what it says on the others’ shirt, but because they are too far away, they are unable to. What it says on their T-shirts is the presentation of an active self, the infosphere is the road, and the distance between the two people represents ontological friction. On the Internet, ontological friction could be described as the degree to which an agent is hindered from learning private information about a patient. The friction could refer to the patient’s use of privacy settings, the degree to which their different SMSs are disconnected, or the extent to which other elements of a patient’s online persona remain obscure <ref> Floridi, l. (2008). The ontological interpretation of informational privacy. Ethics and Information Technology, 10(2), 115-121.doi: 10.1007/s10676-006-0001-7.</ref><br />
<br />
===Restricted Access Theory===<br />
<br />
Under the Restricted Access theory first introduced in 1983 by Armstrong & Bok, it is up to individuals to create zones (or acknowledge contexts) of privacy for themselves. Privacy is achieved when one creates a zone that prevents others from unacknowledged prying, and where one shines light only on desired characteristics of self to avoid or obscure access to other potentially passively conveyed attributes. The limitation of this theory is that it does not specify how the user's zone of privacy is constructed (i.e. the ability to grant or deny access to viewers). <ref> Armstrong, W. P., & Bok, S. (1983). Secrets: On the Ethics of Concealment and Revelation. Vintage: Reissue edition. </ref> <ref> Tavani, H., (2008) Informational privacy: Concepts, theories and controversies. In Himma, K., E., & Tavani, H, Handbook of information and computer ethics. John Wiley and Sons. Hoboken, NJ. </ref><br />
<br />
===Control Theory===<br />
<br />
Gavison’s (1980) Control Theory acknowledges that certain information will inevitably be interpreted and stipulates that individuals inherently own and actively control all information about self. Privacy exists only when the user has control over some domains of unrevealed personal information. This theory does not specify what constitutes as a zone of personal information, and why, and the extent of the user's control over said information. <ref> Gavison, R. (1980). Privacy and the limits of law. The Yale Law Journal, 89(3), 421-471. doi:10.2307/795891. </ref> <ref> Tavani, H., (2008) Informational privacy: Concepts, theories and controversies. In Himma, K., E., & Tavani, H, Handbook of information and computer ethics. John Wiley and Sons. Hoboken, NJ. </ref><br />
<br />
===Restricted Access/Limited Control Theory (RALC)===<br />
Developed by [[James H. Moor|James Moor]] and [[Herman Tavani| Herman Tavani]], RALC is a hybrid of the Restricted Access and Control theories. RALC acknowledges that some information is controlled and some are restricted, and the user maintains privacy via different means depending on the context of the situation. One important distinction is exemplified in the case of 'condition of privacy' versus 'the right to privacy'. The 'condition of privacy' states that if the user exposes his personal information, he has lost his privacy. In contrast, if the user did not choose to reveal certain information yet said information is used without permission, 'the right to privacy' has been violated. <ref> Tavani, H., (2008) Informational privacy: Concepts, theories, and controversies. In Himma, K., E., & Tavani, H, Handbook of information and computer ethics. John Wiley and Sons. Hoboken, NJ. </ref><br />
<br />
==Protecting Privacy==<br />
[[image:Privacy.jpg|2000px|thumb|right|How far will YOU go to protect your privacy?]]<br />
<br />
There exists a dichotomy in the [[Wikipedia:Information_sharing|sharing of information]], that is, publicly available information and partially available information. There has been an ongoing controversy stemming from the former case. [[Wikipedia:Data_mining|Data Mining]], the collection and use of publicly shared pieces of information (via databases, television, records, etc), has been alleged to be a blatant violation of one's information privacy. Specifically, the term "use" is vague, but can extend to a company using personal information and observed behavioral patterns to develop a profitable algorithm and/or enterprise. This issue of data mining and [[Wikipedia:Violation_of_privacy|violation of privacy]] comes into conflict with all three theories (i.e. Control, Limitation, RALC). <br />
<br />
Helen Nissenbaum points out the unethical aspects of data mining: <br />
* data mined is collected in one context, and used in another context. For example, manipulation of information and negative portrayal of character. <br />
* certain collections or patterns of information may expose the identity of a person in an unexpected way<br />
<br />
Users are therefore vulnerable to [[Wikipedia:Identity_theft|identity theft]] per se by merely cooperating in any kind of environment, especially virtual. One's real identity can be put at risk if the right amount of the correctly collected bits of information fall into the hands of an [[Wikipedia:Unauthorized|unauthorized]] viewer. Information revealed over the online environment lends itself to four self-identities: Self-determination, Narrative, Social, and Self-esteem. These four categories possess a subset of qualities that will contribute to the understanding of a person. For example, one's beliefs, emotional dispositions, religious values, etc.<br />
<br />
===Self-Identities in an Online Environment===<br />
====Self-determination====<br />
Created by [[Wiki:Harry_Frankfurt|Harry Frankfurt]], states that psychological elements that govern one are only truly authorized by himself. 'Psychological elements' such as hope, theoretical beliefs, motivations, etc evidently lend to self-identity.<br />
<br />
====Narrative====<br />
This identity was developed by Marya Schechtman and states that an identity is conceived through one's decision to impart importance on certain psychological features and by giving said features an intelligible place in his life. <br />
<br />
====Social Identity====<br />
Developed by [[Wikipedia:Charles_Taylor_(philosopher)|Charles Taylor]] and Anthony Appiah, this identity joins collective and personal properties of persons that are seen as important for social life (i.e. [[Wikipedia:Race_(classification_of_human_beings)|race]], [[Wikipedia:Gender|gender]], [[Wikipedia:Ethnicity|ethnicity]], [[Wikipedia:Religion|religion]], [[Wikipedia:Sexual_orientation|sexual orientation]]) <ref> Wikipedia.org http://en.wikipedia.org/wiki/Charles_Taylor_(philosopher) </ref>.<br />
<br />
====Self-Esteem Identity====<br />
David Copp asserts that there are clear properties a part of self-identity if there are positive or negative emotions consistently associated with certain situations <ref> Copp, David (2005). The normativity of self-grounded reason. Social Philosophy and Policy 22 (2):165-203.<http://philpapers.org/rec/COPTNO> </ref>. For example, an aspiring student will almost always feel disappointment when receiving a lower grade on an exam.<br />
<br />
==See Also==<br />
<br />
==References==<br />
<references/><br />
<br />
[[category: Information Ethics]]<br />
<br />
{|class="wikitable" align="left" border="1"<br />
|style="padding-left: 1em; padding-right: 1em" | ←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[#top|Top of Page]]''<br />
|} {{Section|||#BOTTOM}}</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Downloadable_Content_in_Video_Games&diff=71821Downloadable Content in Video Games2018-04-17T14:58:11Z<p>Hillcm: </p>
<hr />
<div>{{navBar|Topics#D}}<br />
'''Downloadable Content''', or DLC, as it is commonly referred to in the gaming community, is a form of digital media marketed as supplemental content for video games that is optional and available separately from the game itself. Video game companies that have relied on downloadable content for revenue, in addition to game sales, have been criticized by the gaming community for trying to get customers to pay twice for the same game.<ref>{{cite web|author=Pungello, James|url=http://www.vgu.tv/2013/03/06/the-great-dlc-controversy/|date=6 Mar, 2013|work="The Great DLC Controversy"|publisher=VGU.tv}}</ref> Supporters of downloadable content claim that the extra price is due to the value gained from new content in a game. This along with other issues like piracy, lead downloadable content to have several serious ethical considerations.<br />
<br />
== Background==<br />
===User Created Content===<br />
[[File:cod-dlc.jpg|thumb|A promotion for Call of Duty: World at War's second map pack.]]<br />
<br />
Some games provide applications for modifying in-game characters, environments, and game modes to the specifications of the end-user. One example of user driven DLC is the creation of texture packages to improve graphics in games, such as [http://www.moddb.com/mods/deus-ex-new-vision NewVision] for Deus Ex. Other content users make are custom maps and game modes, such as the racing maps on Halo: Reach<ref>PC World Homepage: http://www.gamepro.com/article/previews/215900/halo-reach-forge-world/</ref> or various tower or fortress defense maps in the Starcraft and Warcraft Series,<ref> Warcraft website as a means of downloading Video Game information: http://warcraft3.filefront.com/</ref> from which games like [https://en.wikipedia.org/wiki/Defense_of_the_Ancients DotA] and [http://crazykings.wikia.com/wiki/Wintermaul Wintermaul] originate. Another example falls on ''The Sims'' series, where players can create "skins", clothing, furniture and more from built-in applications such as the body shop to enhance their playing experience.<br />
<br />
However, there are games that are completely driven by user created content, such as [http://www.moddb.com/mods/goldeneye-source Goldeneye Source]<ref> Mod DB, a website focusing on general video game modding: http://www.moddb.com/mods/goldeneye-source</ref> and Garry's Mod. Goldeneye was created using Valve's Source SDK, which when paired with third party applications, can be used to create whole new character, environment, and object models within the source game engine. In this particular case, modders developed a newer lookalike shooter based on the popular N64 title 'Goldeneye'. Once users finish creating their designs, they can then upload their models and specific game settings in custom Valve servers to play with others online. <br />
<br />
[http://store.steampowered.com/app/4000/ Garry's Mod]<ref> Garry's Mod Steam Page http://store.steampowered.com/app/4000/</ref> is a sandbox physics game where players have total control over their environment by using a tool gun and a physics gun to create and manipulate objects within the game space. Given so much freedom in Garry's Mod, players can make and play a variety of game scenarios such as a mafia party game and an aerial combat game mode. Some players have even created scripts for non-player entities, making the possibility of RPG type of mods possible. Because of the level of control in GMod, modders can sometimes find themselves riding a fine line between socially acceptable and inappropriate content.<br />
<br />
===Developer Created Content=== <br />
Developers also provide downloadable content to consumers, available separately from the original game. Developer created content tends to be new maps and game modes. Notable examples of developer provided DLC are the [[Call_of_Duty|Call of Duty]]: World at War zombie Map Packs<ref> Joystiq.com on Call of Duty World at War DLC http://www.joystiq.com/2009/02/10/call-of-duty-world-at-war-map-pack-coming-in-march/</ref> "Shi no Numa" and "Der Riese', the Halo 3 "Legendary" and the "Mythic" map packs, and Fallout:3 and Fallout: New Vegas DLC, which allows players to explore new areas and play more quests.<br />
<br />
Sometimes, developers don't just release DLC long after the game has been released, but the same day that the game is released. Known as "Release day DLC" <ref> Elder Geek.com on "Release Day" DLC http://elder-geek.com/2011/06/the-question-block-release-day-dlc/ </ref>, developers have started a recent trend of allowing players to unlock special in-game items for paying a little bit more than the retail value of the game using a special code.<br />
<br />
== Criticism and Ethics ==<br />
<br />
=== Pricing ===<br />
[[file:tetris-dlc.jpg|thumb|A Satirical View of DLC]]<br />
As DLCs are additions to the game, users commonly believe that the price of the game should have accounted for any additional content that developers release later.<ref> Hubpages article on Video Game DLC http://rachelkaplan.hubpages.com/hub/DLC-for-Video-Games-A-Bad-Deal-for-Gamers</ref> In response, some users generate their own DLC to selective games. User generated DLC is content that is not sanctioned by the original developers. Due to certain copyrights on the use of the programs, user generated DLC must not be sold for money. User produced DLC is free to users. <br />
<br />
Developer produced DLC is priced differently depending on the game type, developers, and the platform of distribution. Companies, such as Valve, releases DLC for PC games for free for unknown reasons. However, on the console ports of their games, Valve maintains a regulated pricing scheme. Other companies, such as Bioware, and EA have equal pricing of DLC for both consoles and PCs. <br />
<br />
Pricing also depends on your geographic location and the specific content distribution platform. Areas outside of the US like Australia and the UK tend to pay a higher premium for extra and sometimes more censored game content, costing games from 50% to 100% more than the US counterparts for the same content. Despite location, PC gamers have the luxury of natively being able to use an internet browser to purchase and their DLC directly to their computer. On the other hand, console games have to buy discrete amounts of platform-specific "points" to pay for their DLC, such as Microsoft Points for Xbox gamers.<br />
<br />
DLC is also sometimes accused of being used to hide the "true" price of a game, with some developers selling a game for a lower price before players realize that many features must be paid for to unlock, adding a hidden cost that is sometimes higher than the original purchase price of the game. For example, one blogger purchased Mass Effect 2 for $15, but later found that the DLC required to add a significant amount of additional gameplay was priced at $30 and that because his copy was used, he would be charged an additional $15 "setup fee" <ref>Mass Effect 2 DLC's Hidden Costs http://bitmob.com/articles/the-price-of-doing-business-mass-effect-2-dlc-cost-leaves-me-feeling-manipulated-and-annoyed</ref>.<br />
<br />
=== Unlocking===<br />
Another complaint from the gaming community is that DLC oftentimes isn't newly developed environments and game modes, but rather, a code that unlocks environments, items, and objects that were already available in the game. This brings up the ethical issue of making consumers who unknowingly paid for most of the game pay a little bit more to unlock the rest of it. Gears of War 3 <ref> True Achievements.com - Gears of War 3 weapon skin DLC http://www.trueachievements.com/n5522/gears-of-war-3-weapon-skins-dlc-confirmed.htm </ref> is a recent example of granting players extra content at the cost of some money for the DLC.<br />
<br />
Some developers use third-party organizations to enable extra downloadable content. For example, the Android game Drive or Die 3 allows you to access extra content by downloading and installing an app developed by the company AppKey.<ref>http://appkey.com/faqs/#!/developers</ref><br />
<br />
Epic Games has defended their use of DLC as a way to combat used-game sales which hurt the developer. If you offer an unlock code available only to people who purchase a new game then it will motivate people to not go through a 3rd-party seller, such as eBay or GameStop, in order to get games at a lower price. <ref>http://www.escapistmagazine.com/news/view/114279-Epic-DLC-Needed-to-Fight-Used-Game-Culture</ref><br />
<br />
===Opposition===<br />
The most recent boycott of DLC is the Battlefield 3 boycott <ref> http://www.reddit.com/r/gaming/comments/hy24b/battlefield_3_preorder_dlc_boycott_coordination/ </ref>. Due to the growing trend of developers like EA and Bioware releasing "extra content" to be unlocked off of the original game, many fans felt it was unfair to let those who pay more have an advantage - especially in online play. Within the online news aggregation site [[Reddit]], the user Ramphastid posted a proposition to boycott Battlefield 3 unless EA decides to drop the launch-day DLC.<br />
<br />
As this proposition spread through [[Facebook]], [[Twitter]], and by reaching the front page on Reddit, EA heard the message loud and clear. Eventually, the game developer backed down and released a statement saying that any DLC for Battlefield 3 would be free.<br />
<br />
In November of 2011, Nintendo published a statement via an interview with AOL Games that stated: <br />
<br />
''“When we sell a game, we want the consumer to feel that they’ve had a complete experience. We’re unwilling to sell a piece of a game upfront and, if you will, force a consumer to buy more later. That’s what [Nintendo representatives] don’t want to do, and I completely agree. I think the consumer wants to get, for their money, a complete experience, and then we have opportunities to provide more on top of that.”''<br />
<ref> http://gamersxtreme.org/2011/11/18/nintendo-stands-tall-against-dlc/</ref><br />
<br />
Judging from this statement, Nintendo firmly believes that a game should be sold as a complete product providing the full experience from the get go - all content on the disc as accessible to the consumer without paying anything extra. Because most gaming companies digress from this business model, Nintendo stands in the minority for opposing DLC.<br />
<br />
===Child Access to DLC===<br />
With a growing number of the youth population using video game platforms with online connection, they are subject to manipulation by companies offering paid-for DLC. Younger children are often unaware that points used towards downloadable content are paid for by the credit card connected to the account. One extreme example involves a British boy, Nik Ghera, who spent £1150 on Microsoft Points over a six-week period, spending almost £100 in a single day on games such as FIFA and Call of Duty.<ref>{{cite web|author=Cai, Catherine|url=https://www.tomsguide.com/us/Kid-Racks-Up-Xbox-Bill-Xbox-Live,news-15880.html|date=17 July, 2012|work="Kid Racks Up £1150 Xbox Live Bill, Father Blames MSFT"|publisher=tom's guide}}</ref> His father, Sam Ghera, attempted to contact Microsoft to address the issue: "He didn't realize it was costing real money. With sites like eBay and iTunes, they ask you for a password before you make a purchase, but with Xbox Live you just press a button and then your money's gone." Ghera received a response several months later indicating that there are multiple opportunities where consumers are asked to confirm purchases and further parental guidance settings can be utilized in the account's settings to prevent excessive purchases.<ref>http://www.eurogamer.net/articles/2012-07-13-father-blames-microsoft-as-son-spends-1150-on-xbox-live</ref> This ethical implication is under the control of both the parents who grant the children access to these respective platforms and the game developers who offer purchasable online content.<br />
<br />
=== The Hot Coffee Mod===<br />
Sometimes people create DLC that emulates pornographic situations, such as the [[wikipedia:Hot Coffee mod|Hot Coffee Mod]] in Grand Theft Auto: San Andreas which picked up a lot of media attention debating the game's ESRB rating and the decision of whether it should be sold in stores since this particlar mod was considered to be very racy.<ref> http://www.gamespot.com/news/6129301/confirmed-sex-minigame-in-ps2-san-andreas </ref><br />
<br />
==See also==<br />
{{resource|<br />
*[[Digital Piracy]]<br />
*[[Blizzard Entertainment]]<br />
*[[BioWare]]<br />
*[[Grand Theft Auto IV]]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
[[Category:Video Games]]<br />
<br />
{|class="wikitable" align="left" border="1"<br />
|style="padding-left: 1em; padding-right: 1em" | ←''[[{{{1|{{{1|}}}Topics}}}|Back]]'' • ↑''[[#top|Top of Page]]''<br />
|} {{Section|||#BOTTOM}}</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=4shared&diff=718204shared2018-04-17T14:57:25Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics##}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=620<br />
|NAME=4shared<br />
|LOGO=4shared_1.jpg<br />
|SCREENIMAGE=4shared_page.png<br />
|CAPTION=4shared Logo<br />
|IMAGEURL=http://4shared.com<br />
|TEXT=Link<br />
|PLATFORM=Online File Sharing<br />
|PRODUCT=Music, videos, photos, and documents - download and sharing<br />
|TYPE=File Sharing<br><br />
|SITEURL=http://4shared.com<br />
|URLTEXT=www.4shared.com<br />
|STATUS=Active<br />
|LAUNCH=2005<br />
}}<br />
'''{{initial|4}}Shared''' is one of the largest online file-sharing websites and was founded in Ukraine in 2005 by Alex Lunkov and Sergey Chudnovsky.<ref name="ref4">Computer Sight. [http://computersight.com/software/4shared-mp3-music-video-download/ " 4Shared - Mp3 - Music - Video Download."] Retrieved on 15 April 2016.</ref> 4Shared has approximately 10 million registered users and 2.5 billion page views per month. <ref name = hi>Ernesto. [http://torrentfreak.com/4shared-sued-to-reveal-identify-of-infringing-users-120104/ "4Shared Sued To Reveal Identify of Infringing Users."] 4 January 2012. Retrieved on 15 April 2016.</ref> Users can register for either a free account or a paid premium account. From there, users can create personal folders, as well as upload, download, and store various file types. This capability covers music, videos, photos, and written documents, which are then stored on an individual virtual drive supplied by 4Shared.<ref name="ref1">4Shared. [http://www.4shared.com/faq.jsp "Frequently Asked Questions."] Retrieved on 15 April 2016.</ref> Major features of 4Shared include 4Sync, which allows users to sync files on different devices through cloud storage, developer involvement in the 4Shared API, and 4Shared mobile and desktop applications. In addition, ethical issues exist pertaining to the 4Shared privacy policy and possible copyright infringement.<br />
<br />
==4Shared Services==<br />
<br />
[[File:4sharedpremium.png|200px|thumb|right|A comparison of benefits for Premium and Free users.]]<br />
===Free User===<br />
Requires registering for an account on 4shared.com, free of charge.<br />
Services include:<br />
* Storage<br />
** 10 GB of cloud storage capacity right after registration<ref name ="ref4"/><br />
** 15 GB of cloud storage capacity after verification email<ref name ="ref4"/><br />
* Upload<br />
** 2048 MB maximum file size<br />
<br />
===Paid User (Premium User)===<br />
Requires users to subscribe to the standard $77.95/year, or other alternative payment plans.<br />
Services include:<br />
* Storage<br />
** 100 GB cloud storage capacity<ref name ="ref3"/><br />
** Ads-free sharing<br />
** Direct links<br />
** FTP access<br />
** File backup<br />
* Download<br />
** 100 GB per month of bandwidth<br />
** Instant ad-free download, pause and resume downloads, multi-download<br />
** Faster download speeds<br />
* Upload<br />
** 5 GB maximum file size<br />
** Web grab<br />
[[File:4sh_features_docsh.png|right|300px|thumb|right|alt text]]<br />
<br />
===Generic File Sharing===<br />
4Shared allows users 15GB of storage space for files supported by numerous operating platforms, including Windows, Linux, and Mac. <ref name="ref5">4Shared. [http://www.4shared-china.com/share_music.jsp#videosh "Feature: File Sharing."] Retrieved on 15 April 2016.</ref> Users can upload and download multiple photos at one time, as well as receive detailed information and account statistics related to this activity. After downloading or uploading files, users can edit, view, play and manage them from the platform.<br />
<br />
===Music Sharing===<br />
The music sharing feature provide 4shared users a way to curate a personal music collection. Users can organize their songs into playlists and stream music without having to download it first.<br />
<br />
===Video Sharing===<br />
4shared users can create their own DVD collection by uploading their movies into their virtual drive. The 4shared movie/video community provides its users with the opportunity to share videos and movies with one another other, and stream their videos instantly.<ref name ="ref4"/><br />
<br />
===Photo Sharing===<br />
The photo sharing feature enables users to upload photos to their virtual drive. Users can organize their photos into albums and share them with other users. Also, the platform allows tracking of which pictures were viewed and downloaded using the Download Counts Tool.<br />
<br />
===Document Sharing and Management===<br />
Users can share documents, organize them, and also track the statistics of how many times they were viewed and downloaded.<br />
<br />
== Features ==<br />
===4Sync===<br />
[[File:Foreman_12325318_7468_1_online_540x396.png|200px|thumb|right|4Sync setup page]]<br />
[[Wikipedia:4Sync|4Sync]] is an add-on feature that was developed for 4shared users. With its free storage of 15 GB, 4sync enables consumers to sync their files to different devices and make their virtual drive available world-wide through cloud storage capabilities.<ref name="ref2">Sheeba, Jane. [http://www.techbuzzonline.com/interview-with-anna-ceo-4sync/ "Interview with Anna: CEO at 4Sync."] 3 August 2012. Retrieved on 15 April 2016. </ref> The CEO for 4Sync, Anna Anisin, was the former Vice President of US business development and operation at 4shared.com. In January 2012, she was appointed to be the CEO of 4Sync in order to further assist the development of 4sync. The release of 4sync generated positive reviews, which led 4shared to combine 4sync and 4shared together to create 4shared-sync. However, the users found the new version of 4shared-sync rather impractical and confusing. Even though 4shared and 4sync were separated to meet market demand, the two companies remain closely related. Currently, 4shared provides a download and link to 4sync on their homepage.<br />
====4Sync Main Features====<br />
* 15 GB free online storage space<br />
* Share files for free<br />
* Synchronize files<br />
* Secure files with backup copies<br />
* Easy access to files<br />
<br />
===Developer Involvement===<br />
The 4shared API Program offers $5,000 for frequent users each month as an encouragement for creative application developers.<ref name ="ref3"/> Since 4shared API is free and easy to use, it has provided professional opportunities for those who are interested in developing their own applications for mobile phones, and web applications.<br />
----<br />
To get started with the API Program, there are 5 recommended steps:<br /><br />
# Read and develop an intimate understanding of the 4-shared API documentation<br /><br />
# Create a personal application using functionalities offered by the 4Shared SOAP<br /><br />
# Test the personal application<br /><br />
# Create a free 4Shared account and upload the application<br /><br />
# Email the web link to the application to developer@4shared.com<br /><br />
[[File:4music.png|left|thumb|200px|right|4shared Music app for Android]]<br />
<br />
===Mobile===<br />
4shared has developed a variety of applications for mobile phones with different operating systems. With the creation of these applications, 4shared users are able to access all files stored in their virtual drive using their mobile devices. Users also have the ability to browse unique features offered for their mobile device based on its operating system.<ref name="ref3">iPadCTO. [http://ipadcto.com/2011/08/12/4shared-offers-virtual-storage-with-desktop-and-mobile-access-users-enjoy-simple-drag-and-drop-interface-and-15-gb-free-space/ "iPadCTO: 4Shared Offers Virtual Storage with Desktop and Mobile Access – Users Enjoy Simple Drag and Drop Interface and 15 GB Free Space."] 12 August 2011. Retrieved on 15 April 2016.</ref><br />
* Blackberry: 4shared mobile<br />
* IPhone/IPad: 4shared mobile/4shared music/4shared photo<br />
* Symbian: 4shared mobile<br />
* Android: 4shared for Android/4shared music<br />
<br />
===Desktop===<br />
4shared has also developed a free desktop application for all operating systems. This desktop application allows users to download or upload multiple files at a time. Additionally, the desktop application prevents loss of information caused by an interruption to the internet connection. <br />
<br />
Once users sign in to their account on the 4shared desktop, there are three main controls on the main menu, which enable users to find and organize their files easily:<br />
# Folder Tree, in which users can see their folder structure<br />
# List of files and folders<br />
# List of files for uploading<br />
<br />
== Copyright Issues ==<br />
As one of the largest file-sharing websites with roughly 10 million users, it is almost impossible for 4shared to prevent all of its users from uploading copyrighted content.<ref name="ref5">Ernesto. [http://torrentfreak.com/4shared-sued-to-reveal-identify-of-infringing-users-120104/ "4Shared Sued To Reveal Identify of Infringing Users."] 4 January 2012. Retrieved on 15 April 2016.</ref> <br />
<br />
=== Privacy Policy ===<br />
The privacy policy states how personally identifiable information, information directly linked to an individual's identification, is gathered, used and protected. Reviewed by TRUSTe, 4shared's privacy policy and practices have been awarded for its transparency, accountability, and choice of collecting personally identifiable information. There are two distinct categories of information 4shared collects from its users: <br />
1) <b>Active Collection</b>, information provided by the users when they use 4shared's services and applications.<br />
2) <b>Passive Collection</b>, information that is automatically collected through the usage of 4shared's services and applications. <br />
<br />
There are various purposes for collecting personally identifiable information:<br />
# to process and complete any transactions<br />
# to request feedback and to otherwise contact users about their use of the Service and Apps<br />
# to respond and contact users through emails answering their questions, comments, requests, and complaints<br />
# to monitor and analyze services and application usage and trends<br />
# to personalize and improve the services or applications;<br />
# to send confirmations, updates, security alerts, or additional information about our products and services<br />
# to notify users about important changes to the Service and Apps<br />
<br />
=== Copyright Infringement ===<br />
4shared prohibits copyright infringement and strongly urges users to abstain from uploading or downloading copyrighted information. 4shared takes no responsibility for users who fail to follow the copyright policies stated. 4shared will take immediate action to stop and further prevent copyright infringement if the site acquires any knowledge of users involved in any copyright violation. Users may display and share only original content only if they are the copyright owner.<ref name="ref6"> 4shared. [http://www.4shared.com/dmca.jsp "DMCA Policy."] Retrieved on 15 April 2016.</ref><br />
<br />
=== Security ===<br />
4shared takes measures to ensure hardware, software, and data security. The following securities offered by 4shared are taken from the company's website. <ref>4Shared. [http://www.4shared.com/enterprise/doc/4shared_Security_Overview.pdf "Security Overview."] Retrieved on 15 April 2016. </ref><br />
<br />
'''Hardware Security'''<br />
*Data collected through 4shared is co-located on servers at Savvis Data Center, a stateof-the-art storage facility with the latest in redundant power, environmental control, and networking technology.<br />
*Zoned access throughout Data Center, biometric hand scanner requires ID card access and hand geometry measurements, customer IDC access and contacts managed via Siebel, current government-issued picture ID required, ID badge and biometric hand scan to man trap with badge reader, second-hand scans to gain access to raised floor, biometric scanner captures 3D measurements of hand.<br />
*Additional onsite security includes multiple 360-degree cameras with 10x zoom, more than 100 fixed cameras, high-speed recorders with DV cassette tapes, hard drives to eliminate down time for tape swaps and over recording, minimum 30-day tape storage.<br />
*Industrial strength, dedicated rack mount servers, feature multiple processors, redundant power supplies, redundant network cards.<br />
<br />
'''Software Security'''<br />
*Customer data resides securely on Database servers behind multiple firewalls and is not accessible from the Internet. In order to access data, operators must utilize the application server, whose access is limited by strict security.<br />
*Confidential data, such as usernames and passwords, are secured through an encrypted connection (using 128-bit encryption).<br />
<br />
'''Data Security'''<br />
*4shared methodically backs up all databases on a regular basis. We guarantee the accuracy and safety of all data hosted on our servers.<br />
*Client data is stored on our servers for the duration of an account, plus up to one year after. Customers can request to have information removed from 4shared servers at any time.<br />
*Additionally, you can apply password protection to any folder.<br />
*Customer-hosted Enterprise installations can further restrict access, by applying additional internal security measures.<br />
<br />
==Lawsuits==<br />
[[File:4shared-mail.png|400px|thumb|right|The email from 4shared refusing to divulge the identities of the uploaders.]]<br />
On January 4th, 2012, [http://www.modulo.com/ Modulo Security Solutions] filed a lawsuit against 4shared in New Jersey in order to reveal the identities of the users responsible for uploading proprietary documents to the site. Modulo Security Solutions threatened to take civil action against the uploader for copyright infringement related offenses. 4shared quickly removed these files from their website but refused to reveal the identity of the user who uploaded the documents without a court order. <ref name = hi>Ernesto. [http://torrentfreak.com/4shared-sued-to-reveal-identify-of-infringing-users-120104/ "4Shared Sued To Reveal Identify of Infringing Users."] 4 January 2012. Retrieved on 15 April 2016.</ref><br />
<br />
==Competition==<br />
Some competitors of 4shared include: <br />
*[https://www.dropbox.com/ Dropbox]<br />
*[http://www.4sync.com/ 4sync]<br />
*[http://www.justcloud.com/ JustCloud]<br />
*[http://www.amazon.com/gp/feature.html?ie=UTF8&docId=1000828861/ Amazon Cloud Drive]<ref name="ref4">http://download.cnet.com/4Sync/3000-18500_4-75629652.html#ixzz28vc1wXeC</ref><br />
*[http://www.bodongo.com/ Bondongo]<br />
*[http://www.drop.io/ Drop.io]<br />
*[http://www.box.com/ Box]<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Amazon.com]]<br />
*[[Cloud Computing]]<br />
*[[Dropbox]]<br />
*[[File Sharing]]<br />
*[[Megaupload]]<br />
*[[Stop Online Piracy Act]]<br />
}}<br />
<br />
== External Links ==<br />
{{resource|<br />
*[http://www.4shared.com/ 4Shared Website]<br />
*[http://www.4sync.com/ 4Sync Website]<br />
*[[Wikipedia:4sync|4Sync on Wikipedia]]<br />
}}<br />
<br />
== Reference ==<br />
{{resource<br />
|<br />
<references/><br />
}}<br />
[[Category:Websites]]<br />
[[Category:Information Ethics]]<br />
[[Category: Media Content]]<br />
[[Category:Virtual Environments, Concerns, & Issues]]<br />
[[Category:Services]]<br />
[[Category:piracy]]<br />
[[Category:GoldStar]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Black_Mirror&diff=71819Black Mirror2018-04-17T14:49:24Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#A}}<br><br />
{{SoftwareInfoBox<br />
|NAME=''Black Mirror''<br />
|HEIGHT=400<br />
|LOGO=Black_mirror_logo.png<br />
|SCREENIMAGE=Blackmirrortitlegif.gif<br />
|TYPE = Television Series<br />
|CAPTION=Black Mirror title Sequence<br />
|Created By = Charlie Booker<br />
|Genre=Science Fiction <br />
|LAUNCH=December 4th, 2011-Present<br />
|NUMBER OF SERIES=4<br />
|NUMBER OF EPISODES=19<br />
|PLATFORM= Channel 4, Netflix<br />
|PRODUCT= Television Series<br />
|SITEURL=https://www.netflix.com/title/70264888<br />
}}<br />
<br />
'''Black Mirror''' is a British science fiction television series that was written by Charlie Booker and Annabel Jones. The series has received global recognition, particularly in the United States after it was purchased by and made available on Netflix. Black Mirror explores the potential consequences of advances in technology, generally presenting a dystopian outlook with social commentary.<br />
<br />
The series’ episodes are anthological with each episode containing a different narrative and set of characters. Each episode centers around a new concept or sociotechnical advancement. The name “Black Mirror” refers to the reflection visible from a screen when its backlight is off. <ref>McGarrigle, Lia. “Here's What the Title of 'Black Mirror' Really Means.” [https://www.highsnobiety.com/p/black-mirror-title-meaning/] Highsnobiety, 28 Mar. 2018</ref>There are 19 total episodes of the show spread between four series. Series 1 and 2 appeared on British television station Channel 4 in 2011 and 2013, and were then added to Netflix in 2014. In 2015, Netflix purchased the series, commissioning two more series that were released in 2015 and 2017, respectively. Black Mirror was renewed for a fifth series in March of 2018. Black Mirror has won multiple Emmy awards and other accolades.<ref> “Black Mirror.” [https://en.wikipedia.org/wiki/Black_Mirror] Wikipedia, Wikimedia Foundation, 28 Mar. 2018</ref><br />
<br />
<br />
= Series 1 = <br />
[[File: Szn1promotion.jpg|200px|left|thumbnail|Promotional poster for The National Anthem]]<br />
Series 1 released in 2011 and contains three episodes. Episode 1 of Series 1, The National Anthem, first aired on Channel 4 December 4th, 2011. <ref>“The National Anthem (Black Mirror).” [https://en.wikipedia.org/wiki/The_National_Anthem_(Black_Mirror)] Wikipedia Foundation, 28 Mar. 2018</ref> It was critically acclaimed, receiving an A rating from the A.V. Club. <ref>Sims, David. “Black Mirror: The National Anthem” [https://tv.avclub.com/black-mirror-the-national-anthem-1798178649] TV Club, 13 Nov. 2013</ref> It depicts a scenario in which a prime minister must engage in broadcasted bestiality with a pig in order to save a member of the royal family. The episode paralleled allegations in 2015 that UK prime minister David Cameron placed "“a private part of his anatomy” into a dead pig’s mouth.”<ref> James Slack, Home Affairs Editor for the Daily Mail. “Revenge! Drugs, Debauchery and the Book That Lays Dave Bare: How PM's Snub to Billionaire Who Funded the Tories for Years Sparked the Most Explosive Political Book of the Decade.” [http://www.dailymail.co.uk/news/article-3242494/Revenge-PM-s-snub-billionaire-funded-Tories-years-sparked-explosive-political-book-decade.html] Daily Mail Online, Associated Newspapers, 21 Sept. 2015</ref> Subsequent episodes contend with materialism and exploitation of human labor in a technologically-advanced world, as well as alienation, and technology that consistently requires personal data to be handed over. Episode 2, "Fifteen Million Merits", depicts a world where the lives of working-class people consist of riding a stationary bike in order to earn "merits" that are redeemable for various goods. The main characters work together to earn enough merits to appear on a talent show in an attempt to escape the slave like lifestyle they currently endure, only to come to the realization that their society is artificial and materialistic. Episode 3, "The Entire History of You", depicts the pitfalls of a world where memories are readily available, and the increased societal reliance on technology to shape reactions and behaviors in personal relationships. <ref> Brooker, Charlie. “Black Mirror.” [https://www.netflix.com/title/70264888] Netflix Official Site, 25 Dec. 2015 </ref><br />
<br />
= Series 2 = <br />
[[File: waldotrump.png|400px|right|thumbnail|Series 2 Episode 3's Waldo being likened to Donald Trump]]<br />
Series 2 of Black Mirror first aired in February 2013 <ref>“Black Mirror.” [https://en.wikipedia.org/wiki/Black_Mirror] Wikipedia, 28 Mar. 2018</ref><br />
and contained four episodes, with episode 1 (Be Right Back) depicting a service by which users stay in touch with loved ones after they die, raising questions about the recreation and preservation of identity through technology. Episode 3, The Waldo Moment, tells of a satirical cartoon figure that gains popularity through its brash humor and ends up gaining a surprising amount of ground in a governmental election. The episodes touch on the larger impact of internet exchanges on political discourse, and the mixing of modern rhetoric with traditional political ides. It was likened to the 2016 American Presidential election, with some claiming that President Donald Trump carried a similar troll-like character to the cartoon entity Waldo depicted in the episode.<ref> “Black Mirror: The Unexpected Foresight of The Waldo Moment.” [http://www.denofgeek.com/us/tv/black-mirror/261620/black-mirror-the-unexpected-foresight-of-the-waldo-moment] Den of Geek, 5 Jan. 2018</ref>The series also explores developing identities with online assistance, extracting human intelligence and putting it to use, as well as widespread content blocking across one’s personal environment.<br />
<br />
<br />
= Series 3 = <br />
[[File: Bookeremmy.jpg|300px|left|thumbnail|Charlie Booker accepting his Emmy for San Junipero]]<br />
Series 3, released in October 2016, and was the first series released under Netflix ownership. It contains six episodes that capture many of the burgeoning concerns about the proliferation of technology. Episode 1, Nosedive, alludes to the everyday effects of being absorbed in public feedback and curating a polished identity on social media while struggling to build a notable network. It also portrays a world where clout is capable of directly determining one’s social standing, as well as what they’re able to consume, where they can live, and how they travel. Episode 2, Playtest, captures the haphazard approach of Tech Companies to implement and test new technologies, and the way profound new devices with life-changing effects are being tested on human subjects with little to no ethical consideration. Episode 4, San Junipero, won a Primetime Emmy award for the show <ref> Tiffany, Kaitlyn. “Netflix's Black Mirror Wins Emmy for Outstanding Writing for a Limited Series.” [https://www.theverge.com/2017/9/17/16324368/black-mirror-emmys-2017-netflix-writing-award-win] The Verge, The Verge, 18 Sept. 2017 </ref>, telling of a love story that lives forever in an online platform hosting artificial consciousness. It alludes to technology as a divine figure and the ramifications of simulating life and consciousness.<ref> Brooker, Charlie. “Black Mirror.” [https://www.netflix.com/title/70264888] Netflix Official Site, 25 Dec. 2015 </ref><br />
<br />
<br />
= Series 4 = <br />
[[File: Blackmuseum.jpg|180px|right|thumbnail|An advert for the series finale of series 4]]<br />
<br />
The latest series of Black Mirror, released on December 29th, 2017, also contains six episodes like the preceding series.<ref>“The National Anthem (Black Mirror).” [https://en.wikipedia.org/wiki/The_National_Anthem_(Black_Mirror)] Wikipedia, Wikimedia Foundation, 28 Mar. 2018</ref> The first episode, USS Callister, is largely set in a Star-Trek-like simulated reality that is used as a sandbox for a sadistic technology executive, alluding to the issues presented with simulating alternate realities online, and the depth of what it means to have consciousness and existence within virtual spaces. Episode two, Arkangel, concerns parenting and the liquid surveillance enabled by modern technology, theorizing the conflicts that occurs when parents can indulge in the act of tracking their child’s every move. Episode three is similar to The Entire History of You in Series 1, and touches on the consequences of a world where information is consistently available to be hijacked and used to manipulate others. Episode 4, titled Hang the DJ, showcases the idea of virtual simulation, through the use of trial relationships given to people by a digital companion named Coach. Episode 5, Metalhead, explores the issues of technology in surveillance, and what occurs when we put artificial agents with unknown reasoning patterns in charge of administering discipline. Episode 6, Black Museum, is an amalgamation of other themes from all other episodes, referencing the continual consequences of companies and other corporate entities developing new technologies at the expense of the exploitation of those willing to test it.<ref> Brooker, Charlie. “Black Mirror.”[https://www.netflix.com/title/70264888] Netflix Official Site, 25 Dec. 2015 </ref> <br />
<br />
<br />
= Criticism and Parallels= <br />
Critics are concerned that the show is overly disdainful of the onset of modern technologies in society—Journalist Fran Sign posited that watching Black Mirror was predicated on “mocking the subjects, foolishly thinking we are in some way above it.”<ref> Singh, Fran. “Black Mirror: Brooker's Disdain for Absolutely Everything Is Wearing Thin.” [https://www.huffingtonpost.co.uk/fran-singh/black-mirror-charlie-brooker_b_1129066.html] HuffPost UK, 4 Feb. 2012</ref>In a Vulture article, Kathryn VanArendonk explains how while she thinks Booker’s plotlines are impressive, they too often rely on the simple crutch of making blanket statements about how “everything is bad,” and that it “relies on the illusion of depth.” <ref>VanArendonk, Kathryn. “The Case Against Black Mirror.” Vulture</ref> The TV series focuses on the negative aspects of technology, causing many to feel uncomfortable about the increase in technology. To date, very few episodes have shown the positives of new technology and the future. <br />
<br />
[[File: Bmirrorpizza.jpg|350px|left|thumbnail|A comparison of Pizza Hut's delivery vehicle (left) to the one in Series 4's Crocodile (right)]]<br />
With this criticism in mind, writers and producers Charlie Booker and Annabel Jones say they’re not aiming to predict the future or cast a depressingly dystopian shadow on the future of technology. Their ideas come out of whimsical “What if?” Scenarios.<ref>CHARLIE BROOKER REFLECTS ON BLACK MIRROR'S DARK VISIONS: Black Mirror taps into the future - or at least what it could look like. But co-creators Charlie Brooker and Annabel Jones tell Gemma Dunn their hit show is more about homing in on the world's collective sense of unease ON THE SCREEN SMALL. (2017). Nottingham Evening Post. http://dx.doi.org/1982491535</ref>With this in mind, the show has been credited for its uncanny parallels to a wide variety of current events related to technology. China’s system of social credit scores was thought to pose resemblance to Series 3’s Nosedive, and Pizza Hut's release of an automated pizza delivery vehicle was likened to Series 4’s Crocodile. <ref>White, Catriona. “A Driverless Pizza Van Is the Latest Black Mirror Prediction to Come True.” BBC News, 10 Jan. 2018</ref><br />
<br />
===Channel 4 vs. Netflix===<br />
The first two seasons on Channel 4 center around the tensions that arise between technological progress and human nature, how solutions to real problems can be perverted by society. This is exemplified in the episode “Be Right Back,” where a woman loses her husband in a car crash, only to replace him with a robot facsimile created from his social media data. This episode explores a problem of, losing a loved one. A solution appears but the cracks start to show, possibly causing more emotional damage to the protagonist than just losing her husband. In the episode “The Entire History of You,” the issue of poor memory recollection is solved by “the grain,” a small implant that records everything a person sees. This allows the government in the episode to even more easily spy on their citizens and enables the protagonist to discover that his wife is cheating on him and that his daughter is not actually his. The first two seasons of Black Mirror are about the cost of progress.<br />
<br />
The message shifts in the later two seasons when the show was bought by Netflix. The challenging, thought-provoking questions from the original seasons are gone, replaced by scenarios and plots that make viewers scared of their cell phone. This is exemplified in the episode “Playtest,” where a man agrees to test an experimental video game that ends up killing him. The issue with this episode is that it has little to say outside belittling any new technology. An ultra-realistic game is not a solution to any of society current issues. The same could be said of the episode “Nosedive” where a woman chases social media validation to her own detriment. There is no overarching message to this episode other than to not place your validation in social media. Once again, there is no solution to a real problem and thus the episode does not say anything meaningful about human nature. The show was once about making viewers think, now it is about making people scared of technology.<br />
<br />
= References = <br />
<references/><br />
<br />
[[Category: Media Content]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Wearable_health_tech&diff=71817Wearable health tech2018-04-17T14:48:52Z<p>Hillcm: </p>
<hr />
<div>The term '''Wearable health technology''' refers to a type of technology that is made for consumers to wear. The advancement of ubiquitous computing health metric collection has resulted in the popularity of wearable accessories which collect health data. Examples of Wearable health tech include Fitbit devices and the Apple Watch. Wearable health tech fits under the umbrella of the Internet of Things (IoT), where everyday devices are sending and receiving data simultaneously to generate new insights. Because Wearable health tech is often utilized in a data-driven setting, ethical concerns regarding it surround the issue of data utilization and the security of collected data.<br />
<br />
[[File:Iarasheed applewatch.jpeg|300px|thumbnail|right|A stock photo of a user looking at their phone which captures physical activity data collected by the user's Apple Watch.]]<br />
<br />
==History==<br />
Wearable Health Technologies started in 1938 when the first hearing aid was developed in Chicago.<ref>https://www.futurehealthindex.com/2016/09/29/infographic-history-wearables/</ref> In 2003, the first digital pacemaker was on the market and doctors could download the information within 18 seconds. Wearable technologies became more of a trend in 2006 when Nike and Apple created footwear to connect your iPod and sneakers for a personal running experience.<ref>https://www.theguardian.com/technology/2014/oct/23/nike-apple-wearable-technology</ref> <br />
<br />
Today, many of the current smartwatch devices, such as Fitbit and Apple Watches, are referred to as “activity trackers” to reference their capability to capture and analyze movement. The Apple Watch sold more watches in the fourth quarter of 2016 than Rolex, Omega, and Swatch combined <ref>"Fortune Article on Apple Watch Sales" http://fortune.com/2018/02/20/apple-watch-sales-smartwatch/</ref>. It has also represented almost half of all smartwatch units, with Fitbit following, and nearly 80% of smartwatch revenue, amounting to USD $2.6 billion<ref>"Canalys's article on Apple Watch Revenue Analysis" https://www.canalys.com/newsroom/media-alert-apple-watch-has-its-best-quarter-and-takes-nearly-80-total-smartwatch-revenue-q</ref>.<br />
<br />
==Popular Features==<br />
Smartwatches come with a variety of features such as messaging, alarms, calendar, and other application connection while some smartwatches have elected to focus mainly or solely on health tracking abilities. These devices can capture comprehensive data (such as altitude in addition to distance), analyze the data, and comparatively display the data to allow for activity tracking.<br />
<br />
Devices are gaining capabilities to motivate users as well to be mindful of their health in the form of encouraging visualizations of data and reminders to be active. For example, the Apple Watch has default reminders to stand at certain time intervals and has the capability to evaluate whether the user has stood or not<ref>"Article on the Features of Apple Watch" https://www.iphonetricks.org/apple-watch-time-to-stand-notifications/</ref>.<br />
<br />
Smartwatches may also provide the framework for 3rd-party developers to create apps to further expand the technological capabilities of health-related initiatives<ref>"Apple Healthcare Development Article" https://www.apple.com/healthcare/products-platform/</ref>.<br />
<br />
===Heart-rate monitor===<br />
The heart-rate monitor is one popular feature of wearable tech. Devices such as the Apple Watch and Fitbit's use photoplethysmography to measure the user’s heart rate<ref>"Techadvisor article on Photoplethysmography" https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>. These devices have the capabilities to record rates at different intervals throughout the day and adapt to the interval of collection when detecting activity, such as running. <br />
<br />
Users have used such wearable tech devices to monitor their heart rate for issues. Cases have occurred when users were able to detector early signs of a heart attack using a Fitbit<ref>"Yahoo News Article on Heart Attack Instance" https://au.news.yahoo.com/a/30839939/life-saving-fitbit-detects-grandfathers-heart-attack-before-it-happened/</ref> and the Apple Watch even provides the capability to alert the user if the device records an unusually high spike in heart rate during leisurely activity<ref>"Apple Website's news on Heart Track"https://www.apple.com/newsroom/2017/11/apple-heart-study-launches-to-identify-irregular-heart-rhythms/</ref>.<br />
<br />
===Calories burned===<br />
Smartwatches and wearable health technology are often able to calculate calories burned in some form for the purpose of evaluating a workout or cardio activity. The Apple Watch used the motion and heart monitoring data it collects to determine calories burned<ref>"TechAdvisor Article on Calories Tracking"https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>. The Fitbit estimates using the heart rate tracker and BMR data<ref><br />
TechAdvisor Article on Fitbit Heart Rate Track and BMR Data"https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref> A user can make use of the caloric data to evaluate their activity and calories burned against the caloric intake they have manually logged for the day. <br />
<br />
===Sleep monitoring===<br />
Smartwatch devices and wearable tech may also offer services for sleep monitoring. These services use movement and heart rate monitoring to calculate time of sleep, time of waking up, duration of sleep, and movement between cycles and depth of sleep<ref><br />
TechAdvisor Article on Sleep Monitoring" https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>.<br />
<br />
==Benefits==<br />
Wearable Health Technology offers many benefits to help the user stay healthy and feel responsible for their health.<br />
===Mindfulness===<br />
In addition to physical health, these Wearable devices provide help with a user's mental health and mindfulness. The Apple Watch by default offers a “Breathe” function which prompts the user throughout the day to pause and monitor their breathing. The Watch signals the user to inhale and exhale at calculated moments. The Apple Watch App Store also has a comprehensive section for health-related apps which includes multiple apps focused on guided meditation and mindfulness<ref>"Imore Article on Apple Watch Meditation App" https://www.imore.com/best-meditation-apps-apple-watch</ref><br />
===Motivation===<br />
Researchers have found benefit for patients when an activity tracker is used to motivate physical activity for patients with depression. Activity tracking devices were used to complement behavioral activation therapy; patients cited “positive experiences included self-awareness, peer motivation and goal-setting opportunities” as well as “[n]egative themes included inconvenience, inaccuracies and disinterest"<ref>Chum J, Kim MS, Zielinski L, et al<br />
Acceptability of the Fitbit in behavioral activation therapy for depression: a qualitative study<br />
Evidence-Based Mental Health 2017;20:128-133. http://ebmh.bmj.com/content/20/4/128</ref>. Some wearable health technology also allows users to compete with each other, creating an environment that fosters competition, values fitness, and rewards healthy behavior.<br />
<br />
===Responsibility===<br />
Wearable health technology urges users to take an active role in their healthcare through exercising and nutrition by seeing real-time health data. Wearable health technology helps users feel responsible for staying healthy by creating an awareness of the user's daily activity (or lack thereof).<br />
<br />
===Convenience===<br />
Wearable health technology automatically tracks different aspects of the user's health and fitness without any effort from the user. This allows users to easily keep track of their exercise or sleep in one accessible location.<br />
<br />
==Apple Watch==<br />
The Apple Watch is a smartwatch that syncs up to a user's iPhone. The Apple Watch displays a user's notifications, steps, distance traveled, and minutes of activity. All 3 models of the Apple Watch have a heart rate monitor. The monitor tracks users' resting heart rate and how it fluctuates during a fixed amount of time. Series 1 watches are splash resistant and Series 3 watches are water resistant up to 50 meters <ref>“Apple Watch - Compare.” Apple, Apple, Inc., www.apple.com/watch/compare/.</ref>. All watches can operate over wifi. The Series 3 has cellular and LTE capabilities and allows users to receive notifications as well as makes calls and send text messages.<br />
<br />
==Fitbit==<br />
There are 8 Fitbit trackers available on the market, each offering different features at their price points.<br />
===Zip===<br />
The Fitbit Zip is modeled more after the traditional pedometer. It clips onto the user's clothing, such as their waistband, pocket, or undergarments. At $59.95, this model tracks steps, distance, and calories burned. It sends the data it collects to a user's smartphone or laptop and allows them to compare their statistics to others around them. The battery lasts up to 6 months and it comes in 2 colors, black and pink. <ref>“Fitbit Zip.” Fitbit, Fitbit, Inc., www.fitbit.com/zip.</ref><br />
<br />
===Flex 2===<br />
This piece of technology is wearable. Securing itself to the wrists of users, it tracks steps, distance, calories burned, minutes of exercise completed, and active hours. It also tracks sleep, is water-proof, and alerts users to notifications they receive on their cell phones, which means users never have to take it off. The battery lasts up to 5 days and the device syncs with smartphones and laptops so that users can track their progress. <ref>“FitBit Flex 2.” Fitbit, Fitbit, Inc., www.fitbit.com/flex2.</ref><br />
<br />
===Alta===<br />
The Alta comes in two different versions: one with a heart rate monitor and one without.<br />
===Ace===<br />
This model is one of Fitbit's newest models designed specifically for children.<br />
===Charge 2===<br />
The Charge 2 has a larger face and different comfort levels of wristbands in comparison to the Charge HR. This version can track multiple fitness activities at the same time.<br />
<br />
===Ionic===<br />
===Versa===<br />
<br />
<br />
==Controversy and Concerns==<br />
The criticism has occurred on whether the collection, storage, and analysis of this data is ethical. <br />
<br />
===Continuous Tracking Controversy===<br />
In 2018, a heat map by fitness app Strava was released that highlighted the routes of all their users – including running and bike riding paths <ref>"Strava Heatmap Article" https://www.strava.com/heatmap#2.95/59.86091/47.61165/hot/all</ref>. This caused controversy as military personnel was using this app as well. While military bases had been identified before using other mapping services, this capability of wearable devices to track both running and riding locations in addition to the frequency of use made it possible to see transpiration routes as well<ref>"The Verge Article on Tracking Locations" https://www.theverge.com/2018/1/28/16942626/strava-fitness-tracker-heat-map-military-base-internet-of-things-geolocation</ref>. This could cause a threat to military personnel as anyone could see how what paths Strava app users are moving on and also with what speed and frequency. The military is currently looking into any implications of the map<ref>"Washington Post Article on Location Controversy for Wearable Tech" https://www.washingtonpost.com/world/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing/2018/01/28/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.db3c0da67fee</ref>.<br />
<br />
===What Companies do with Sensitive Information===<br />
In 2009, David Shoemaker wrote a paper regarding self-exposure and informational privacy. He explores if there’s a way to come to terms whether it is ethically incorrect to share “innocent” personal data. In his exploration, he cites another author, Helen Nissenbaum, who has created a framework to justify the issue. First, just because data is offered, does not mean it can be ethically right for a party to gather and analyze it in a different context. For example, though the Strava location information was meant for an individual’s use to track their exercise, it is ethically wrong for someone to gather that data and use it to attack military personnel. Because – according to Nissenbaum – while bits of data may not be impactful, the collection of data could expose people. Users can feel be justified in feeling uncomfortable if their location data is being gathered and profiled<ref>Shoemaker, D. W. (2009). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1), 3-15. doi:10.1007/s10676-009-9186-x</ref>. User’s now must be mindful about the collection, storage, and privacy setting of location services for their wearable technology. It is critical that they understand its implications and whether they are comfortable with what someone can do with a mass amount of such information.<br />
<br />
===Security Risk===<br />
Wearable health technology is constantly gathering data about the user. It is continuously connected to the internet in order to upload this data and save it. Being connected to the internet poses a security threat to this data because most companies handling this sensitive health information does not encrypt this data appropriately. This allows hackers to gain access to this protected information. Many times, the user's data can be compromised without the user even knowing. The lack of encryption has become an embedded value in this wearable health technology. Because the corporation failed to preemptively address this issue through encryption, they have put customers at risk.<br />
<br />
==References==<br />
<br />
[[Category: Hardware]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=FaceTime&diff=71816FaceTime2018-04-17T14:44:05Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#A}}<br />
<br />
{{SoftwareInfoBox<br />
|HEIGHT=850<br />
|NAME=FaceTime<br />
|LOGO=FacetimeLogo.png<br />
|SCREENIMAGE=FaceTime.jpg<br />
|CAPTION="FaceTime on an iPhone 5"<br />
|IMAGEURL=http://www.apple.com/ios/facetime/<br />
|TEXT=Site<br />
|PLATFORM=iOS<br />
|PRODUCT=Application<br />
|TYPE= Video Calling Service<br />
|SITEURL=http://www.apple.com/ios/facetime/<br />
|URLTEXT=www.apple.com/ios/facetime<br />
|STATUS=Active<br />
|LAUNCH= June 24, 2010<br />
}}<br />
<br />
'''FaceTime''' is a videotelephony product from Apple, Inc. It was first developed for use with the iPhone 4's front-facing camera and later made compatible with all [[iOS]] devices with front-facing cameras, as well as Mac computers running OS X with Facetime or iSight cameras. In 2011, FaceTime introduced a front-facing and rear-facing camera on the iPad 2. Pioneered by Apple, FaceTime has revolutionized the concept of [[wikipedia: Voice over IP|Voice over IP]] through its ease of use and compatibility. Recently, FaceTime was in the spotlight of ethical issues surrounding the lack of transparency from AT&T and its data charges. FaceTime also provides another platform where inappropriate "sexviding" and other pornographic material can be exchanged.<br />
<br />
==History==<br />
FaceTime was first announced on June 24, 2010; it was restricted to use over WiFi only. The app was initially only available on the newly released iPhone 4. At the release conference, former Apple CEO [[wikipedia: Steve Jobs|Steve Jobs]] mentioned that FaceTime would be an open video calling standard and would open up the standard for anybody to use. <ref>FaceTime Open Standard http://www.reuters.com/article/2010/06/08/urnidgns852573c4006938800025773c006633b-idUS168083514520100608 Retrieved 2012-12-09</ref> As of March 2018, FaceTime is still a proprietary protocol. Many journalists posit that vendor lock-in gives Apple a business advantage and opening up the protocol would rid them of that advantage. <ref>Hey, Apple, any progress on making FaceTime an open industry standard? https://www.appleworld.today/blog/2016/8/8/hey-apple-any-progress-on-making-facetime-an-open-industry-standard</ref><br />
<br />
Later in 2010, Apple announced the availability of FaceTime beta for its Mac computers. <ref>FaceTime for Mac http://news.softpedia.com/news/FaceTime-Comes-to-the-Mac-Download-the-Free-Application-Today-162095.shtml Retrieved 2012-12-09</ref> The application was free and available to all users of Mac OS X version 10.6.6 or later.<br />
<br />
Facetime for Mac was officially released in February 2011 and cost $0.99. <ref>FaceTime Out Of Beta https://discussions.apple.com/thread/2763433?start=0&tstart=0 Retrieved 2012-12-09</ref> The FaceTime application is still $0.99 in the Mac App Store, although the app is now included with new purchases of Mac computers. <br />
<br />
With the introduction of [[wikipedia:iOS 6|iOS 6]], Apple announced that FaceTime calls would be available over cellular networks in addition to being available over WiFi. <ref>FaceTime over 3G http://www.theverge.com/2012/6/11/3078597/ios-6-adds-facetime-video-calls-over-cellular-networks Retrieved 2012-12-09</ref> Users can now make FaceTime calls on their iPhone's and 3G/4G-connected iPad's using their cellular network.<br />
<br />
==How It Works==<br />
FaceTime links to a user's phone number on their iPhone and an email address on all other supported devices. <ref name="Using">Using FaceTime http://support.apple.com/kb/ht4319 Retrieved 2012-12-09</ref> Users can click the FaceTime icon in their iPhone contacts list to view individuals in their contacts who are registered with the service. Within the contacts list, there lie two different FaceTime functionalities. The first is a FaceTime audio call, which is a voice calling feature without video. The other is the FaceTime video. On other devices, users select a person to call from both their contacts or the FaceTime application itself. <br />
<br />
During the duration of a FaceTime call, there is a button to end the call, switch cameras (front and back), a mute button, and a screenshot button. When receiving a call, users are presented with a call screen for [[iOS]] and can pick up or decline the FaceTime call. The screen will say FaceTime and have a different ringtone to alert the user that they are receiving a different type of call.<br />
<br />
==Different Uses for FaceTime==<br />
FaceTime has multiple uses stemming from the traditional video communication between amongst friends and family. FaceTime is most commonly used for collaboration between users that are separated by distance. For example, it is a tool primarily used for family and friends to connect, but companies also use it to interview potential employees. In addition, many songwriters in the music industry will have co-writing sessions over FaceTime if they are not in the same city. Songwriters are attracted to use FaceTime for this purpose because of the quality of FaceTime's video and audio. The quality provides the opportunity to actually write/play the song and for the users to stay in sync.<br />
<br />
==Supported Devices==<br />
*iPhone 4 or later<br />
*iPad 2 or later<br />
*iPod touch (4th generation) or later<br />
*Mac with Mac OS X v10.6.6 or later<ref name="Using"></ref><br />
<br />
Although FaceTime is not available to devices other than Apple, there is alternative video conference software to FaceTime that have a similar effect and ethical implementations such as Skype, Oovoo, Google Video Chat, Facebook Video Chat, WebEx which can be used on Mac and non-Mac devices.<br />
<br />
==Similar Platforms==<br />
===Skype===<br />
Skype is a telecommunications application similar to FaceTime that specializes in providing video chat, voice calls, and instant messaging between computers, tablets, and mobile devices. Skype was developed in 2003, acquired by eBay in 2005 for $2.6 billion, and finally acquired by Microsoft in 2011 for $8.5 billion. The use of Skype requires a microphone and webcam for audio and video, as well as a keyboard for the instant-messaging feature. Skype-to-Skype calls are free of charge to the user, while calls to mobile or landlines are charged to the user's Skype account. As one of the first peer-to-peer video chat platforms on the web, Skype was a revolutionary service that allowed people to make international calls for free or at a negligible rate.<ref>https://www.lifewire.com/what-is-skype-3426903</ref><br />
===Google Hangouts===<br />
Google Hangouts is a telecommunications platform launched in 2013 that similarly provides video chat, voice calls, and instant messaging between communication devices. Google Hangouts has gained prominence among companies for the use of business calls due to it screen tradeoff feature in group calls that automatically shows the screen of the person speaking while pushing other callers to the background.<ref>http://en.yibada.com/articles/13790/20150216/google-talk-being-discontinued-users-instructed-switch-chrome-app-hangouts.htm</ref><br />
==Ethical Implications==<br />
===AT&T and Network Charges===<br />
Before the introduction of [[iOS]] 6, it was rumored that AT&T would start charging users for FaceTime over their 3G data service network.<ref>AT&T may charge for FaceTime http://www.theverge.com/2012/7/17/3164208/at-t-may-charge-for-facetime-calls-over-3g/in/3024812 Retrieved on 2012-12-09.</ref> After the introduction of the new software, AT&T revealed that FaceTime would only be allowed on their 3G network for customers on Mobile Share plans. <ref>AT&T Allowing 3G FaceTime with Mobile Share http://www.theverge.com/2012/8/17/3250228/att-facetime-over-cellular-ios-6-mobile-share/in/3024812 Retrieved 2012-12-09.</ref> This distinction was called into question by several net neutrality watchdog groups, who then petitioned the FCC. <ref>Groups Petition FCC http://www.theverge.com/2012/9/18/3351626/att-facetime-block-fcc-complaint-net-neutrality/in/3024812 Retrieved 2012-12-09.</ref> The FCC responded to these complaints, saying they would review the objections. <ref>FCC Reviews Objections http://www.theverge.com/2012/9/25/3404938/fcc-julius-genachowski-att-facetime/in/3024812 Retrieved 2012-12-09</ref> On November 8th, 2012, AT&T revealed that they would be expanding mobile network usage of FaceTime to users with LTE devices on tiered data plans, but other users would still need to be on Mobile Share plans. They also revealed that they would be rolling out FaceTime over cellular to customers on more data plans in the "near future" but did not specify further. <ref> AT&T loosens restrictions http://www.theverge.com/2012/11/8/3619034/at-t-loosens-facetime-restrictions-allows-iphone-5-users-to-video/in/3024812 Retrieved 2012-12-09</ref><br />
<br />
Restricting this service puts the matter of ethics into question. If a service provider prioritizes the traffic of one application over the other, people will most likely not use the application that is restricted and find other means. In this case, Apple may lose customers who would have used FaceTime to other video chatting applications like Skype. Skype and several other services that provide the same video calling functionality of FaceTime, although not with the same integration into one's contacts, have been running on cellular networks before FaceTime was created. Unlike FaceTime, these services require users to download a separate application and have it running on the mobile device to receive calls. <br />
<br />
Because of this hurdle to adoption, AT&T has used the argument that FaceTime, in particular, must be controlled differently in order to make sure their network does not get clogged with too much usage. Others, such as the net neutrality watchdog groups, argue that this is still against the laws of the FCC which try to promote competition and an open internet. <br />
<br />
In contrast to AT&T's stance on FaceTime over cellular, its competition Verizon is not charging users extra or restricting FaceTime to certain plans. <ref>Verizon Not Charging For FaceTime http://www.theverge.com/2012/9/12/3324002/verizon-facetime-over-cellular-no-additional-charge Retrieved 2012-10-09</ref> Although users could switch if they want easier FaceTime over cellular, AT&T is still selling more iPhones than its competitors. <ref>AT&T Sells More iPhones than Verizon http://money.cnn.com/2012/10/24/technology/mobile/att-iphone/index.html Retrieved 2012-10-09</ref><br />
<br />
Information ethicist [[Floridi]] states in "The Ethics of Information Transparency" (2007, pg 111) that there "may be a real need to disclose the ethical details of any process of information management." AT&T has not disclosed their specific reasons for choosing to restrict FaceTime, or at least have not proven their reasons to be legitimate to the press. As the power of large technology companies such as Apple and AT&T grows, they are more vulnerable to legal faults which can eventually call the attention of high-level government. It is likely that, as Floridi predicts, there will impending need soon for information and technology related organizations to release their processing information and other confidential information as they become more regulated by the government.<br />
<br />
===Inappropriate Use and "Sexviding"===<br />
With any video-chatting feature or technology, there will be those who inappropriately use this feature in profane and pornographic ways. FaceTime currently does not have any content filters. Teens can use Facebook to send “sex vids”, in which a person sends a sexual FaceTime video call to someone else. Furthermore, the FaceTime communications are not secure, so anyone can pick up your FaceTime call, including video, without you knowing it. <ref><br />
iPhone 4 problems: FaceTime privacy and “sexviding” are new issues http://blog.sfgate.com/abraham/2010/06/24/iphone-4-problems-facetime-privacy-and-sexviding-are-new-issues/</ref><br />
<br />
Similarly, with FaceTime being a portable video chat service, there is the possibility of potentially confidential conversations occurring in unfavorable places. This disrupts the confidentiality of a conversation that two people are having when neither person are aware of who might be listening or watching in the background.<br />
<br />
===Banned Usage===<br />
FaceTime is not allowed in the United Arab Emirates due to their Telecom Regulatory Authority which restricts most person-to-person video contact. <ref> Skirting forbidden FaceTime restrictions <br />
http://www.macworld.com/article/2042991/skirting-forbidden-facetime-restrictions.html Retrieved 25 April 2016</ref> iPhones that are sold in the UAE come with FaceTime locked and any IP address that is in the area does not allow for users to access FaceTime. This sometimes causes iPhones to be sold with FaceTime in the black market. Additionally, many people use a virtual private network to get past having an IP address from inside the UAE.<br />
<br />
===Protected Data===<br />
When users utilize FaceTime instead of other means of communication, they may be better off than not regarding how likely it is that their information from their calls is shared. Apple was one of the companies that contributed to the PRISM program that the United States government created which allowed them to gather personal data from citizens. Apple claims that it will not decrypt FaceTime messages, no matter what. They have received over 10,000 requests from local, state, and federal government agencies in a six month period ending May 31st, 2013. <ref>Apple claims it can't decrypt FaceTime and iMessage data, details extent of government requests http://www.theverge.com/2013/6/17/4437272/apple-government-data-request-information-prism</ref> FaceTime is one of the services, alongside iMessage, that has an end to end encryption, leaving no gaps for Government agencies to get the data associated with them. Therefore, making cellphone surveillance much more difficult. Apple has actively decided they will not create a loophole or decryption service to their products in any situation because it would put their users at risk of a data breach. FaceTime thus offers a service for those who want to be careful about their activities on their mobile phones to utilize innate and unsuspecting applications instead of using suspicious third-party applications.<br />
<br />
===Live Photos===<br />
If both users are operating on iOS 11 or later, there is a button for a user to press and take a live photo of the other user at any time. <ref> Take Live Photos of FaceTime Video Calls in iOS 11 (& Protect Yourself from Getting Recorded). https://ios.gadgethacks.com/how-to/take-live-photos-facetime-video-calls-ios-11-protect-yourself-from-getting-recorded-0178149/. Retrieved 2018-04-05.</ref>This photo gets saved to the device of the user who took the photo; and when they click on it, they can hear and see anything that happened in the three seconds the "live photo" was taken. This has the potential to spread information that someone does not want to be spread. There is a feature in your settings on your phone that can turn this off, but many people do not know about this option and tend to allow these photos to be taken. If you are on a FaceTime call, even though you do get a notification if the other user takes a live photo, there is nothing you can do about it being in their possession at the moment <ref> Disabling Live Photos https://ios.gadgethacks.com/how-to/facetime-101-take-disable-live-photos-during-video-call-0179042/</ref>. The freedom people have to broadcast personal information becomes an issue if there is not trust between the two users.<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
[[Category: Software]] <br />
[[Category: Services]]<br />
[[Category: Media Content]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Adblocking&diff=71815Adblocking2018-04-17T14:39:45Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#A}}<br><br />
[[File:Adblock.jpg|frame| Web extension logo]]<br />
'''{{initial|A}}dblocking''' is a term used to refer to a set of technologies that block ad-related content from a given host marketer. It is most frequently referenced when discussing online marketing tactics found on websites. These different tactics can exist in the form of pop-ups, banners, and embedded videos that are presented to a user upon navigation to a website.<ref> "[https://en.wikipedia.org/wiki/Ad_blocking Ad_blocking]" ''Wikipedia: The Free Encyclopedia''. Wikimedia Foundation, Inc. </ref> Recently, companies have begun to offer adblocking services with almost every web browser now having some form of easily downloadable, free adblocking extensions. These services can block everything from banner ads to the ads played before YouTube videos. The invention of adblocking services has led to several ethical issues being raised mainly by content providers. Providers claim that the services impact their bottom lines and cause hardships on fledgling websites that depend on advertisement based revenue to support their sites. Supporters of adblocking technologies argue that the technology staunches the practice of clickbait-esque ads and that they can also edit the filters of technology so that they can still see the advertisements that they believe may apply to them, thus allowing for selective adblocking in which users can still see relevant advertisements.<br />
<br />
<br />
== History ==<br />
Over the years, adblocking has taken numerous forms. Originally, adblocking was present on homemade or bootleg recordings of radio and television content. Through the use of various recording technologies, such as VHS and Cassette tapes from the 1970s up through the early 2000s, people could make recordings of their favorite songs and television shows for later playback. Creative playback, mixing, and audio engineering tools of the day would allow people to edit out advertisements and commentary from their recordings. <br />
[[File:Vhs.jpg|frame|right|200px|An early 2000s VHS tape recorder]]<br />
Since the early 2000s, following the adoption of the internet in mainstream society and everyday life, the term has been used most prominently to refer to technologies which allow one to block online advertisements from both websites and streaming video. <br />
<br />
===Firefox===<br />
One of the earliest known examples is Firefox's extension, Adblock. Developed by Henrik Aasted Sørensen, Adblock was launched in 2002 as one of the first Firefox extensions. It allowed users to maintain a list of web addresses that the web browser would be prevented from loading - blocking the ad from being displayed on a given website. Over the years, many more adblocking technologies would be developed for a variety of different web browsers - including the successor to Adblock, Adblock Plus.<ref>{{cite web <br />
| url = http://www.businessinsider.com/interview-with-the-inventor-of-the-ad-blocker-henrik-aasted-srensen-2015-7<br />
| title = The inventor of Adblock tells us he wrote the code as a 'procrastination project' at university - and he's never made money from it<br />
| author = Lara O'Reilly<br />
| date = July 14, 2015<br />
| website = www.businessinsider.com<br />
| publisher = Business Insider <br />
| accessdate = April 9, 2017 }}<br />
</ref><br />
<br />
===Ad-skipping Feature===<br />
In 2012, Dish network began bundling their Hopper DVR with an ad-skipping feature that allows users to bypass advertising on their prerecorded programs. This particular technology led to a wide variety of lawsuits that are still in the process of being resolved. Currently, various court rulings have found this technology to be perfectly legal, despite objections from leading television networks. However, this has not stopped certain networks from threatening to drop their relationships with Dish Network if such technologies don't change to meet their advertising needs - which Dish has typically complied with.<br />
<ref> "[https://en.wikipedia.org/wiki/Hopper_(DVR) Hopper_(DVR)]" ''Wikipedia: The Free Encyclopedia''. Wikimedia Foundation, Inc. </ref><br />
<br />
== Ethical Implications ==<br />
<br />
===Businesses and Advertising Revenue===<br />
One of the biggest ethical issues surrounding adblocking is the economic impact on advertisers. Many businesses rely on digital advertising to promote or support their products and services, and adblocking can adversely affect this process by disrupting the connection between paid advertising and viewers. For this reason, businesses are concerned with how adblocking software affects the value of users and how it impacts their marketing investments.<br />
<br />
Many advertisements are argued to intrude on the users experience of platforms. Many times users are barraged with advertisements that either hinder the integrity of the website, slow down the ingestion of information, or simply irritate the user. Adblockers are said to improve user interface design to best maximize users' productivity and workflow.<br />
<br />
Adblocking itself is now a business. It interferes with conventional digital advertising methods. People need ads on their page if they are to keep their site running, which creates the need to drive user traffic to their site. For example, when performing a search on Google, the first few results are usually ads. Companies pay for this and expect to get more commerce if their sites are first in the search. With adblocking, their money is going to waste. Companies are making their advertisements less annoying. Strategies like native advertising and sponsored content seek to provide advertisements that users may enjoy or more freely interact with. Erik Martin, a manager at [[Reddit]] explains the type of ads he avoids on his site. "We are all frustrated and upset when we go to a quality publication and see ads for flat belly diets or pop-under ads". This is one of the motivating factors that compel people to use adblocking tools. Users will be deterred from the site if they are annoyed by the ads. There must be a balance of ads, varying the levels of how 'obnoxious' they can be.<br />
<br />
The president of Adblock Plus, Till Faida, believes adblocking software is a cause and a business. Faida claims approximately 6% of web users use the software. Many of these users consist of those who are less likely to pay services to block or remove ads. For example [[Spotify]], originally free, can be upgraded to Premium to avoid ads. While around 6% of users employ adblockers, many websites lose up to 8% of their audience, which hurts not only the ad providers but the actual website. Adblock Plus attempts to aid advertisers in producing and implementing successful ads. Adblock Plus charges ad providers to un-block ads and to approve ads so that they will not be blocked by the software. This program is known as the 'Acceptable Ads' program, and it's standards make it difficult for businesses and sites to become members.<ref>{{cite web|last=Mitchell |first=Robert |url=http://www.computerworld.com/article/2487367/e-commerce/ad-blockers--a-solution-or-a-problem-.html?page=2 |title=Ad blockers: A solution or a problem? |publisher=Computer World |date=2014-01-15 |accessdate=2016-03-28}}</ref> <br />
[[File:clickbaiting.png|300px|right| Examples of advertisements that get around adblock]]<br />
<br />
===Arguments===<br />
Arguments that those who use adblocking software are disruptive to a given advertiser's revenue stream - if they don't see an ad, they can't purchase the advertised product or know that the company exists in the marketplace.<ref>{{cite web|last=Fisher |first=Ken |url=http://arstechnica.com/business/news/2010/03/why-ad-blocking-is-devastating-to-the-sites-you-love.ars |title=Why Ad Blocking is devastating to the sites you love |publisher=Ars Technica |date=2010-03-06 |accessdate=2013-10-26}}</ref> The people using adblocking software represent a large portion of consumers who may see advertisements but never convert to paying customers. From this viewpoint, these users could be seen as having a net neutral impact on the advertiser and their various subsidiaries.<ref>{{cite web|last=Chappell |first=Richard |url=http://www.philosophyetc.net/2010/03/does-ad-blocking-hurt-websites.html |title=Does Ad Blocking Hurt Websites? |publisher=Philosophy, etc. |date=2010-03-09 |accessdate=2015-06-17}}</ref><ref>{{cite web|last=Robles |first=Patricio |url=https://econsultancy.com/blog/5531-is-ad-blocking-really-devastating-to-the-sites-you-love |title=Is Ad Blocking Really Devastating to the Sites You Love? |publisher=Econsultancy |date=2010-03-08 |accessdate=2015-06-17}}</ref><br />
<br />
===Ethical Implication===<br />
Ethical implication comes into play with the rise of sneakier, click bait driven advertising to combat the use of Adblock software. What makes a website successful is revenue. Articles are becoming less about important stories and good journalism and more about suckering the user's attention by disguising advertisements into stories. Ethical concerns arise when advertising starts to prey on our smaller attention spans and slyly encroach into a world of online news. The future of advertising is well on its way past sidebar or banner advertising and into the sphere of online journalism. Soon there might be Adblock software that skims through an article to determine whether or not it is, in fact, a credible story or just another well-disguised advertisement.<br />
<br />
===User Privacy and Control===<br />
[[File:Blockpref.png|150px|frame|Adblock Plus preferences screen on IOS]]Although adblocking software allows users to block all ad-related content on any given webpage, it also allows users to filter ads more specifically to their liking. Users may set their own preferences for what ads they would like to see or not see on a specified webpage. In this way, adblocking software attempts to remediate advertiser woes regarding lack of publicity of products and services. This also gives users of the software options to better tailor web pages and any corresponding ads to their personal preferences regarding shopping habits, privacy, and website use of personal data. Additionally, these options not only give users more control over what ads they do and don't see on web pages, but it also gives users options to modify actions that can be taken on the webpage. These more advanced options include enabling keyboard shortcuts, choosing which data directories the software should store the data it gathers in, and the ability to modify subscription and notification preferences. <ref>https://adblockplus.org/preferences</ref><br />
<br />
Overall adblocking software successfully allows users to tailor their experience best to themselves. Through filtering and removal of advertisements irrelevant to them, adblocking creates a better experience for the user to engage in.<br />
<br />
== References ==<br />
<br />
[[Category: Malware]]<br />
[[Category: Privacy]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Venmo&diff=71814Venmo2018-04-17T14:38:32Z<p>Hillcm: </p>
<hr />
<div>{{SoftwareInfoBox<br />
|NAME="Venmo"<br />
|HEIGHT=450<br />
|LOGO=VenmoHeader.png<br />
|SCREENIMAGE=VenmoScreenshot.jpg<br />
|CAPTION="Screenshot of the Venmo application"<br />
|IMAGEURL=https://venmo.com/<br />
|PRODUCT=Mobile Payment Application <br/> Music Sharing Application<br />
|TYPE=Mobile Payment Application<br />
|PLATFORM=[[iOS]] <br/> [[Android]] <br/> Web<br />
|SITEURL=https://venmo.com/<br />
|URLTEXT=www.venmo.com<br />
|STATUS=Active<br />
|LAUNCH= 2009<br />
}}<br />
<br />
'''{{initial|V}}enmo''' is a <span class="plainlinks">[https://en.wikipedia.org/wiki/Mobile_payment mobile payment]</span> application available on devices with <span class="plainlinks">[https://en.wikipedia.org/wiki/Android_(operating_system) Android]</span> or <span class="plainlinks">[https://en.wikipedia.org/wiki/IOS iOS]</span> operating systems where users can instantly send money to or receive money from other Venmo users. Users are able to put money into a Venmo account or link their bank account or credit/debit card to the app. Venmo has revolutionized the practice of transferring money by allowing its users to do so through their mobile devices quickly.<ref>[https://venmo.com/about/product/ Venmo: About the Product]</ref> Initially, Venmo only worked for peer-to-peer transfers, emphasizing the social networking aspect of the platform. However, since 2017, select merchants accepted Venmo as a mode of payment. Users can also view information about transactions between their friends in the “News Feed” feature of the app. Because Venmo requires the sharing of personal data with the app to make transactions possible, there are a variety of ethical issues associated with the service. Some of these issues include the lack of two-factor authentication, the risks associated with security breaches, and the company’s attempt to make finances, which are generally viewed as private information, acceptable for social sharing.<br />
<br />
<br />
==History==<br />
Venmo was founded by Andrew Kortina and Iqram Magdon-Ismail. The two met at the <span class="plainlinks">[https://en.wikipedia.org/wiki/University_of_Pennsylvania University of Pennsylvania]</span> in 2001 when they were randomly assigned as freshman year roommates. Throughout their senior year and for a few years following their graduation, the two founders began working on various projects, eventually launching Venmo in August 2009. Their original idea was to launch a music startup through which people could send a text to a band and then receive an [MP3] via email. The idea for sending payments over technology supposedly came during a night where Magdon-Ismail forgot his wallet and owed Kortina money. The original design idea was for users to send and receive payments via text message but eventually morphed into the in-app payment method that Venmo uses today. <ref>[http://www.businessinsider.com/venmo-origin-story-facts-andrew-kortina-2014-6 13 Fascinating Things We Learned About Payments Company Venmo]</ref><br />
<br />
Venmo was first bought by <span class="plainlinks">[https://en.wikipedia.org/wiki/Braintree_(company) Braintree]</span> in 2012 for $26.2 million.<ref>[http://www.bloomberg.com/bw/articles/2014-11-20/mobile-payment-startup-venmo-is-killing-cash Cash is for Losers]</ref> In 2013, one of Venmo's former competitors, [[PayPal]], purchased Braintree and all of its subsidiaries in an all-cash deal of $800 million.<ref>[http://techcrunch.com/2013/09/26/paypal-acquires-payments-gateway-braintree-for-800m-in-cash/ PayPal Acquires Braintree]</ref> By the second quarter of 2015, PayPal's company earnings indicated that a total of $1.6 billion was being transacted through Venmo.<ref>[http://thenextweb.com/apps/2015/07/16/people-sent-1-6b-over-venmo-in-q2-2015-more-than-double-this-time-last-year/#gref People Sent $1.6 Billion Over Venmo]</ref> By the end of 2017, more than 2 million retailers accept payments through Venmo.<ref>[https://www.reuters.com/article/us-paypal-hldg-venmo/paypal-rolls-out-venmo-payments-to-its-u-s-retailers-idUSKBN1CM1GH PayPal rolls out Venmo payments to its U.S. retailers]</ref><br />
<br />
==Service==<br />
===Account Set Up===<br />
Users first set up their accounts on the application using either an email address or a [[Facebook]] account. There are three main methods for making payments on the application.<br />
[[File:transaction.PNG|right|250px|thumb|Venmo's "New Transaction" page]]<br />
These three options include transferring money from an existing Venmo balance, using a credit or debit card, or sending money directly from a US bank account. A user's Venmo account balance accumulates when other users send them money through the app. Money in the existing balance can use to pay others or can be transferred back to the user's linked bank account. The credit and debit card option is available for users' connecting their Venmo accounts with a credit account. Venmo supports most major debit cards but incurs a 3% fee for credit cards and some debit cards issued by smaller banks.<ref>[https://venmo.com/about/fees/ Venmo About Fees]</ref>Receiving money is always free. A user can also set up their Venmo account by connecting it to their US bank account, from which it is possible to directly transfer funds back and forth between the bank account and the application.<br />
<br />
===Transactions===<br />
After verifying their linked bank accounts, users can go about sending and receiving money on Venmo using the pay options that they selected during account setup. There are a few ways for which various Venmo transaction take place. First, a user can click the new payment button in the top right hand corner that takes them to the "New Transaction" page. Users can search the name of the user that they want to pay or request money from. After selecting someone to pay or request from, the user must enter a dollar amount accompanied by a comment that describes what the payment is for.<ref>[https://www.youtube.com/watch?v=YEcikNNzOkI Venmo App Review]</ref> The user then selects either the "Pay" or "Request" option and confirm the transaction before sending the payment. The user on the receiving end is informed with an in-app notification in addition to an email or text message. Another way to make a transaction is to visit another user's profile directly. After navigating to the receiver's profile, the user can press the blue "Pay" or "Request" button, which goes to the "New Transaction" page with the same process as before. Venmo connects to the contacts in the user's phone to find people with which they may want to connect on the app. A user's contacts will appear in their Venmo address book which allows users to search for someone by their username, phone number or email.<ref>[https://www.youtube.com/watch?v=QlJwgjN3lCY YouTube App Review]</ref> <br />
<br />
Once a user has a balance in their Venmo account, they have the option to transfer it to their bank. This only works if the user's Venmo account is connected to either their checking or savings account. To transfer the balance, the user must click the hamburger navigation button in the top right corner and click "Transfer to Bank". This pulls up the "Transfer to Bank" page where the user can choose how much they want to transfer, which bank account they want to transfer it to, and then hit the "Transfer Now" button. The transfer process takes one business day, which is stated below the "Transfer Now" button and Venmo notifies the user when that takes place.<br />
<br />
===News Feed===<br />
Venmo has a news feed feature for its users. There are three types of news feeds:<br />
[[File:newsfeed.jpg|right|250px|thumb|Buttons of different News Feeds]]<br />
* Global<br />
* Friends<br />
* Personal<br />
<br />
The global news feed shows every request or payment that is made on Venmo in the order of their occurrence. The friend's news feed shows the user transactions that occur between the user's friends making a post or others. This difference is distinguished by a symbol on the right side of each post, with a symbol of friends for the user's friends and the globe for others. Each post shows between whom the transaction was made, a photo of the sender, the comment and the time it occurred. It does not state the amount being transferred. The user is also given the option to like or comment on the post. Often times users like each other's post to show that they are aware they received the transfer. The personal news feed is specific to each user and shows their transactions that have occurred over time. The major difference with this timeline is that shows the transaction amount which is green when money is received and red when a payment is made. It also shows the user when a transfer has been made to their bank.<br />
<br />
==Business Model==<br />
While Venmo is not a revenue-generating entity of PayPal, the child company still extends the reach of PayPal's user base by a significant amount. As of early 2017, Venmo was only responsible for around five percent of PayPal’s total payment volume<ref>[http://www.businessinsider.com/venmos-monetization-will-be-worth-watching-2017-1 Venmo's monetization will be worth watching]</ref>, but its mobile capabilities are becoming far more popular than PayPal's original application and website. The social nature of Venmo's platform has allowed it to take off among younger audiences in a way that the PayPal application did not manage to do. While Venmo itself is a transaction fee-free platform for payments made from user bank accounts or existing Venmo balances, payments made by debit and credit cards do include a three percent transaction fee<ref>[http://www.investopedia.com/articles/personal-finance/032415/how-safe-venmo-and-why-it-free.asp How Safe Is Venmo and Why Is It Free?]</ref>. Venmo continues to be a strong competitor against similar mobile payment methods like ApplePay, Google Wallet, and various other mobile payment options available through social media platforms (Facebook offers a payment option through its messenger service, <span class="plainlinks">[https://en.wikipedia.org/wiki/Twitter Twitter]</span> offers Square Cash through its app, and [[Snapchat]] recently released SnapCash as a method of in-app payment)<ref>[http://www.investopedia.com/articles/personal-finance/010715/venmo-its-business-model-and-competition.asp Venmo: Its Business Model and Competition]</ref>. In coming years, Venmo is looking to expand its reach in various contexts, most prominently by means of in-store payment options that will shift the tide further away from traditional in-store payment methods.<br />
<br />
==Ethical Implications==<br />
Personal information and financial information is protected by Venmo's security systems and data <span class="plainlinks">[https://en.wikipedia.org/wiki/Encryption encryption]</span>. Financial information is protected on secure servers.<ref>[https://venmo.com/about/security/ Venmo About Security]</ref> Because Venmo is a mobile application, its security goes beyond just the application. Phone security remains an issue because it is the main point of access for the application. There has been debate about how secure Venmo really is. Unlike other mobile applications, Venmo experiences another level of security due to the fact that it deals with bank account details in addition to a lot of other confidential and sensitive information. Venmo does not have a phone line to deal directly with customer issues regarding stolen funds or other security concerns<ref>[http://www.slate.com/articles/technology/safety_net/2015/02/venmo_security_it_s_not_as_strong_as_the_company_wants_you_to_think.html Venmo Security]</ref>, which means that customer in need of urgent help may not receive immediate attention because Venmo relies on an email system that is known for being slow to respond.<ref>[http://www.engadget.com/2015/03/02/venmo-security-issues/ Venmo Security Issues]</ref> The most prominent ethical problem being addressed by the popular press and various users of mobile payment methods is the problem of informed consent.<ref>[https://personcenteredtech.com/2015/03/01/ethics-of-disclosure-to-clients-who-pay-with-plastic-or-online-transfers/ Ethics of Disclosure to Clients Who Pay With Plastic or Online Transfers]</ref> Overall, upon signing up for a Venmo account, the biggest breach of ethics is that users are not made explicitly aware of the risks associated with connecting their bank account and credit card information to the platform. The issue of confidentiality is another major ethical concern that arises specifically with Venmo. Users should be afforded a certain level of privacy when dealing with any kind of financial information, especially on web or mobile-based platforms due to the increased likelihood of hacking and general security breaching. Venmo's platform is highly social, one of its affordances being the inclusion of the global news feed, in which all transactions are published regardless of any one user's interest in maintaining a more private existence on the application. Usernames are easily searchable and can be accessed even by those who are not connected with any particular user, which in some cases allows for increased convenience but also means a sacrifice of privacy.<br />
<br />
===Security===<br />
Although PayPal, Venmo's parent company has <span class="plainlinks">[https://en.wikipedia.org/wiki/Multi-factor_authentication two-factor authentication]</span> for every transaction and password reset, Venmo does not. <ref>[http://www.theverge.com/2015/2/27/8120983/venmo-security-problem-hacking-theft Venmo Security and Hacking Threat]</ref> Implications of this lack of authentication means that anyone with access to the application on another smartphone could potentially transfer large sums of money through Venmo in an instant without the user being able to do anything about it. In July 2011, Venmo released an iPhone application update that added a passcode lock feature enabling users to lock their Venmo app with a four-digit PIN or <span class="plainlinks">[https://en.wikipedia.org/wiki/Touch_ID Touch ID]</span> (the Touch ID function is only available for <span class="plainlinks">[https://en.wikipedia.org/wiki/IPhone_6 iPhone 6]</span> users).<ref>[http://blog.venmo.com/hf2t3h4x98p5e13z82pl8j66ngcmry/iphone-update-released?rq=email%20settings iPhone Update Released]</ref> If the user chooses to create a PIN for their account, they will be asked for their PIN or Touch ID every time they log in or open the app.<ref>[https://help.venmo.com/customer/portal/articles/1353616-can-i-add-a-pin-to-my-account Add a Pin]</ref> This added security measure serves to provide a little more security for Venmo users. Venmo limits users to $300 transfers per week or up to $2,900 with identity verification. Although Venmo requires these transfer limits, there have been instances in which users managed to successfully transfer more than the $300 limit without identity verification. This kind of loophole can be dangerous especially if one user were to access another user's Venmo account to send large sums of money. The application's convenience is why so many users are not too worried about anything bad happening to them, but Venmo has been working harder to ensure that users don't need to sacrifice security for convenience. In dealing with sensitive information like bank account details, it should be even more crucial to the company to ensure that their users can expect a secure experience. <ref>[http://www.cnet.com/how-to/square-vs-venmo-vs-google-wallet-vs-paypal/%20Five%20Ways%20to%20Get%20People%20To%20Pay%20You%20Back Cash-free Pay Options]</ref> <br />
<br />
====Security Breaches====<br />
There have been a few security breaches reported through Venmo's platform. One victim of these security breaches was Bryant Trinh, a senior at <span class="plainlinks">[https://en.wikipedia.org/wiki/California_State_University,_Long_Beach California State University, Long Beach]</span>. The 21-year-old was robbed of $3,000; it was only alerted of the scam by his <span class="plainlinks">[https://en.wikipedia.org/wiki/Chase_Bank Chase bank]</span> account rather than by the application. Trinh claimed that he received no notifications of another user logging into his account, and furthermore received no notice of any transactions taking place.<ref>[http://nextshark.com/venmo-hacked/ College Student Hacked for $3,000 Serves as Warning of Venmo’s Security Issues]</ref> Since the event, Venmo has updated their policy, as now they send emails to alert you of when a transaction has been completed. Another victim of hacking was professional poker player Moshin Charania. Charania's account was hacked for more than two thousand dollars. While Charania was later reimbursed for his loss by Venmo, the issue of account safety was still brought into question by Venmo users, most of whom voiced their concern for the platform's security over various social media accounts.<ref>[http://nextshark.com/venmo-hacked/ Venmo Hackings]</ref><br />
<br />
In another case, Chris Grey, a 30-year-old web developer from New York City, received a notification from his Chase bank account informing him that his account had been charged the amount of $2,850. Grey checked his Venmo account to find that his password no longer allowed him to successfully log into his account. After resetting the password, Grey was able to see that a new address had been entered under his account information and transaction notifications had been disabled. The payment of $2,850 had been made to a user that Grey didn't know. Security concerns followed as Venmo again had failed to notify Grey of any of this suspicious activity on his account.<ref>[https://www.scu.edu/is/secure/blog-news-and-events/blog-posts/is-venmo-safe.html Is Venmo Safe?]</ref> Failure to notify users when account settings have been changed is one of the greatest security concerns, and has been the focus of many security breaches. In most cases, users are alerted of suspicious transactions through their linked bank accounts; however, as some users do not have automatic alerts for unusual or unexpected transactions, it would be in the users' best interests if Venmo's alert system were updated to reflect this need. After various hacking cases came to the company's attention, Venmo remedied the problem by implementing a feature through which users can set up email and text notifications to receive instant updates on when a payment is made through their account. Despite these improvements, the process for correcting a hacked or incorrect payment remains relatively slow.<br />
<br />
[[File:venmowords.jpg|right|250px|thumb|An inappropriate Venmo user's posts.]]<br />
<br />
===Privacy===<br />
Because Venmo also has a social aspect associated with it, it deals with many of the same issues that social media sites deal with. Venmo has a “news feed” where users can see various transactions split into public transactions, friends’ transactions and personal transactions. Venmo has put a feature that allows a user to decide if a payment will be public, private or just for their friends. While this option is helpful for Venmo users to protect their privacy, some users do exploit the system by naming their payments inappropriately and using the public option to catch other people's attention for fun.<ref>[https://www.youtube.com/watch?v=QlJwgjN3lCY YouTube App Review]</ref> Venmo does not filter out most inappropriate content, which can be ethically damaging to innocent users, especially younger ones.<br />
<br />
Venmo also allows users to link with other social media sites like Facebook, Twitter, and Foursquare which would then share their payments and posts on that social media. <ref>[http://www.pcworld.com/article/252261/venmo_aims_to_make_mobile_payments_social.html Venmo Aims to Make Mobile Payments Social]</ref> This social sharing will increase the privacy issues that Venmo has to deal with because it not only has to contend with the privacy of users on their own application but now other social media sites are involved as well. Within a Venmo user's social network, the company provides three levels of sharing privacy (public, friends only, or private) that can be toggled on the fly. Being transparent and open about privacy and sharing is a key factor for Venmo as their business deals with finances, which is an intrinsically private matter for most people.<br />
<br />
[[File:vicemo.jpg|right|250px|thumb|What a Venmo newsfeed might look like.]]<br />
<br />
==See Also==<br />
{{resource|<br />
*[https://en.wikipedia.org/wiki/Mobile_payment Mobile Payment]<br />
*[https://en.wikipedia.org/wiki/Square,_Inc. Square, Inc.]<br />
*[[Information Security]]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
[[Category:Mobile Application]]<br />
[[Category: Media Content]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Wattpad&diff=71813Wattpad2018-04-17T14:36:39Z<p>Hillcm: </p>
<hr />
<div>{{socialNetworkSiteInfoBox\draw<br />
|logo=E23b393f-9495-4254-b013-c9bbd8822662-Wattpadlogo-Wattpad-Wattpad.gif&width=300&height=300&format=jpg.jpg<br />
|logoBackgroundColor={{Color|background|blue}}<br />
|screenimage=wattpad-screenshot.png<br />
|caption=[http://www.wattpad.com Wattpad's] homepage - "Discover a world of unlimited stories"<br />
|membership=Need to create an account to join (through e-mail or [[Facebook]])<br />
|features=online reading and writing community<br />
|status=active<br />
|launch=2006<br />
|users=<br />
}}<br />
'''Wattpad''' is a social networking mobile site for aspiring writers, editors, and avid book readers based in Toronto, Canada. Wattpad is also a database of over 5 million self-published stories that anyone can read and comment on. The subjects of the stories include horror, fantasy, non-fiction, science fiction, and many other subjects<ref>http://www.wattpad.com/about</ref>. <br />
<br />
==Origin==<br />
Wattpad was created in 2006 in Toronto, Canada as a partnership between Allen Lau <ref>http://www.makingthingsoutofnothing.com/</ref> and Ivan Yuen. In February 2007, Lau and Ivan created a mobile application of Wattpad that was supplied with 17,000 stories through an e-book project entitled Project Gutenburg <ref>http://en.wikipedia.org/wiki/Project_Gutenberg</ref>. Project Gutenberg is a long-running organization that started in 1971. Their primary goal is to encourage ebook reading through the maintaining and distribution of copyright-free books. In the year 2009, Wattpad's mobile application expanded to mobile platforms such as BlackBerry <ref>http://en.wikipedia.org/wiki/BlackBerry</ref>, iPhone <ref>http://en.wikipedia.org/wiki/IPhone</ref>, and the iPad <ref>http://en.wikipedia.org/wiki/IPad</ref>. Now Wattpad is a social community of readers and writers where nearly 500,000 books are created every month.<br />
<br />
==Recent Funding/Rewards==<br />
<br />
In September 2011, Wattpad received 3.5 million dollars in funding from Union Square Ventures <ref>http://gigaom.com/2011/09/12/union-square-backs-wattpad-to-make-reading-more-social/</ref>. Union Square Investors has also been an investor of ''MySpace'' (see [[Social Networking]]). Other investing companies that support Wattpad are W. Media Ventures and Golden Venture Partners. <br />
<br />
In December 2011, Wattpad was nominated and won an award on the subject of "innovative digital media" at an event called CIX <ref>http://www.itbusiness.ca/it/client/en/home/news.asp?id=65192</ref>. The CIX (Canadian Innovation Exchange) is Canada's people choice awards for start-up companies. The companies nominated for these awards are recognized for successful and innovative business strategies and start-ups. Within the same year as 2011, Ivan Yuen was selected to be part of the Deloitte Impact Infused Program <ref>http://www.deloitte.com/view/en_CA/ca/pressroom/ca-pressreleases-en/58b44ca2284c3310VgnVCM3000001c56f00aRCRD.htm</ref>. The program selects ten entrepreneurs in the Canadian start-up business market and gives them special resources and training to increase their chances of supporting and/or creating their business.<br />
<br />
Wattpad's most recent round of funding took place in January of 2018 when Tencent, the company that developed Wechat, invested 61.25 million CAD to Wattpad. This led the pre-money evaluation for Wattpad to rise to 438 million CAD and brought in more investors in BDC Capital IT Venture Fund, Kickstart Ventures in the Philippines, The Peterson Group, and Raine Ventures. <ref>Pitchbook. https://my.pitchbook.com/profile/52773-22/company/profile#news</ref> This was significant beyond financial implications, as it solidified relations between Wattpad and Asian markets.<br />
<br />
==Featured Pages==<br />
Wattpad features a list on the front page called the "What's Hot List." The stories placed on the list are selected through the highest number votes. The list changes daily due to an ongoing voting process. According to the profiles that exist in Wattpad, most of the authors on the appear to be inspired, teenagers. <br />
<br />
Wattpad also has a "Featured Story" list on the site. The stories selected for this list are read and hand selected by staff members of Wattpad. Most of the authors that are selected are well established professional e-book writers that self-publish their own work.<br />
<br />
==Notable Writers==<br />
[[File: Margaret-AtwoodWP.jpg|thumb|A photo of Margaret Atwood]]<br />
Margaret Atwood <ref>http://en.wikipedia.org/wiki/Margaret_Atwood</ref> has been a long time supporter of Wattpad and its cause. Margaret Atwood is a novelist, writer, essayist, literary critic, and a poet. She is one of the most notable writers in Canada, claiming a very extensive list of awards and creating multiple writer's organizations. She is also a promoter of environmentalism. <br />
[[File: Abigail-GibbsWP.jpg|thumb||left|A photo of Abigail Gibbs]]<br />
<br />
Abigail Gibbs <ref>http://www.dailymail.co.uk/news/article-2201767/Wattpad-Abigail-Gibbs-18--secures-figure-sum-vampire-novel-inspired-Twilight-saga.html?openGraphAuthor=%2Fhome%2Fsearch.html%3Fs%3D%26authornamef%3DLarisa%2BBrown</ref> is a Wattpad writer from Brixham, Devon, in the U.K. She started writing her book, The Dark Heroine when she was 14. Now at 18 through Wattpad, she amassed a very large amount of readers and over 17 million hits. She has recently signed a six-figure deal with HarperCollins, a publishing company in Britain and America. Her book was inspired by the Twilight series by Stephenie Meyer.<br />
[[File: Brittany-G.WP.jpg|thumb|A photo of Brittany Geragotelis]]<br />
<br />
Brittany Geragotelis <ref>http://en.wikipedia.org/wiki/Wattpad</ref>is an editor for a magazine entitled "American Cheerleader <ref>http://www.americancheerleader.com/</ref>." She is famous on Wattpad for writing a popular story entitled "Life's a Witch." The story currently has over 20 million reads. She has decided to self-publish her own work.<br />
<br />
==Contests==<br />
Wattpad host a series of small contests through the community page. The annual awards contest is called the Watty Awards <ref>http://www.wattpad.com/watty2011</ref>. The Watty awards were started in 2011 and are broken down into three divisions in order to give users of varying ability a chance to win. The three levels are Popular, On The Rise, and Undiscovered. Anyone with a Wattpad account can enter the contest. <br />
<br />
In collaboration with Margaret Atwood, another contest has been created. The new contest is called the "Attys" awards. The Attys is a poetry contest that gives writers a chance to compete in 2 different categories: an "Enthusiast" or a "Competitor." 2012 marks the first year of the contest. Submissions end at the end of October. The judging panel consists of ten Toronto based notable writers and artist.<br />
<br />
==Ethical Concerns==<br />
===Copyright Infringement===<br />
Some community pages and news pages have named Wattpad as "Literato's Pirate Bay" <ref>http://www.theregister.co.uk/2009/03/09/wattpad_iphone/</ref>. This name has come into fruition through a number of writers who used Wattpad to create digital copies of famous novels such as the Twilight series and Harry Potter <ref>http://www.nytimes.com/2009/05/12/technology/internet/12digital.html?_r=1&</ref>. Many authors including Stephanie Meyer, J.K. Rowling, and Stephen King, have become more active in patrolling sites like Wattpad for illegal copies of their work and demanding that Wattpad erases those books from their database. Wattpad has responded by erasing the illegal copies as quickly as possible. In April 2009, Wattpad launched an "Authors in Charge" program, which was designed to allow authors or their representatives to directly remove copyright infringing material from the site. However, this program was designed specifically for authors with published books for sale<ref>http://en.wikipedia.org/wiki/Wattpad#Copyright_violation_controversy</ref>.<br />
<br />
==Future Facing==<br />
In the last few years, Wattpad has undergone a series of significant changes with the ultimate goal of expanding into more geographical areas and gaining users. Their forward-facing goal is to incorporate machine learning and interactive storytelling more deeply into Wattpad, as well as to further pursue their presence in television, film, digital media, and publishing. They are looking to use the large investment they received to accomplish these goals, as well as to grow the company in general from their current 130 employee count. <ref>Pitchbook. https://my.pitchbook.com/profile/52773-22/company/profile#news</ref><br />
<br />
In addition to broad expansions, Wattpad has targetted specific geographic locations where it hopes to focus efforts on expansion in the coming years. They currently have offices in Toronto and Los Angeles, but after Tencent's investment in them, they are looking to penetrate the Chinese and broader Southeast Asian markets. Wattpad will be carrying out this expansion through their Wattpad Studios division, and have already taken a major and tangible step in onboarding Dexter Ong to lead Asian operations from Hong Kong. They will be combining their two expansion goals of geographic location and moving into other media channels by partnering with Chinese companies to create content for film, television, print, and other digital media. <ref>Anderson, Porter. "Wattpad Studios Formalizes Asian Expansion, Placing Dexter Ong in Hong Kong" https://publishingperspectives.com/2018/04/wattpad-studios-asia-expansion-hong-kong-dexter-ong/</ref><br />
<br />
===Wattpad Premium===<br />
==See Also==<br />
[[Social Networking]]<br />
<br />
==References==<br />
<references/><br />
<br />
[[Category:Media Content]]<br />
[[Category:Social Networking]]<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Lyft&diff=71812Lyft2018-04-17T14:34:12Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics##}}<br><br />
{{SoftwareInfoBox<br />
|NAME=''Lyft''<br />
|HEIGHT=560<br />
|TYPE=Ridesharing Application<br />
|LOGO=Lyft.png<br />
|SCREENIMAGE=Lyftapp.png<br />
|CAPTION=Lyft Application<br />
|IMAGEURL=https://techcrunch.com/2015/12/17/lyft-redesigned-its-app-to-make-it-easier-for-those-of-us-with-bigger-phones-to-access-with-just-one-hand/<br />
|PRODUCT=Service<br />
|LAUNCH=2012<br />
|STATUS=Active<br />
|PLATFORM=iOS, Android<br />
|DEVELOPER=Logan Green and John Zimmer<br />
|SITEURL=https://www.lyft.com<br />
|URLTEXT= Lyft Official Website<br />
}}<br />
'''{{initial|L}}yft''' is a rideshare platform launched in 2012 that is used on mobile devices to connect users with drivers. The company is currently valued at $7.5 billion and operates in over 300 cities in the United States and 9 cities in Canada. Users interact with the app by creating a profile and linking their location. From that point, users can request a ride from any of the active drivers in that specific area. Drivers will typically arrive within minutes of the request. When requesting a ride, riders have the ability to choose between different cars (higher quality cars, XL cars that can fit more people) and prices. Lyft also offers a feature where riders and drivers can rate one another depending on the quality of the ride. Lyft and their main competitor, [[Uber]], share many of the same features. These two companies have revolutionized the world of automobile transportation, and in many ways, have overtaken usage of the taxicab. Lyft has struggled with the treatment of their drivers, which has recently resulted in a 27 million dollar lawsuit against the company. In addition to this issue, Lyft has experienced several ethical and operational complications, including issues involving the [[Wikipedia: Americans with Disabilities Act| Americans with Disabilities Act,]] local regulations, insurance, privacy, passenger discrimination, and airport policies. <br />
<br />
== History ==<br />
[[File:Logan_John.jpg|300px|thumb|right| Logan Green, CEO, and John Zimmer, President of Lyft. <ref> 40 Under 40. [http://fortune.com/40-under-40/2015/logan-green-john-zimmer-3/. "Logan Green and John Zimmer."]</ref>]]<br />
[[Wikipedia: John Zimmer|John Zimmer]] attended [https://en.wikipedia.org/wiki/Cornell_University Cornell University] and has a background in hospitality; he was particularly inspired by a class he took on the evolution of creating greener cities. This led to the idea of streamlining transportation with more effective models. When learning about cars and the road system, Zimmer was intrigued by the low rate of occupancy of public transportation. He realized that if you could increase the occupancy by a mere ten percent, it would create a more efficient society. [[Wikipedia: Logan Green|Logan Green's]] background was specifically in transportation hacking, as he built the first car-share program even before [[Wikipedia: Zipcar|Zipcar]], at the [[Wikipedia: University_of_California,_Santa_Barbara| University of California at Santa Barbara]]. He was constantly frustrated with the public transportation system and how it was funded. He wanted to build a transportation system that was operated and financed in a better way. <ref>Lynley, Matt. [http://www.businessinsider.com/lyft-ride-sharing-john-zimmer-2012-9 "Meet Lyft, A Startup Trying To Change San Francisco's Decades-Old Transportation System."] 2012. Retrieved on 19 March 2017. </ref><br />
<br />
John Zimmer and Logan Green founded Lyft on May 22, 2012. They originally created a company called [https://en.wikipedia.org/wiki/Zimride Zimride] in 2007, which was very similar to Lyft but was geared towards long distance rides connecting people through [[Facebook]]. <ref>Russell, Jon. [https://techcrunch.com/2015/01/28/zimride/ "Zimride Is Closing Its Public Ride-Sharing Service To Focus On Corporates And Students".] 2015. Retrieved on 1 March 2017. </ref> However, there was a strong market for short distance journeys, which was missing from Zimride. Thus, Lyft was created to better address this need, and the company has experienced growth since its inception. Initially created in San Francisco, Lyft offers services across the U.S. and parts of Canada. It is currently pursuing international expansion opportunities <ref>History. [https://successstory.com/companies/lyft/ "Lyft Success Story."] Retrieved on 1 March 2017.</ref> Lyft has been a primary competitor of Uber, with both companies offering low-priced private drivers that are accessible with the click of a button. Lyft complemented Zimride, as these companies were accessible to ridesharers for both short and long distances. However, Zimride was sold to Enterprise on the 10th of July 2013, as Lyft was a more profitable venture for Zimmer and Green. <ref>Gallagher, Billy. [https://techcrunch.com/2013/09/09/zimmer-green-from-zimride-to-lyft/ "Founders John Zimmer & Logan Green Explain How Lyft Was Born Out Of Zimride."] 2013.Retrieved on 1 March 2017. </ref><br />
<br />
== Passenger Application Features ==<br />
<br />
===How to Start Using the Application=== <br />
[[File:IMG_8526.PNG|150px|thumb|right| Homepage of Lyft on mobile application interface.]]<br />
In order to be a customer of the service, users must create an account linked to their phone number and credit card, [https://en.wikipedia.org/wiki/Google_Wallet Google Wallet], or [[PayPal]] account. When using the phone app, Lyft uses GPS tracking to determine the location of the user and the availability of cars around them. In order to request a ride, a user must confirm the pickup location and select the type of car they would prefer. The user can then add their destination and view a price estimate, which includes additional charges that typically occur during times of day in which rides are in high demand or traffic is heavier than usual. The user then taps the “Requests Lyft” button and they are connected to the closest driver in the area. <br />
<br />
Once the driver within their vicinity has been connected to the user, the application provides the driver’s estimated arrival time based on the distance and current traffic conditions. As the Lyft approaches, the rider is provided with the driver’s name, rating, car make and model, and the license plate number. Users can track the location of their car in relation to the pickup location on the application’s map, and can also view the estimated time until the car arrives, can contact the driver, split the fee for the ride with friends, send the estimated time of arrival to others, and cancel the ride from this screen. Users will receive a text notification from their driver once their ride and also have the ability to call their driver. <ref>How to Request a Ride. [https://help.lyft.com/hc/en-us/articles/213584098-How-to-Request-a-Ride "All about Lyft."] Retrieved on 15 February 2017. </ref><br />
<br />
In March 2015, Lyft made it possible for users to add personal profiles including where they are from, and their favorite music to encourage more personal connections between the passengers and their drivers.<br />
<ref>Company Site. [https://www.lyft.com "Lyft Official Site."] Retrieved on 15 February 2017. </ref><br />
<br />
===Lyft Tiers===<br />
{| class="wikitable"<br />
|-<br />
! Tiers<br />
! Description<br />
<br />
|-<br />
| '''Lyft'''<br />
| Lyft is the application's most basic service as well as the lowest cost option. Vehicles in this class generally seat up to four passengers. <ref> Dough. [http://www.ridesharingdriver.com/whats-the-difference-between-lyft-lyftplus-and-line/ "What’s the difference between Lyft, Lyft Plus, Lyft Line, and Premier?"] 2016. Retrieved on 15 February 2017. </ref> It is the most popular option for Lyft users.<br />
|-<br />
| '''Lyft Plus'''<br />
| Includes vehicles seating up to six passengers. Lyft Plus is more expensive than the basic Lyft option. <ref> Dough. [http://www.ridesharingdriver.com/whats-the-difference-between-lyft-lyftplus-and-line/ "What’s the difference between Lyft, Lyft Plus, Lyft Line, and Premier?"] 2016. Retrieved on 15 February 2017. </ref><br />
|-<br />
| '''Lyft Premier'''<br />
| Consisting of luxury sedans that seat up to four passengers, Lyft Premier is only available in New York City, San Francisco, and Los Angeles. These vehicles have premium features such as leather interiors made by manufacturers like Audi, Mercedes, BMW, and Jaguar. <ref> Dough. [http://www.ridesharingdriver.com/whats-the-difference-between-lyft-lyftplus-and-line/ "What’s the difference between Lyft, Lyft Plus, Lyft Line, and Premier?"] 2016. Retrieved on 15 February 2017. </ref><br />
<br />
|-<br />
| '''Lyft Line'''<br />
| New service that is similar to a carpooling. It pairs users with other nearby passengers that have a similar end destination. Lyft Line is helpful to users who are commuting or traveling to popular destinations, such as airports or tourist destinations. This service is up to 60% less expensive than a regular Lyft as passengers share the fee. Lyft Line is more densely populated in larger cities. <ref> Dough. [http://www.ridesharingdriver.com/whats-the-difference-between-lyft-lyftplus-and-line/ "What’s the difference between Lyft, Lyft Plus, Lyft Line, and Premier?"] 2016. Retrieved on 15 February 2017. </ref><br />
<br />
|-<br />
|}<br />
<br />
==Pricing Equation==<br />
====Pricing====<br />
The calculation of ride payments is based on five different factors: cost per mile, cost per minute, base charge, service fee, and prime time. The distance is the cost per each mile and the time is the cost per minute during the trip. The base charge is the flat charge assessed at the beginning of the trip and the service fee is the Lyft platform charge for each ride. Primetime is an additional surcharge added during the busy times. <ref> [https://help.lyft.com/hc/en-us/articles/214218147-Calculating-the-Cost-of-a-Lyft-Ride "Calculating the Cost of a Lyft Ride."] Retrieved on 17 February 2017. </ref><br />
<br />
[[File:Lyft123.png|500px|thumb|right| The following table shows the cost of a Lyft in Los Angeles at a given time. <ref>Dough. [http://www.ridesharingdriver.com/how-much-does-lyft-cost-lyft-fare-estimator/. "Get a Lyft fare estimate"] 2016. Retrieved on 17 February 2017. </ref>]]<br />
<br />
====Lyft Prime Time====<br />
Primetime encourages drivers to be on the roads during the busy times of the day where demand is high. Primetime varies each second depending on how many people are requesting Lyft. If there is a Prime Time surge happening in the location, the user will receive a notification pop up with the added percentage requiring confirmation of their ride. For example, if a ride costs $10 (before other fees) and there is a 150% Prime Time, the ride will cost $25 (+ other fees). <ref>[https://help.lyft.com/hc/en-us/articles/213818898-Prime-Time-for-Passengers "Prime Time for Passengers"] Retrieved on 19 February 2017. </ref><br />
<br />
==Two-Way Ratings==<br />
At the end of the ride, the driver and the passenger have the chance to rate each other on a scale of one to five stars, with a rating of one being the lowest. If either the passenger or the driver rates under three stars, they will never be paired as a driver-passenger match again. If a driver is consistently getting low ratings, Lyft may deactivate the driver from the platform or investigate the cause of the lower ratings. Each driver receives a weekly summary of their ratings with comments left by passengers. <ref>Lyft. [https://help.lyft.com/hc/en-us/articles/213586008-Driver-and-Passenger-Ratings "Driver and Passenger Ratings."] Retrieved on 19 February 2017. </ref><br />
<br />
== Competitors ==<br />
Lyft is considered a ridesharing company, which is an arrangement where passengers travel in a private vehicle driven by its owner for a fee. Lyft's biggest rival is [[Uber|Uber]] who has dominated the ridesharing industry since 2009. Uber has a similar setup to Lyft as both companies require a ride-hailing application. Uber is worth $68 billion and dominates the industry in more than 60 countries. <ref>Johnson, Madeline. [http://www.nasdaq.com/article/who-are-ubers-biggest-competitors-cm671829 "Competitors."] 2016. Retrieved on 19 March 2017. </ref> In order to compete with Uber, Lyft merged with a Chinese ridesharing application called Didi Kuaidi. Didi Kuaidi controls approximately 80 percent of the ridesharing market in China. This partnership will allow Didi Kuaidi to function in the United States and Lyft to operate in China. Lyft users will be able to use the Lyft application in China to find Didi Kuaidi drivers rather than re-downloading a new service. <ref>Isaac, Mike. [https://www.nytimes.com/2015/09/17/technology/lyft-announces-deal-with-didi-kuadi-the-chinese-ride-hailing-company.html?_r=0 "Lyft Announces Deal With Didi Kuaidi, the Chinese Ride-Hailing Company"] 2015. Retrieved on 19 March 2017.</ref><br />
<br />
In the early months of 2017, Uber was the subject of a lot of negative press. During that time, they were accused of cheating both riders and drivers by using manipulative navigation data; there were also many claims of sexual harassment surfacing that were directed at senior management employees, and the company was also accused of using a secret tool to deceive authorities<ref>Reuters. Uber’s board still stands by their CEO amidst a significant amount of controversy. New York Post http://nypost.com/2017/03/22/ubers-board-is-still-backing-ceo-despite-a-slew-of-screw-ups/ Retrieved on 8 April 2017</ref>. In response to the immigration ban enacted by the presidential administration earlier in the year, yellow-cab drivers led an hour-long work stoppage in opposition. In response, Uber replied that they were still available for business and many people viewed this as the company attempting to capitalize on the situation and claimed that it was done in poor taste. The board is working diligently on repairing the company's tarnished reputation, company culture, and leadership. However, this influx of bad publicity for their competitor created an opportunity for Lyft to get a major boost in this market. They've seen large increases in ride requests and have secured $500 million in a new round of funding, as of April 2017<ref>Isaac, Mike. New York Times. Lyft Gets $500 Million in New Funding as Its Rival Uber Wobbles https://www.nytimes.com/2017/04/06/technology/lyft-gets-500-million-in-new-funding-as-its-rival-uber-wobbles.html 2017. Retrieved on 8 April 2017</ref>. On January 29th, Lyft surpassed Uber for downloads for the first time in the company's history.<br />
<br />
==In the News==<br />
Lyft is donating $1 million over the next four years to the American Civil Liberties Union (ACLU). This pledge is in response to the executive order that places limits on travel to the U.S. from certain countries signed by President Donald Trump to temporarily assess the risk of terrorists infiltrating the immigration system into the U.S. <ref>Liptak, Andrew. [http://www.theverge.com/2017/1/29/14429452/lyft-donating-1-million-american-civil-liberties-union "Lyft is donating $1 million to the American Civil Liberties Union"] 2017. Retrieved on 18 February 2017. </ref><br />
<br />
Recently, Lyft has also agreed to pay $27 million to settle a lawsuit against the company. Lyft considers their drivers as contractors rather than employees. Under the new deal that was just signed, Lyft drivers will continue to be considered independent contractors and pay for their own gas and expenses while not being covered under minimum-wage laws. 100,000 drivers could be eligible to receive part of the $27 million depending on how many hours they have driven for Lyft. <ref>Dave, Paresh. [http://www.latimes.com/business/technology/la-fi-tn-lyft-settlement-20161101-story.html. "Union-backed Lyft drivers object to $27-million settlement"] 2016. Retrieved on 19 March 2017.</ref> <br />
<br />
Lyft and Uber representatives in Oregon are promoting a bill that would allow the state of Oregon to regulate the companies instead of individual cities. This type of regulation would set uniform rules for the companies throughout the state. <ref>Liptak, Andrew. [https://www.usnews.com/news/best-states/oregon/articles/2017-04-04/uber-lyft-representatives-push-for-state-regulations"Uber, Lyft Representatives Push for State Regulations"] 2017. Retrieved on 5, April 2017. </ref> These regulations would allow Lyft to treat drivers as independent contractors. Meaning that the companies would not have to pay payroll taxes on these employees, or provide them with benefits or workers compensation insurance. <ref>Liptak, Andrew. [https://www.usnews.com/news/best-states/oregon/articles/2017-04-04/uber-lyft-representatives-push-for-state-regulations"Uber, Lyft Representatives Push for State Regulations"] 2017. Retrieved on 5, April 2017. </ref><br />
<br />
== Ethics ==<br />
Lyft claims they are dedicated to maintaining an inclusive and accommodating ride-sharing service. Their anti-discrimination policies prohibit discrimination against passengers on the basis of race, national origin, religion, gender, gender identity, physical or mental disability, mental condition, marital status, age, or sexual orientation. <ref>Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/214218517 "Anti-Discrimination Policies."] Lyft Help. N.p., n.d. Web. 04 Apr. 2017..</ref>.<br />
<br />
====Safety====<br />
Lyft sets out to ensure the safety of all passengers using their service. The Trust and Safety Team is a critical response line that is available 24/7 in the case of emergencies. Passengers are instructed to first dial 911 and contact local non-emergency authorities before using their call tool to reach the Critical Response Line. To maintain a level of standards amongst drivers and safety for its customers, all drivers must meet the following requirements during the screening process:<br />
* DMV or third-party background checks (criminal background checks include both national and county-level databases and records stretching back to 7 years in states like California, and even longer in others).<br />
* Minimum age requirement of 21, along with the possession of a license for at least a year.<br />
* Zero-tolerance policy for drugs and alcohol.<br />
* In-person interview with current Lyft driver.<br />
Drivers that meet all requirements are covered by the Lyft Insurance Protection Plan that utilizes Lyft's $1 million liability insurance. The liability serves as primary to the driver's personal automobile insurance policy as soon as they switch into driver mode up until each moment they drop off their passenger.<ref>Lyft Safety https://www.lyft.com/safety</ref>.<br />
<br />
Some incidents have arisen some concerns over passenger and driver safety. In 2014, a driver was punched in the face by a passenger after the driver asked the passenger to stop smoking. <ref name="Forbes">Hill, Kashmir.[https://www.forbes.com/sites/kashmirhill/2014/05/21/lyft-passenger-breaks-seattle-drivers-nose/#4ab76a521017 "Lyft's Moment of Truth As Passenger Breaks Seattle Driver's Nose"] '''Forbes''' (21 May 2014. Retrieved 22 April 2017). </ref> In a response from Lyft, they noted that the passenger's Lyft account was deactivated and that he was blocked from making any new Lyft accounts. <ref name="forbes"/><br />
<br />
====Passenger Discrimination====<br />
Recently, Lyft and other ride-sharing applications including Uber have been accused of failing to comply with the [https://en.wikipedia.org/wiki/Americans_with_Disabilities_Act_of_1990 Americans with Disabilities Act] (ADA). Allegedly, Lyft drivers have discriminated against people in wheelchairs or with service animals, either refusing to transport them or charging excessive prices to do so. Outlined on Lyft's website are policies that explicitly state that drivers are responsible for transporting all passengers in wheelchairs, so long as the wheelchair can safely and securely fit in the car. If a wheelchair cannot be accommodated for some reason, the driver must cancel the ride and contact the Critical Response Line for further help. <ref>Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/214218527-Wheelchair-Policy "Wheelchair Policy."] Lyft Help. N.p., n.d. Web. 04 Apr. 2017.</ref> Policies also state that drivers cannot deny service to passengers with service animals, even if that driver is allergic to the animal, afraid of such animals, or has cultural objection toward them. According to Lyft, discrimination can result in deactivation from the platform.<ref>Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/214589657 "Service Animal Policy."] Lyft Help. N.p., n.d. Web. 04 Apr. 2017.</ref><br />
<br />
Within the application, there is a feature called "Access Mode," which enables passengers with accessibility needs to complete ridesharing transactions through the app. Once a passenger enables, they can request permission to be able to request rides with locally accessible vehicles. "Access Mode" dispatches a wheelchair accessible vehicle instead of a standard Lyft vehicle when a passenger in need of accommodations requests a ride. However, "Access Mode" is not available in all markets, and these accessible vehicles are not always available 24/7 like standard Lyft cars. The registration process aforementioned may take several weeks to complete and accessible vehicles often have to be requested at least 24 hours in advance. Passengers with accessibility needs may not always be guaranteed fast and easy transportation when needed, defeating the purpose of the application. <ref> Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/213584508-Accessible-Vehicle-Dispatch"Accessible Vehicle Dispatch"] Lyft Help. N.p., n.d. Web. 05 Apr. 2017.</ref><br />
<br />
====Local Regulations====<br />
Lyft operates all over the United States; however, some local governments require extra steps from those who are looking to become a Lyft driver. Most Lyft driver applicants meet with a representative from Lyft to have their car inspected and to take a practice ride in order to ensure that their driving is safe enough to generally avoid accidents. A few cities require applicants to go to an inspection facility or meet with a mechanic in order to be approved as a Lyft driver. Approved applicants are not required to display a Lyft emblem in their windshield, however, they are strongly encouraged to do so. If a Lyft driver chooses not to display the Lyft emblem in their car and is caught, the only potential consequence could be receiving a citation. <ref> Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/214161017-All-City-and-State-Requirements-Overview "All City and State Requirements Overview."] Lyft Help. N.p., n.d. Web. 07 Apr. 2017. </ref><br />
<br />
====Airport Policies====<br />
Some airports have strict policies regarding where passengers are allowed to be picked up and dropped off, and some even prohibit Lyft drivers from transporting passengers to and from the airport altogether. Because airports are one of greatest sources of profit for taxi and limousine companies, airports will generally take extra steps to ensure that taxi and limo drivers will still have a market for rides. Because taxi and limousine drivers are required to have city licenses or permits in addition to paying fees for each airport pickup or drop off, cornering the ride market to and from airports allows them to profit more from those traveling to and from airports. Ride-sharing services such as Lyft and Uber can be cheaper and easier to request than taxis, especially for longer trips, which has led many airport travelers and Lyft drivers to attempt to find ways of getting around these restrictions. For example, some people take shuttle buses to rental car lots and call Lyft rides from there; in many of these cases, Lyft drivers will often remove the Lyft emblem from their cars in addition to asking passengers to sit in the front seat so that it appears less like a Lyft ride.<ref> Close, Kerry. [http://time.com/money/4396248/uber-lyft-ban-airport/ "This Is Why You Can't Take An Uber Home From The Airport | Money."] Time. Time, 7 July 2016. Web. 07 Apr. 2017. </ref><br />
<br />
Lyft has partnered with airports across to country to make the pick-up and drop-off processes easier for both Lyft passengers and drivers. On Lyft's website, there is a list of airports that allow passengers to be picked up and dropped off by Lyft drivers, with a set of detailed instructions for each airport for drivers to follow when doing so. <ref> Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/214460017-Airport-Information-for-Drivers "Airport Information for Drivers."] Lyft Help. N.p., n.d. Web. 05 Apr. 2017. </ref> Also on the website is a guide for passengers to use when determining which airports allow Lyft pickups and drop-offs, the coverage area for the corresponding cities, and pricing details for the ride itself.<ref>Lyft, Inc. [https://help.lyft.com/hc/en-us/articles/214460157-Airport-Information-for-Passengers "Airport Information for Passengers."] Lyft Help. N.p., n.d. Web. 05 Apr. 2017.</ref> Regardless, travelers are motivated to disobey airport policies to save money and Lyft drivers are motivated to disobey airport policies to make money.<br />
<br />
====Pricing====<br />
Lyft, similar to Uber, informs passengers of the total cost of their ride, including cost, fees, taxes, tolls, and Prime Time, before the ride is requested; however, if the passenger changes their destination in the middle of their ride or the ride takes more or less time than expected, the price of the ride is subjected to change. Since pricing is unfixed, passengers may end up paying more than originally expected. <ref> Golson, Jordan. "Lyft Now Shows Your Fare before You Ride, Just like Uber." THE VERGE. N.p., 29 Nov. 2016. Web. 18 Apr. 2017. <http://www.theverge.com/2016/11/29/13778994/lyft-rideshare-upfront-fares-price>. </ref><br />
<br />
Aforementioned, Lyft's Prime Time happens at times when demand is higher than normal. Passengers typically pay an additional percentage on top of the original ride's price when they request a ride during Prime Time. <ref> Lyft, Inc. "Prime Time for Passengers." Lyft Help. N.p., n.d. Web. 17 Apr. 2017. <https://help.lyft.com/hc/en-us/articles/213818898-Prime-Time-for-Passengers>. </ref> Passengers of Lyft often find Prime Time pricing unfair since they most likely are in need of Lyft's services during these peak hours. Taxi companies, unlike Lyft and Uber, do not have surge pricing during peak hours, in part because they too question the ethical implications of such pricing. <ref> Suranovic, Steven. "Surge Pricing and Price Gouging." Institute for International Economic Policy Working Paper Series (n.d.): n. pag. George Washington University, Dec. 2015. Web. 18 Apr. 2017. </ref> However, Prime Time pricing is readily announced before the ride begins so Lyft is not hiding the reason for the higher cost. Prime Time usually occurs late at night when people are using Lyft to get home safely after a night of drinking. Raising the cost means some people will be more inclined to drive drunk or walk home alone putting themselves and others in harm's way.<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Uber]]<br />
*[[Information Security]]<br />
}}<br />
<br />
== External Links ==<br />
{{resource|<br />
*[https://www.lyft.com Lyft Official Website]<br />
*[https://en.wikipedia.org/wiki/Lyft Wikipedia Page]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
[[Category:Services]]<br />
[[Category:GPS]]<br />
[[Category: Mobile Application]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=YouTube&diff=71811YouTube2018-04-17T14:32:36Z<p>Hillcm: </p>
<hr />
<div>{{socialNetworkSiteInfoBox\draw<br />
|logo=Youtube_logo.jpg<br />
|logoBackgroundColor={{Color|background|red}}<br />
|screenimage=Youtube_screen_shot.jpg<br />
|caption= [http://www.youtube.com Youtube]<br />
|community = Internet Users<br />
|membership = Open with email verification<br />
|branding = Profile, Videos, Friends, "Likes"<br />
|features = Sharing Photos, likes, comments<br />
|launch = February 14, 2005<br />
|users = Over a billion users<ref>https://www.youtube.com/yt/press/statistics.html</ref><br />
}}<br />
'''YouTube''' is the largest video-sharing website in the world. Founded in 2005, YouTube is now the third most visited site globally.<ref>Alexa Top Sites | http://www.alexa.com/topsites</ref>. Shortly after it was founded, Youtube was purchased by [[Google]] for 1.65 billion USD in November 2006.<ref>Youtube | http://en.wikipedia.org/wiki/Youtube</ref> After Google’s 2015 restructure and formation of Alphabet Inc., YouTube stayed as a subsidiary of Google instead of transitioning to Alphabet, as other prominent Google companies did.<ref>Goldman, D. (2015). “Google will become Alphabet today”. CNN Money. http://money.cnn.com/2015/10/02/technology/google-alphabet/</ref> As of January 2012, YouTube users uploaded one hour of video content to the site every second. <ref><br />
[https://www.washingtonpost.com/national/health-science/google-says-one-hour-of-video-is-now-being-uploaded-to-youtube-every-second/2012/01/27/gIQAtubBdQ_story.html "Google says one hour of video is now being uploaded to YouTube every second"] (30 January 2012. Retrieved on 23 April 2017.)</ref> The content found on Youtube consists primarily of user-generated video, music videos, and TV clips. Due to the anonymity of users' screen names, there are ethical issues surrounding the site regarding comments, benefit, and harm, as well as privacy. In addition, issues arise when determining perpetrators for the upload of copyrighted material, as the volume of content is significantly high; thereby affecting Youtube's ability to monitor all content. <br />
<br />
==History==<br />
[[File:YouTube_founders.png|thumb|left|200px|Cofounders of YouTube: Chad Hurley, Steve Chen, and Jawed Karim.]]<br />
YouTube was founded by [https://en.wikipedia.org/wiki/Chad_Hurley Chad Hurley], [https://en.wikipedia.org/wiki/Steve_Chen Steve Chen], and [https://en.wikipedia.org/wiki/Jawed_Karim Jawed Karim] in 2005 to facilitate video sharing. All three were previously employed by [https://www.paypal.com/us/home PayPal], an online company that acts as a digital wallet for users. YouTube started as an angel-funded enterprise from a makeshift office before receiving a $3.5 million investment from Sequoia Capital in November 2005.<ref>{{cite web|first = Scott |last = Woolley |url = http://members.forbes.com/global/2006/0313/027.html |title = Raw and Random |work = Forbes.com |publisher = Forbes |date = 2006-03-13 |accessdate = 2006-07-28}}</ref> Although when the site began, it had little interface, after a receiving this funding, a beta version site was released, quickly followed by a real version. During the summer of 2006, YouTube gained popularity and became one of the fastest growing sites on the Web, with users uploading more than 65,000 new videos per day.<ref>[http://www.interestingtopics.net/early-versions-of-google-youtube-id-636 Youtube History]</ref><ref>{{Cite web|title=YouTube serves up 100 million videos a day online |url=http://www.usatoday.com/tech/news/2006-07-16-youtube-views_x.htm |work=USA Today|date=July 16, 2006 |accessdate=November 29, 2008}}</ref> The site continued to grow rapidly, and was bought by [[Google]] in October, 2006 for $1.65 billion<ref>[http://www.crunchbase.com/company/youtube/ YouTube CrunchBase]</ref>. YouTube has gone on to make deals with movie producers as well as television stations in order to display their content on YouTube. [[Wikipedia:Google+|Google+]] has also adopted YouTube as its video viewing mechanism.<br />
<br />
As another example, the [https://en.wikipedia.org/wiki/National_Basketball_Association NBA], which agreed to partner with YouTube in 2005 and created its own channel in 2007, very recently passed one billion total views. The league, along with many other business organizations worldwide, has made an active effort to make lots of content available to the general public, via YouTube. <ref>ESPN article on the NBA's YouTube channel views [http://espn.go.com/blog/playbook/tech/post/_/id/3260/nba-surpasses-1-billion-views-on-youtube http://espn.go.com/blog/playbook/tech/post/_/id/3260/nba-surpasses-1-billion-views-on-youtube]</ref> Youtube and the NBA has also recently made an agreement to make available all of the NBA's Developmental League games footage on Youtube for free. <br />
<br />
===iPhone Application===<br />
[[File:youtubeicons.jpg|left|thumb|Old and New (respectively) Youtube Mobile Icons ]]<br />
In 2012, [[Wiki:Apple_Inc.|Apple]] released [[iOS]] 6, the first version of iOS that did not include the YouTube application. At the time, 25% of all YouTube views were on mobile devices. Apple had announced before the release of iOS 6 that YouTube would no longer be pre-installed, and within a month YouTube had created an app of their own. The new application for iOS allows registered users to view channels that they already subscribe to on the main site. It also enables search and share functionality right from the mobile device.<ref>http://articles.latimes.com/2012/sep/11/news/la-youtube-launches-new-mobile-app-for-apples-iphone-20120911</ref> This caused issues between Apple and Google, as Google was given limited control of the native YouTube application, most notably the control of advertisements - Apple refused to allow YouTube to display ads before videos.<ref> Kelly, Heather. [http://www.cnn.com/2012/09/11/tech/mobile/youtube-iphone-app/index.html "YouTube releases new iPhone app"] 11 September 2012. Retrieved on 23 April 2017.</ref> The new advertising potential allows users to view thousands of music videos with advertisements and thus increase their profits significantly. <ref> Chmielewski, Dawn. [http://articles.latimes.com/2012/sep/11/news/la-youtube-launches-new-mobile-app-for-apples-iphone-20120911 "YouTube launches new mobile app for Apple's iPhone"] (11 September 2012. Retrieved on 23 April 2017.)</ref><br />
<br />
===Youtube Red===<br />
In November 2014, Youtube released [https://en.wikipedia.org/wiki/YouTube_Red Youtube Red], which allowed users to access more premium content in addition to some extra features. One of the most advertised features was that mobile users could now play videos in the background, even though the application is not open<ref>https://en.wikipedia.org/wiki/YouTube_Red</ref>. Although Youtube Red was originally created just for music streaming, it now also includes exclusive television shows and movies such as [https://en.wikipedia.org/wiki/Scare_PewDiePie Scare PewDiePie] and [https://en.wikipedia.org/wiki/Lazer_Team Lazer Team]. In addition, Youtube Red members also have ad-free access to all Youtube videos. There is a monthly fee for people that want to join Youtube Red, members have to pay a monthly fee of $10. As of March 2016, this service is only available to people within the United States.<br />
<br />
===YouTube Community===<br />
In 2016, YouTube launched its own social-network site within the platform called "YouTube Community" to provide video creators and viewers more ways to connect. Creators can share posts, photos, GIFS, and similar content which viewers can "like" as well as comment on. YouTubers that have already adopted the new feature include John & Hank Green, AsapSCIENCE, The Game Theorists, Karmin, The Key of Awesome, The Kloons, and Lilly Singh.<br />
<br />
==Fame from YouTube==<br />
Many young internet stars had their origins in YouTube with a channel that gained millions of views and subscribers. The nature of their videos are comedy, music, pop culture parodies, or beauty tips. Video contests such as Next Up, created by YouTube, gives young artists a platform to showcase their talent and boost the chances of videos going viral. <ref>New York Times. "On YouTube, Amateur Is the New Pro" "http://www.nytimes.com/2012/07/01/magazine/on-youtube-amateur-is-the-new-pro.html?pagewanted=all&_r=0"</ref><br />
Examples of famous YouTube celebrities are Natalia Tran, Ryan Higa, Ray William Johnson, Mystery Guitar Man, Smosh, Michelle Phan, the ShayTards, Karmin, Jenna Marbles, Freddie Wong, What the Buck, and Philip DeFranco. Many of these stars earn on average $100,000 a year from the videos. Revenue comes from the banners and ads near the video content,sponsored content, and product placement. <ref>Business Insider. "Rich Youtube Stars" "http://www.businessinsider.com/meet-the-richest-independent-youtube-stars-2010-8?op=1"</ref> This brings up the ethical issue of authenticity because it can be hard to determine if the YouTube star genuinely likes a product or if they are only endorsing it because they are being paid to do so. In November 2014, the Advertising Standard's Authority ruled that YouTube "vloggers" (video bloggers) had to make it clear to viewers when they were getting paid to advertise a product or brand, by indicating that it is an advertisement somewhere in the video or video description <ref> Morris, Ian. [http://uk.pcmag.com/youtube/70460/news/youtube-stars-in-the-uk-warned-about-advertising-products-in "YouTube Stars In The UK Warned About Advertising Products In Videos"] (19 August 2015. Retrieved on 23 April 2017.)</ref>. By flagging this content as promotional, this will help make it clear to viewers what products the YouTube star naturally promotes versus what products they get paid to promote. <br />
<br />
==Funding==<br />
Similar to [[Facebook]], YouTube is a free website that earns revenue through advertising. Advertisers spend thousands of dollars to have their advertisements featured on top videos. YouTube enforces strict community and technical guidelines for all of its advertisements; the site aims to be fair and consistent with its policies in order to benefit its users, advertisers, and partners. YouTube reserves the right to reject any advertisement from the site that is deemed inappropriate or intrusive, and refunds are not issued for promotions in which the related advertisements disabled, or suspended due to policy violations.<ref name = "policies">[http://www.youtube.com/t/advertising_policies/ YouTube Advertising Policies]</ref><br />
<br />
==Copyright Concerns==<br />
YouTube faces many copyright issues because it does not monitor the content of videos. Section 6-D of YouTube's [http://www.youtube.com/t/terms terms of service] states, "You further agree that Content you submit to the Service will not contain third party copyrighted material, or material that is subject to other third party proprietary rights, unless you have permission from the rightful owner of the material or you are otherwise legally entitled to post the material and to grant YouTube all of the license rights granted herein." However, this does not always deter users from uploading copyrighted material. Despite the fact that millions of videos on YouTube are violating copyright, YouTube does not remove the videos and makes little to no effort to enforce its copyright policies unless a user or company specifically brings an issue to their attention. <br />
<br />
For the past five years, there has been an ongoing lawsuit between YouTube and [[Wiki:Viacom|Viacom]]. Viacom claimed that YouTube failed to remove copyrighted material, such as "The Daily Show With Jon Stewart" from the site. On April 4, 2012, it was decided that this was a violation of copyright, but the two companies arranged a deal in which YouTube can allow users to rent Viacom's Paramount Pictures movies<ref>http://topics.nytimes.com/top/news/business/companies/youtube/index.html</ref>. <br />
<br />
===Third-Party Claims===<br />
Youtube has incorporated [http://www.youtube.com/t/contentid a set of content-identifying tools] which third-party companies who have a commercial partnership with Youtube can use to search for videos matching their content. This is usually how copyrighted videos are found and removed.<br />
<br />
==Ethical Issues==<br />
===Controversial Content===<br />
There is a lot of controversial content that can be found on YouTube. The guidelines taken from the site state:<ref>http://www.youtube.com/t/community_guidelines</ref><br />
*YouTube is not for pornography or sexually explicit content. If this describes your video, even if it's a video of yourself, don't post it on YouTube. Also, be advised that we work closely with law enforcement and we report child exploitation. Please read our Safety Center and stay safe on YouTube.<br />
*Don't post videos showing bad stuff like animal abuse, drug abuse, under-age drinking and smoking, or bomb making.<br />
*Graphic or gratuitous violence is not allowed. If your video shows someone being physically hurt, attacked, or humiliated, don't post it.<br />
*YouTube is not a shock site. Don't post gross-out videos of accidents, dead bodies or similar things intended to shock or disgust.<br />
*Respect copyright. Only upload videos that you made or that you are authorized to use. This means don't upload videos you didn't make, or use content in your videos that someone else owns the copyright to, such as music tracks, snippets of copyrighted programs, or videos made by other users, without necessary authorizations. Read our Copyright Tips for more information.<br />
*We encourage free speech and defend everyone's right to express unpopular points of view. But we don't permit hate speech (speech which attacks or demeans a group based on race or ethnic origin, religion, disability, gender, age, veteran status, and sexual orientation/gender identity).<br />
*Things like predatory behavior, stalking, threats, harassment, intimidation, invading privacy, revealing other people’s personal information, and inciting others to commit violent acts or to violate the Terms of Use are taken very seriously. Anyone caught doing these things may be permanently banned from YouTube.<br />
*Everyone hates spam. Don’t create misleading descriptions, tags, titles or thumbnails in order to increase views. It's not okay to post large amounts of untargeted, unwanted or repetitive content, including comments and private messages.<br />
<br />
If a user finds a video to violate any of these rules, they can flag the video to be taken down. YouTube claims that it has a team completely devoted to enforcing these guidelines. However, because of the sheer volume of content that is constantly being uploaded, this is a very difficult task for any number of people.<br />
<br />
===Restricted Mode===<br />
YouTube introduced a new Restricted Mode in March 2017, which uses "signals—such as video title, description, metadata, Community Guidelines reviews, and age-restrictions—to identify and filter out potentially mature content"<ref name = "YouTube Guidelines">YouTube Help. "Enable or Disable Restricted Mode" https://support.google.com/youtube/answer/174084?hl=en </ref> The purpose of the feature is allow users to avoid mature or inappropriate content that they don't wish to view, and can be turned off in YouTube's settings. However, the site faced backlash from the LGBTQ+ community after it became apparent that Restricted Mode blocked all videos with the words "gay", "lesbian", "bisexual", or "transgender" in the title, even if the videos were created for educational purposes and contained no mature content. <ref name = Gizmodo> Gizmodo. "YouTube's Restricted Mode is Hiding Some LGBT Content". http://gizmodo.com/youtubes-restricted-mode-is-hiding-some-lgbt-content-1793382337 </ref> In a statement released shortly after the implementation of Restricted Mode, YouTube announced that the filters would not block all LGBTQ+ content, but would target "only those that discussed delicate topics such as politics, health and sexuality". <ref name = "NYT"> The New York Times. "YouTube Filtering Draws Ire of Gay and Transgender Creators" https://www.nytimes.com/2017/03/20/technology/youtube-lgbt-videos.html?_r=0 </ref> A Twitter user named Rezulux challenged this statement by uploading two identical videos, titled "this is a video" and "this is a gay video", and demonstrated that the latter video was blocked in filtered mode, while the first video was not. <ref name = "LA"> The Los Angeles Loyolan. "YouTube losing advertisers after LGTBQ+ and racism incidents' http://www.laloyolan.com/news/youtube-losing-advertisers-after-lgtbq-and-racism-incidents/article_4f3b0f9b-9ac5-5d13-a0f4-a95c1d77b9f8.html </ref><br />
<br />
Many LGBTQ+ YouTube personalities have spoken out about the controversy, saying that they worry about the effect that the censorship might have on LGBTQ+ youth who use YouTube as a source of community. According to YouTube star NeonFiona, "Kids who want to know about different orientations and definitions and about the history of LGBT people, etc, they can’t access that when their videos are being restricted. Restricting these videos makes it harder for these kids to find the information they need and the community that they’ve been missing.” <ref name = PinkNews> Pink News. "YouTube’s ‘restricted mode’ is hiding LGBT content from viewers" http://www.pinknews.co.uk/2017/03/17/youtubes-restricted-mode-is-hiding-lgbt-content-from-viewers/ </ref> Another YouTube personality, Rowan Ellis, believes that the system implies that LGBTQ+ content is automatically not family friendly, which will have a negative impact regardless of whether it was intentional on YouTube's part. <ref name = Inquisitr"> Inquisitr. "YouTube Restricted Mode is Hiding LGBT Content" http://www.inquisitr.com/4069765/youtube-restricted-mode-is-hiding-lgbt-content/</ref><br />
<br />
One day after their initial statement, YouTube released an official apology, stating that they had lifted the restrictions on several incorrectly labeled videos, and promised to change their algorithms to correct this behavior. <ref name = Yahoo> Yahoo News. "YouTube issues proper apology over restricted mode censoring creators" https://www.yahoo.com/news/youtube-issues-proper-apology-over-072607174.html</ref><br />
<br />
===Anonymity===<br />
It is difficult to control behavior on YouTube, as identification of users is voluntary. This anonymity means users are often more comfortable using things like YouTube to MP3 Converters, which can be used to download songs from YouTube videos to a user's computer. There are also similar programs which allow users to download videos from the site. <ref>http://www.youtube-mp3.org/</ref> Additionally, because it is easy to set up a YouTube account, users that have been banned from the site for violating the terms of service often make new accounts to continue using the site. <br />
<br />
====Comments====<br />
The YouTube comments section has no [[censorship]], which means that there the potential for derogatory or offensive content to be posted. As mentioned above, because YouTube is a mostly anonymous environment, it is difficult for YouTube moderators to track and censor the users who post harmful or offensive material. YouTube does allow users to mark comments as spam, or give them negative votes. If an individual comment is marked as spam, or negatively voted too many times, it does not show up by default and has to be clicked on before viewing. YouTube allows the user to enable or disable video comments if the user feels that they are being treated unfairly, or if they simply do not want others to offer their thoughts on whatever content was uploaded.<ref>http://support.google.com/youtube/bin/answer.py?hl=en&answer=58123</ref> There is, however, a strong community moderation of YouTube comments, where users can flag comments as spam or down vote certain comments. Comments with enough down votes will receive the label "This comment has received too many negative votes" and users will have to click "show the comment" to be able to view it.<br />
[[File:youtube2012.png|thumb|right|350px|New Youtube Homepage Layout (November 2012)]]<br />
<br />
====Benefit====<br />
Anonymity can allow YouTube users to contribute to the site more freely without worrying about the release of their personal information, which can allow for more open discussions.<br />
<br />
====Harm====<br />
Anonymity allows users to post content that might be offensive or inappropriate to other users. YouTube administrators can effectively ban an account, but not necessarily a user since there are no mechanisms in place to prevent a person from creating another YouTube account, as this would be nearly impossible to do. In rare cases, if a user's content is strongly incriminating, steps can be taken to identify the user in the real world and seek legal action. One example of this can be seen in the case of Dusty the Cat, which was a Facebook user posting videos of himself abusing an animal anonymously.<br />
<br />
==ContentID: Piracy and its Prevention==<br />
[[File:tomcruise.jpg|thumb|right|250px|An example of a video that has been taken down using ContentID.]]<br />
Issues of copyright infringement are prevalent in Youtube videos. Copyrighted material is often uploaded without the owner's permission. The fact that anyone can upload anything to YouTube is an issue. This can include adult content, gruesome videos, and other outlandish videos. It is possible to keep the videos uploaded so even if they are removed later on, copyright violations have already been done. People can also post knowledge materials such as science from a textbook for free, and use YouTube for free advertising without having to pay for it. This can be construed as copyright infringement. To combat this, YouTube has taken steps to ensure that copyrighted content is removed, including supplying copyright infringement notifications for third-party users.<ref>http://www.youtube.com/t/copyright_center</ref> <br />
<br />
ContentID was created in order to reference previously flagged copyright infringing videos. Once a video is uploaded to the site, it is compared to copyrighted materials to see if the content is an infringement. If an uploaded video is matched correctly to a copyrighted video, the owners can choose to "monetize, track, or block" the content.<ref>http://www.youtube.com/t/contentid</ref> There is no cost of using this system. In order to use it, a form from YouTube's website is filled out. <ref>http://www.youtube.com/content_id_signup</ref><br />
<br />
However, the ContentID system can also cause harm to users who post non-infringing content. For example, bird chirps and motorcycle engines have been known to be identified by the system as copyrighted content on occasion.<ref>http://thenextweb.com/google/2012/02/27/a-copyright-claim-on-chirping-birds-highlights-the-flaws-of-youtubes-automated-system/</ref> NASA's public domain broadcasts have also been frequently removed following take-down requests from news services that rebroadcast their material.<ref>http://www.techdirt.com/articles/20120806/11053019945/curiositys-mars-landing-video-disappears-youtube-due-to-bogus-copyright-claim.shtml</ref><br />
<br />
==Blocking of YouTube==<br />
Several countries have [[Wikipedia:Censorship_of_YouTube#By_country| blocked YouTube]] at one point because of its controversial content. They include:<br />
*Afghanistan<br />
*Armenia<br />
*Bangladesh<br />
*Brazil<br />
*China<br />
*Indonesia<br />
*Iran<br />
*Libya<br />
*Morocco<br />
*Pakistan<br />
*Russia<br />
*Syria<br />
*Sudan<br />
*Thailand<br />
*Tunisia<br />
*Turkey<br />
*Turkmenistan<br />
*United Arab Emirates<br />
*United Kingdom<br />
*United States<br />
<br />
==See Also==<br />
{{resource|<br />
*[[4chan]]<br />
*[[iTunes Store]]<br />
*[[Hulu]]<br />
*[[Wikipedia:Soapbox|Soapbox]]<br />
*[[Wikipedia:Google_Videos|Google Video]]<br />
}}<br />
<br />
== External Links ==<br />
{{resource|<br />
*[http://www.youtube.com/ YouTube's Website]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
<br />
[[Category:Websites]]<br />
[[Category: Services]]<br />
[[Category: Media Content]]<br />
[[Category:Corporations]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Autonomous_Vehicles&diff=71678Autonomous Vehicles2018-04-16T20:38:05Z<p>Hillcm: </p>
<hr />
<div><br />
Autonomous cars (also known as self-driving cars, robot cars, and automated cars) are vehicles that have the ability to sense their surroundings and subsequently use data to make decisions about their movement. Autonomous cars have evolved from park assist technologies to fully monitoring surroundings, changing lanes, and making emergency stops. Self-driving cars have been featured at Expos, Worlds Fairs, and have made recent appearances at the [https://en.wikipedia.org/wiki/North_American_International_Auto_Show North American International Auto Show]<ref>Snavely, Brent., & Eric D. Lawrence. [http://www.freep.com/story/money/cars/detroit-auto-show/2017/01/08/waymo-reveals-worlds-first-self-driving-minivan/96110098/ Waymo reveals world's first self-driving minivan]. ''Detroit Free Press'', 8 Jan. 2017. Web. 23 Apr. 2017</ref> and the Consumer Electronics Show. <br />
These cars are safer than traditional driving because they can sense obstacles and react to them quicker than humans can.<ref>Fox, Michelle. [http://www.cnbc.com/2014/09/08/self-driving-cars-safer-than-those-driven-by-humans-bob-lutz.html Safety of driverless cars], Autos, ''CNBC'', 8 Sep. 2014. Web. 23 Apr. 2017.</ref> However, there are ethical considerations pertaining to the increased safety measures that these cars may provide. Because autonomous vehicles are designed by humans, there is debate over who should determine the vehicles' tendencies. Moreover, there is the question of who should be held responsible for the vehicle's decisions when accidents occur, which is demonstrated by the MIT Moral Machine and the Trolley Problem. <br />
<br />
[[File:Original car.png|thumbnail|The "Linrrican Wonder", a 1925 remote controlled car owned by a radio equipment firm Houdina Radio Control.]]<br />
<br />
==History==<br />
===Beginnings===<br />
Autonomous cars have origins in the 1920s when the Houdina Radio Control Company installed radio control equipment in a 1926 [https://en.wikipedia.org/wiki/Chandler_Motor_Car Chandler].<ref>Nguyen, Tuan. [https://www.thoughtco.com/history-of-self-driving-cars-4117191 History of Self-Driving Cars], ''ThoughtCo.'', 30 Nov. 2016. Web. 23 Apr. 2017.</ref> From 1950 to 1980 numerous companies and universities attempted to control cars by laying guide wires in the roadway.<ref>Quigg, Doc. [https://news.google.com/newspapers?id=vUpeAAAAIBAJ&sjid=3WANAAAAIBAJ&pg=6885,3667738&hl=en Reporter Rides Driverless], ''The Press Courier. 7 Jun. 1960. Web. 23 Apr. 2017. </ref> These electronically controlled cars made appearances at numerous world showcases. During the 1990s, we began to see the transition towards autonomous vehicles of today.<br />
<br />
===Today===<br />
Modern self-driving cars do much more than follow wires placed in the roadway. New designs attempt to enable cars to make decisions about routes, safety, and changing lanes. Collectively, these enhancements are referred to as "driver assists" which designates them as distinct from driver replacements and true autonomy. This technology is far more sophisticated than that of previous models, which were controlled by humans on the other end of a remote control. <br />
<br />
Autonomous driving systems were deployed by large corporations like [[Uber]] and [[Tesla, Inc.]] as early as the summer of 2016 <ref name="uberPittsburgh">Chafkin, Max. [https://www.bloomberg.com/news/features/2016-08-18/uber-s-first-self-driving-fleet-arrives-in-pittsburgh-this-month-is06r7on Uber's First Self-Driving Fleet Arrives in Pittsburgh This Month.], Bloomberg.com. ''Bloomberg'', 18 Aug. 2016. Web. 23 Apr. 2017.</ref> and are currently beginning to be adopted. Such systems already require little to no human input while driving on public roadways under certain conditions. These modern vehicles use a combination of radar, GPS, odometers, computer programs, and machine learning to safely navigate roadways.<br />
<br />
[[File:AutonomousDrivingLevels.png|right|300px|thumb|The degree of sophistication of autonomous driving systems is rated on a conventional scale, which increases from Level 0 to Level 5. Level 0 requires human drivers' full attention. Level 5 requires no human input. <ref name="saeAutomatedDriving"/>]]<br />
<br />
==Future==<br />
<br />
===Levels of Autonomy===<br />
Any autonomous driving system is classified by common convention into one of six levels ranging from Level 0 to Level 5, depending on the degree of sophistication of the system. The measure of that sophistication, and thus the metric which determined the appropriate level, is the amount of input and attention required of a human operator in order to safely direct the vehicle.<ref name="saeAutomatedDriving">[https://www.sae.org/misc/pdfs/automated_driving.pdf SAE Report on Automated Driving. Rep. no. J3016.], ''SAE International'', n.d. Web. 23 Apr. 2017.</ref><br />
<br />
;Level 0:<br />
:* ''No Automation'': The human driver is in charge of all aspects of driving but the vehicle may have a warning or minor intervention systems.<ref name="saeAutomatedDriving"/><br />
;Level 1:<br />
:* ''Driver Assistance'': The driver assistance system is in charge of either steering or accelerating and decelerating using driving environment information but the human driver is in charge of all remaining driving tasks.<ref name="saeAutomatedDriving"/><br />
;Level 2:<br />
:* ''Partial Automation'': One or more assistance systems for both steering and accelerating and decelerating using driving environment information but the human driver is in charge of all remaining driving tasks.<ref name="saeAutomatedDriving"/><br />
;Level 3:<br />
:* ''Conditional Automation'': The automated driving system performs all aspects of driving but with a human driver responding to requests to intervene to override the system.<ref name="saeAutomatedDriving"/><br />
;Level 4:<br />
:* ''High Automation'': The automated driving system performs all aspects of driving even in the case where a human driver does not properly respond to a request to intervene and override the system.<ref name="saeAutomatedDriving"/><br />
;Level 5:<br />
:* ''Full Automation'': Complete performance of the automated driving system of all aspects of driving under all road and environment conditions that could be handled by a human driver.<ref name="saeAutomatedDriving"/><br />
<br />
===Benefits of Autonomous Vehicles===<br />
Advocates of autonomous vehicles believe that they substantially improve public safety and the economy. Current estimates predict that the adoption of autonomous vehicles could reduce deaths on the road by 90%. This would result in approximately 300,000 lives saved each decade and $190 billion saved in healthcare costs associated with car accidents.<ref>Crew, Bec. “Driverless Cars Could Reduce Traffic Fatalities by Up to 90%, Says Report.” ScienceAlert, 1 Oct. 2015, [https://www.sciencealert.com/driverless-cars-could-reduce-traffic-fatalities-by-up-to-90-says-report https://www.sciencealert.com/driverless-cars-could-reduce-traffic-fatalities-by-up-to-90-says-report].</ref> Furthermore, individuals when riding in an autonomous vehicle will be able to accomplish tasks other than driving. While commuting to work, people would be able to utilize their time to accomplish more work. Additionally, they could use their commute for leisure. They could watch the news or watch a movie while in their car. <br />
<br />
Additional potential benefits of autonomous vehicles include:<ref>Bertoncello, Michele, and Dominik Wee. “Ten Ways Autonomous Driving Could Redefine the Automotive World.” McKinsey & Company, June 2015, [https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/ten-ways-autonomous-driving-could-redefine-the-automotive-world https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/ten-ways-autonomous-driving-could-redefine-the-automotive-world].</ref><br />
*Less time spent driving<br />
*Parking becoming easier<br />
*New models of transportation<br />
*Improved transportation efficiency<br />
<br />
==Public Opinion==<br />
In a 2011 survey by Accenture, 49% of US and UK consumers stated that they would be comfortable using a "driverless car".<ref>[newsroom.accenture.com/article_display.cfm?article_id=5146 Consumers in US and UK Frustrated with Intelligent Devices That Frequently Crash or Freeze, New Accenture Survey Finds], ''Accenture'', 10 Feb. 2011. Web. 23 Apr. 2017.</ref><br />
<br />
In a 2012 survey by JD Power and Associates, 37% of respondents said they would be interested in purchasing a fully autonomous car. However, that number dropped to 20% when told that the technology would cost more than $3,000.<ref>Yvkoff, Liane. [http://www.cnet.com/roadshow/news/many-car-buyers-show-interest-in-autonomous-car-tech/ Many car buyers show interest in autonomous car tech], Roadshow. ''CBS Interactive Inc.'', 27 Apr. 2012. Web. 23 Apr. 2017.</ref><br />
<br />
In a 2014 survey by Insurance.com, over 75% of licensed drivers said they would at least consider buying a self-driving car. This number rose to 86% if their car insurance would be cheaper for an autonomous vehicle. 31.7% said they would not continue to drive anymore if autonomous cars become available.<ref>[http://www.insurance.com/about-us/news-and-events/2014/07/autonomous-cars-bring-em-on-drivers-say-in-insurance.com-survey.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+insurance_info+(Insurance.com+RSS+Article+Feed) Autonomous cars: Bring ‘em on, drivers say in Insurance.com survey], Insurance.com, ''Quinstreet, Inc.'', 28 Jul. 2014. Web. 23 Apr. 2017.</ref><br />
<br />
In a 2015 survey by Delft University of Technology, respondents, on average, found manual driving the most enjoyable mode of driving. 22% of the survey respondents did not want to spend any money for a fully automated driving system, whereas 5% indicated they would be willing to pay more than $30,000. 33% of respondents indicated that fully automated driving would be highly enjoyable. 69% of respondents estimated that fully automated driving will reach a 50% market share between now and the year 2050.<ref>Kyriakidis, M., R. Happee, and J.C.F. De Winter.<br />
[http://www.sciencedirect.com/science/article/pii/S1369847815000777 Public Opinion on Automated Driving: Results of an International Questionnaire among 5000 Respondents.], ScienceDirect, 15 June 2015. Web. 23 Apr. 2017.</ref><br />
<br />
==Legislation==<br />
With rapid developments still happening in the field of autonomous cars, it is hard for regulatory agencies to make laws about their design and usage. Today, 33 states have enacted legislation pertaining to autonomous vehicles.<ref>Listing of Autonomous Vehicle legislation from National Conference of State Legislature http://www.ncsl.org/research/transportation/autonomous-vehicles-legislation.aspx</ref><br />
Most laws in regards to autonomous vehicles are similar to the legislation that has been passed in the state of Michigan. <br />
<br><br />
;Michigan Senate Bill 0169, which was passed in 2013:<br />
:*Defines automation as:<br><br />
::- ''“Automated technology” means technology installed on a motor vehicle that has the capability to assist, make decisions for, or replace an operator.'' <br><br />
:*Defines what an operator of an autonomous vehicle is:<br><br />
::- ''Sec. 35a. “Operate” or “operating” means 1 or more of the following:<br><br />
:::* Being in actual physical control of a vehicle. This subdivision applies regardless of whether or not the person is licensed under this act as an operator or chauffeur.<br><br />
:::* Causing an automated motor vehicle to move under its own power in automatic mode upon a highway or street regardless of whether the person is physically present in that automated motor vehicle at that time. This subdivision applies regardless of whether the person is licensed under this act as an operator or chauffeur. As used in this subdivision, “causing an automated motor vehicle to move under its own power in automatic mode” includes engaging the automated technology of that automated motor vehicle for that purpose.<br>''<br />
:*Explains the registration and insurance protocol for such a vehicle:<ref>Michigan Senate Bill 169 http://www.legislature.mi.gov/documents/2013-2014/publicact/pdf/2013-PA-0231.pdf</ref><br><br />
::- It states that a manufacturer is free of liability if a third party makes any altercations to a vehicle.<ref>Michigan Senate Bill 663 http://www.legislature.mi.gov/documents/2013-2014/publicact/pdf/2013-PA-0251.pdf</ref><br><br />
::- Other laws like Tennessee Senate Bill 307 make it illegal for local municipalities to ban the use of autonomous vehicles.<ref>Tennessee Senate Bill 598 http://www.tn.gov/sos/acts/109/pub/pc0307.pdf</ref><br />
<br />
; H.R.3388 - SELF DRIVE Act<br />
<br />
The Federal Government has also begun developing legislation in regards to autonomous vehicles. The House passed the SELF DRIVE Act on September 7th, 2017. This act calls upon the the Department of Transportation (DOT) to research into how to cost effectively inform car buyers about autonomous (and partly autonomous) vehicles and their limits. <ref> H.R.3388 — 115th Congress (2017-2018) https://www.congress.gov/bill/115th-congress/house-bill/3388 </ref><br />
<br />
==Current Models==<br />
Many of the worlds leading automakers along with technologies companies are developing autonomous vehicles or autonomous technology for vehicles. Most estimate that, at the very least, they will be producing a partially autonomous vehicle by 2020. Some companies developing autonomous vehicles include:<br />
*Audi<br />
*BMW<br />
*Ford<br />
*General Motors<br />
*Google<br />
*Mercedes Benz<br />
*Nissan<br />
*Tesla<br />
*Toyota<br />
*Uber<br />
*Volkswagen<br />
*Volvo.<br />
<br />
===Ford===<br />
[[File:Ford winter.jpg|thumbnail|Ford Fusion testing in the snow]]<br />
[https://en.wikipedia.org/wiki/Ford_Motor_Company Ford] calls themselves one of the pioneers in autonomous vehicle technology and has recently began testing their vehicles at the [https://en.wikipedia.org/wiki/Mcity University of Michigan’s Mcity] and conducting real world snow tests <ref>Ford.com news story featuring MCity https://media.ford.com/content/fordmedia/fna/us/en/news/2015/11/13/ford-first-automaker-to-test-autonomous-vehicle-at-mcity.html</ref><ref>Ford.com news article highlighting snow testinghttps://media.ford.com/content/fordmedia/fna/us/en/news/2016/01/11/ford-conducts-industry-first-snow-tests-of-autonomous-vehicles.html</ref>. <br />
Ford has two generations of autonomous vehicles. In 2003 Ford installed [https://en.wikipedia.org/wiki/Lidar LiDAR] technology on an [https://en.wikipedia.org/wiki/Ford_Super_Duty F-250 Super Duty] for participation in the [https://en.wikipedia.org/wiki/DARPA_Grand_Challenge DARPA challenge]. The second generation of testing began in 2011 with the [https://en.wikipedia.org/wiki/Ford_Fusion_(Americas) Ford Fusion] sedan because of its advanced electrical systems. In January of 2016 Ford announced that it would expand its fleet of autonomous Fusions to 30 vehicles <ref>Ford.com news story featuring the expansion of their autonomous fleet https://media.ford.com/content/fordmedia/fna/us/en/news/2016/01/05/ford-tripling-autonomous-vehicle-development-fleet--accelerating.html</ref>.<br />
<br />
[[File:Google concept car.jpg|thumbnail| left| Google's new concept car]]<br />
<br />
===Google===<br />
Google’s self-driving car project, based out of Mountain View, California, began in 2009 and hit the road for testing in 2012 <ref>Google Car Homepage https://www.google.com/selfdrivingcar/</ref>. Currently, Google operates two types of autonomous vehicles. The first group is composed of Toyota Priuses and Lexus RX450hs. These vehicles are used by engineers to test driving systems in real world traffic. Google has begun testing a concept car developed in collaboration with Bosch, ZF Lenksysteme, LG, Continental, and Roush <ref> Google Concept Car Partners http://www.autonews.com/article/20150114/OEM09/150119815/google-in-talks-with-oems-suppliers-to-build-self-driving-cars</ref>. These vehicles are designed without peddles or steering wheels. <br />
As part of their concept car experiment, Google has asked citizens to submit artwork for their Paint the Town initiative. Artwork has been featured on cars in Mountain View, California, and Austin, Texas. <br />
Google expects to have vehicles available for purchase in 2020. The cars still need to undergo testing in both snow and heavy rain <ref>Google Cars in Snow http://www.bloomberg.com/news/articles/2015-01-14/google-sees-fielding-selfdriving-car-within-5-years </ref>.<br />
<br />
===Tesla===<br />
[https://en.wikipedia.org/wiki/Tesla,_Inc. Tesla] currently sells cars with Enhanced Autopilot and Full Self-Driving Capabilities. The Enhanced Autopilot features cameras and sensors that help the car to match its speed to traffic conditions, stay in a lane, and change lanes without driver input, switch freeways, exit a freeway, self park when near a parking spot, and be summoned to and from a garage. This feature, however, is not fully automatic and a driver should still be in control of the car at all times. The Full Self-Driving Capabilities feature, however, allows the car to fully drive itself. Tesla claims that this technology is estimated to be twice as safe as an average human driver. The system is supposed to be able to complete short and long term trips with no help from a human driver. All you have to do is get into the car and tell it where you want to go. If you do not say anything, the car will automatically look at your calendar and take you where the calendar says you need to be next. If there is nothing on your calendar, it will default to taking you home. The car will find the optimal route and navigate through streets, even without street markings, and traverse stop signs, stop lights, roundabouts, and complex intersections. The car is able to drive on crowded freeways at very fast speeds. Once you get out of the car at your destination, it will search for parking spots and automatically park itself. The user just needs to tap a button on their phone and the car will be recalled to pick them up. <ref>Order a Tesla Model X https://www.tesla.com/modelx/design</ref> This feature is functional due to the 8 sensors around the car that Tesla uses to have a complete 360 visibility around the car at up to 250 meters of range. Twelve ultrasonic sensors are used to complement this 360 view, detecting soft and hard objects at almost twice the distance of the previous system. A forward-facing radar looks in front of the car to cut through fog, heavy rain, dust, and even the car in front of the sensor to provide additional data about the world around the car. <ref> Full Self-Driving Hardware on All Cars https://www.tesla.com/autopilot</ref><br />
<br />
===Uber===<br />
[[Uber|Uber]] has tested its self-driving cars, intended to pick up passengers and take them where they needed to go, like the rest of Uber's services. They first intended to test the cars in San Fransisco, California, assuming that the self-driving regulations and $150 permit required for self-driving did not apply to them since there would be drivers in the seat while the testing was happening. California, however, did not agree and told Uber that they needed the permit. In response, Uber pulled the testing and went to Arizona instead, where the governor was happy to have them and asked to be the first test rider in February of 2017. The state overall has not regulated technology and self-driving cars, allowing testing to happen freely. <ref>Uber’s self-driving cars are now picking up passengers in Arizona http://www.theverge.com/2017/2/21/14687346/uber-self-driving-car-arizona-pilot-ducey-california</ref> On March 24th, 2017, one of Uber's self-driving cars was involved in a high speed crash in Tempe, Arizona. There were two engineers and no Uber passengers in the vehicle, and nobody was seriously injured. Uber has since pulled all tests while the crash is being investigated. The crash, however, was not the fault of the self-driving car, but the human driven car who crashed into Uber's vehicle. Some see this as an argument for self-driving cars, saying that they are safer than cars driven by humans since humans can be unpredictable.<ref>Uber’s Self-Driving Crash Proves We Need Self-Driving Cars https://www.wired.com/2017/03/uber-self-driving-crash-tempe-arizona/</ref> Some say that, as a ride sharing company, Uber needs to figure out self-driving cars in order to stay relevant, keep up with advancing technologies, and continue being a successful company. <ref>Inside Uber’s self-driving car mess https://www.recode.net/2017/3/24/14737438/uber-self-driving-turmoil-otto-travis-kalanick-civil-war</ref><br />
<br />
===GM and Lyft===<br />
[https://en.wikipedia.org/wiki/General_Motors General Motors] (GM) is also working on producing their self-driving cars and hopes to put as many as three hundred more autonomous vehicles on the road. This would give GM what seems to be the biggest fleet of self-driving cars in the United States. They hope to first release their autonomous cars in an on-demand ride share network. GM has partnered with [[Lyft | Lyft]], a ride sharing company, to produce self driving Bolts to be used for ride sharing purposes. <ref> GM plans 300 more self-driving cars http://www.detroitnews.com/story/business/autos/general-motors/2017/04/14/gm-autonomous-fleet/100477110/</ref> Lyft plans for the majority of their rides to be in self-driving cars by the year 2021, according to their president and co-founder, John Zimmer. Zimmer says that he is unclear who would own these cars if there were no drivers for them and how governments will play into this, but he believes that driverless cars are the future of ride sharing and that ride sharing is the future of driving. Zimmer claims that, by 2025, personal car ownership in the United States will be dead and everyone will be using the driverless ride sharing cars.<ref> Lyft's president says 'majority' of rides will be in self-driving cars by 2021 http://www.theverge.com/2016/9/18/12944506/lyft-self-driving-car-prediction-2021-john-zimmer </ref> The two companies hope to deploy thousands of the self-driving bolts in the year 2018, which may be the largest test of self-driving cars before 2020. <ref>Edelstein, Stephen. [http://www.csmonitor.com/Business/In-Gear/2017/0226/GM-Lyft-to-road-test-thousands-of-self-driving-Bolt-EVs-next-year GM, Lyft to road test thousands of self-driving Bolt EVs next year], ''The Christian Science Monitor'', 26 Feb. 2017. Web. 23 Apr. 2017.</ref><br />
<br />
===Toyota===<br />
In 2017, [https://en.wikipedia.org/wiki/Toyota Toyota] revealed their own take on the self-driving car, the Concept-i. It is a compact car which features an artificial intelligence system named Yui. This system is meant to make the driver and the car safer while still allowing the driver to maintain control of the car. Yui does this by measuring human emotion and responding by performing calming techniques such as turning on the radio or maintaining a conversation with the driver. The driver remains in control unless there is an impending accident situation, in which case Yui will take control of the car. This is a very different system than many of Toyota's competitors, as it is far from a fully autonomous vehicle, choosing to be a Level 2 autonomous system instead. This system is meant to combine the idea of autonomous vehicles preventing crashes with the idea of a robot that can assist people at home, such as [[Alexa | Alexa]]. <ref> Toyota exec: 'We are not even close' to fully self-driving cars http://www.businessinsider.com/toyota-gill-pratt-unveils-self-driving-plans-concept-car-at-ces-2017-1</ref><br />
<br />
==Safety Concerns==<br />
Google has been able to make their autonomousis cars street legal, a variety of safety concerns have arisen over the presence of self-driving vehicles sharing the road with traditional human driven vehicles. Since 2009, Google's self-driving cars have been involved in a total of sixteen crashes, which have mostly consisted of fender benders. All sixteen crashes were faulted as human error, however, in a 2015 report, the New York Times wrote that the car's tendency to "drive by the book" lead to over maneuvering to prevent collisions, often confusing other human drivers on the road and resulting in the subsequent accidents. <ref> Richtel, Matt and Dougherty, Conor. "Google’s Driverless Cars Run Into Problem: Cars With Drivers" http://www.nytimes.com/2015/09/02/technology/personaltech/google-says-its-not-the-driverless-cars-fault-its-other-drivers.html?_r=0 The New York Times. 01 Septemeber 2015.</ref><br />
<br />
In 2015, the Telsa Motors company enabled an autopilot feature through a software update to existing cars. While CEO Elon Musk claimed that the feature would result in radical improvements for vehicle safety, the company failed to prevent drivers from abusing the feature. While in autopilot mode, the company recommends that drivers keep both hands on the car steering wheel. <ref> Statt, Nick. "Tesla forced to disable autopilot features for Hong Kong owners" http://www.theverge.com/2015/11/20/9770902/tesla-model-s-autopilot-disabled-hong-kong-regulations The Verge. 20 November 2015.</ref> However, additional constraints had to be enforced after a slew of YouTube videos emerged of drivers using the autopilot feature without their hands on the steering wheel. <ref>McCormick, Rich. "Tesla owners are ignoring autopilot safety advice and putting the results on YouTube" http://www.theverge.com/2015/10/21/9589724/tesla-autopilot-videos-youtube-safety-advice-ignored The Verge. 21 October 2015.</ref> Currently, regulators have banned Telsa from activating the feature in Hong Kong, and other countries may soon follow suit.<br />
<br />
In 2016, a man named Joshua Brown died on May 7th when he crashed into a tractor-trailer while driving his Tesla on autopilot mode. Tesla was under investigation following the fatal crash, but the company was cleared ensuring no fault in the design. After the incident, Tesla released new versions of the autopilot design that gave drivers more frequent warnings to keep their hands on the steering wheel. <ref> Boudette, Neal. [https://www.nytimes.com/2017/01/19/business/tesla-model-s-autopilot-fatal-crash.html "Tesla’s Self-Driving System Cleared in Deadly Crash"] (19 January 2017. Retrieved on 23 April 2017.)</ref>.<br />
<br />
==Ethical Concerns== <br />
Computer ethicists and informed citizens alike are closely following the development of autonomous cars. With the transition from automated to autonomous, there are an increased number of decisions that must be made by designers.<ref>Lin, Patrick. "The ethical dilemma of self-driving cars" http://ed.ted.com/lessons/the-ethical-dilemma-of-self-driving-cars-patrick-lin TedEd. </ref>.<br />
<br />
===Responsibility===<br />
Much of the legislation relating to autonomous vehicles has related to responsibility. The question is whether consequences from autonomous cars should fall on manufacturers, owners, or others. This debate is furthered when cars are considered autonomous agents and have the ability to learn and change themselves. [[wikipedia:Product liability|Product liability laws]] are one venue of research on this dilemma that places responsibility for defects, injuries, and other unforeseen negative effects of sold products on any entities involved in the manufacture or selling processes. Being as autonomous cars are a tangible product, these laws may provide a framework for how responsibility can be regulated. <ref>Villasenor, John. "Products Liability and Driverless Cars: Issues and Guiding Principles for Legislation" http://www.brookings.edu/research/papers/2014/04/products-liability-driverless-cars-villasenor#ftn26 24 April 2014.</ref><br />
<br />
Bryant Walker Smith, an assistant law professor at the University of South Carolina, was quoted in April of 2017 saying that the level of automation today is at two or below and that drivers are responsible for crashes in these cases.<ref>Cassidy, Megan. "Who is liable if a self-driving car crashes? Tesla mishap raises issues" https://www.usatoday.com/story/money/cars/2017/04/03/tesla-mishap-raises-issues-self-driving-liability/99880620/ 3 April 2017. </ref> He went on to say that liability for crashes will move from driver to vehicle as the level of automation rises. Many experts believe that when a computer takes over the role of the driver, the companies that own the computer and programming will be held liable instead of the human driver and their insurance.<ref name="sciamerican"> Iozzio,<br />
Corinne. [https://www.scientificamerican.com/article/who-s-responsible-when-a-self-driving-car-crashes/ "Who's Responsible When a Self-Driving Car Crashes?"] '''Scientific American''' (1 May 2016. 23 April 2017).</ref> Many auto companies, however, want to keep humans liable, instead of themselves. The use of General Motors' Super Cruise implies that the driver must stay alert and prepared to take over the steering wheel at any time, reducing the liability on General Motors. <ref name="sciamerican"/> <br />
<br />
In May 2016, Joshua Brown got in a fatal accident using Tesla's autopilot system when the system hit a tractor-trailer in front of his car. <ref name="teslacrash">McFarland, Matt. [http://money.cnn.com/2016/07/07/technology/tesla-liability-risk/ "Who's responsible when an autonomous car crashes?"] '''CNN''' (7 July 2016. Retrieved 23 April 2017). </ref> In response to Brown's accident, Tesla stated that the vehicle's autopilot was functioning correctly and that it is meant to keep the car in its lane and adjust its speed. Yet, human drivers are still responsible for staying vigilant about their surroundings and taking over control of the car if they are entering an unsafe situation. <ref name="teslacrash"/> On the other hand, others argue that human responsibility should not be a factor when dealign with autonomous vehicles. This factor can be eliminated by taking out the pedals and steering wheel from autonomous cars. <ref name="teslacrash"/> This change in the design of autonomous vehicles would require a substantial increase in the AI technology that operates in autonomous vehicles since humans would have no option to take over if they were entering an unsafe situation. <br />
<br />
===Car Computer Security===<br />
As cars connected to the internet becomes more mainstream, automakers are challenged to ensure that users are safe from cars hacking. Mainstream vehicles such as Teslas, are constantly connected to the internet. Tesla also plans to make all their cars autonomous in the near future and are currently installing necessary hardware to make their vehicles autonomous. <ref> "All Tesla Cars Being Produced Now Have Full Self-Driving Hardware"[https://www.tesla.com/blog/all-tesla-cars-being-produced-now-have-full-self-driving-hardware] 19 Oct. 2016. Web. 23 Apr. 2017</ref> It is currently possible to connect to the Tesla API and remote control a Tesla while it is running. <ref> Kumar, Mohit "Researchers Show How to Steal Tesla Car by Hacking into Owner's Smartphone"[http://thehackernews.com/2016/11/hacking-tesla-car.html] 25 Nov. 2016. Web. 23 Apr. 2017</ref> Some of the capabilities hacking the Tesla API allows a hacker to control are: turning on the lights, honking the horn, turning off the car, and giving faulty warnings to the driver. Allow the seriousness o these hacks very, this sheds light on a more serious issue of users ability to trust Tesla. In light of private researchers demonstrating a hack on a 2014 Jeep Grand Cherokee that disabled the breaks of the moving vehicle, the FBI warns that car hacking will be a real risk in the future. <ref name="FbiCarHacking"> Greenberg, Andy "The FBI Warns That Car Hacking Is a Real Risk" [https://www.wired.com/2016/03/fbi-warns-car-hacking-real-risk/] 3 Jul. 2016. Web. 23 Apr. 2017</ref> Yet, our laws will be unable to change in time to offset this widespread capability. Waymo, an autonomous car company owned by Alphabet (the parent company of Google), pledged that their cars will <br />
only occasionally connect to the internet and they will try to avoid it. <ref> Condliffe, Jamie "Why Some Autonomous Cars Are Going to Avoid the Internet" [https://www.technologyreview.com/s/603339/why-some-autonomous-cars-are-going-to-avoid-the-internet/] 10 Jan. 2017. Web. 23 Apr. 2017</ref> While this is a security precaution, it fails to successfully ward off potential hackers. As long as autonomous vehicles have the capability to connect to the internet, there is a possibility of the cars being breached. The risk of hacking does not completely diminish. The new idea of autonomous vehicles that do not require user involvement, and therefore lack pedles and a steering wheel, are at a greater risk because a passenger will not have the opportunity to control the car at all if it were attacked and remotely controlled by a hacker. As long as cars, especially autonomous cars, connect to the internet, manufacturers will be held accountable for developing secure systems to ensure consumer safety. The risk hacking has on autonomous cars could be lethal. <br />
<br />
===Impacts on employment===<br />
Some economists fear that the adoption of autonomous vehicles will lead to severe, and potentially problematic unemployment. In the United States, over 4.4 million Americans work as drivers. Truck driving is the largest occupation in the country. Autonomous vehicle technology threatens these jobs. Many people worry about what will happen when these jobs get replaced.<ref>Greenhouse, Steven. “Autonomous Vehicles Could Cost America 5 Million Jobs. What Should We Do about It?” Los Angeles Times, Los Angeles Times, 22 Sept. 2016, [https://www.latimes.com/opinion/op-ed/la-oe-greenhouse-driverless-job-loss-20160922-snap-story.html https://www.latimes.com/opinion/op-ed/la-oe-greenhouse-driverless-job-loss-20160922-snap-story.html].</ref><br />
<br />
While some believe that any worry of incoming technological unemployment is a Luddite-fallacy<ref>The Luddite-Fallacy (2016) https://www.economicshelp.org/blog/6717/economics/the-luddite-fallacy/</ref>, others are not convinced. Rather, many people are concerned that the rate at which jobs will be lost is unlike what economies have experienced in previous periods of technological improvement.<ref>Wadhwa, Vivek. “Sorry, but the Jobless Future Isn't a Luddite Fallacy.” The Washington Post, WP Company, 7 July 2015, [https://www.washingtonpost.com/news/innovations/wp/2015/07/07/sorry-but-the-jobless-future-isnt-a-luddite-fallacy/?utm_term=.aa13a1f442ac https://www.washingtonpost.com/news/innovations/wp/2015/07/07/sorry-but-the-jobless-future-isnt-a-luddite-fallacy/?utm_term=.aa13a1f442ac].</ref> Internet entrepreneur and Tesla CEO, Elon Musk, believes that in order to address the incoming technological unemployment that autonomous vehicles will create, economies will need to adopt policies such as universal basic income.<ref>Sabin, Dyani. “Elon Musk Says Autonomy Will Force Universal Basic Income.” Inverse, Inverse, 14 Feb. 2017, [https://www.inverse.com/article/27809-elon-musk-universal-income-self-driving-cars https://www.inverse.com/article/27809-elon-musk-universal-income-self-driving-cars].</ref><br />
<br />
===MIT Moral Machine===<br />
<br />
MIT Moral Machine is a project sponsored by MIT’s Media Lab <ref>"About Moral Machine" http://moralmachine.mit.edu/</ref> that poses various ethical dilemmas to gather public opinion on how autonomous vehicles should behave under various life-or-death scenarios. The underlying dilemma is given that an autonomous car must crash, whose life/lives should it save? An example of the dilemma is given that the car must kill either a pedestrian or its passenger, how should it choose?<br />
<br />
From their website, the goals of Moral Machine are “1) building a crowd-sourced picture of human opinion on how machines should make decisions when faced with moral dilemmas, and 2) crowd-sourcing assembly and discussion of potential scenarios of moral consequence.”<br />
<br />
====Pro-passenger argument====<br />
<br />
In response to the question of whether an autonomous vehicle should choose to save a passenger or a pedestrian, some argue that the vehicle should choose to protect its passenger. In October 2016, Mercedes Benz executive Christoph von Hugo commented that, in the future, Mercedes autonomous cars would choose to save its passenger. Their reasoning is that “crash situations, he says, are so chaotic that an A.I. should prioritize the lives it has most direct control of.” <ref>Morris, David. "Mercedes-Benz’s Self-Driving Cars Would Choose Passenger Lives Over Bystanders" http://fortune.com/2016/10/15/mercedes-self-driving-car-ethics/ Fortune. 15 October 2016. </ref><br />
<br />
Another argument used in favor of saving the passenger is that people are less likely to use autonomous vehicles if they know that the vehicle won’t choose to save their own life. In a paper published in the journal Science, psychologists found that, of the 2000 respondents to a survey, most people would not be willing to use autonomous cars in this case <ref>Bonnefon, Jean-François. Shariff, Azim. Rahwan, Iyad. [http://science.sciencemag.org/content/352/6293/1573 The social dilemma of autonomous vehicles]''American Association for the Advancement of Science'', 24. Jun. 2016.</ref>.. If drivers were unwilling to adopt autonomous cars for this reason, society would not achieve the benefit of reduced driving-related accidents that autonomous vehicles promise.<br />
<br />
====Pro-pedestrian argument====<br />
<br />
An argument in favor of saving the pedestrian instead of the passenger it is ethically more just to do so. By choosing to ride in the autonomous car, the passenger assumes the risk associated with the ride. Because of this, some argue that they are ethically responsible for bearing any cost that associated with a car crash.<br />
<br />
====How Autonomous Cars Make Decisions====<br />
While AI decision making cannot replace that of a human, it is estimated that 90% of car accidents are caused by human error. With that, autonomous vehicles make decisions based on the speed they're traveling, the road and weather conditions, distance and other data gathered by sensors. The car will make a calculation based on how fast the object traveling towards it is going, where the challenge would be processing the calculation fast enough to help avoid the dangerous circumstance. While the human element of control is flawed and imperfect, many still prefer to have the decision of how to react in their hands. However, this could mean being responsible for the death of someone else instead of having a car be responsible. Humans do not have time to think about the outcomes of their decision, rather reacting instinctively irregardless of if there could be another way to swerve the wheel and save more lives. With the information that is gathered by the car from its different sources, choosing a certain route to avoid killing more people as opposed to another route with more people will be a byproduct of these calculations and not a direct thought of the algorithm in and of itself. <br />
<br />
[[File:Trolley.jpg|thumbnail|An illustration of the basic trolley problem]]<br />
<br />
===Trolley Problem=== <br />
The trolley problem, or trolley dilemma, is a thought experiment used be ethicists and designers across many different disciplines. While there are a number of variations on how the story goes, the main idea is that there is a runaway trolley headed down a track to which five people are tied. You however are standing next to a switch which you could throw and reroute the trolley on to a track with only one person tied to it. You can do two things, do nothing and let the trolley kill 5 people, or throw the switch which would result in only one person being killed. This same decision will have to be made by the designers of autonomous vehicles.<br />
<br />
There are many different examples that designers will need to take into account. Consider a 10-year-old running in front of an autonomous car. The car can either hit the child, or it could swerve and crash and injure or kill the person in the vehicle. These examples will need to be answered. <br />
<br />
While we might be faced with same problem while driving an ordinary car down the road it is generally recognized that there is a difference between ordinary cars and driverless cars. While driving down the road in a normal car this would be a split section decision made by the driver. With autonomous cars the decisions is far from split second. This leads to the ethical question of who will be making the decision of which path our cars should take. <br />
<br />
Chris Urmson leads Google's self-driving car project and notes that Google's driverless cars will not be able to determine the most ethical person to hit in a collison. <ref name ="mcfarland">McFarland, Matt [https://www.washingtonpost.com/news/innovations/wp/2015/12/01/googles-leader-on-self-driving-cars-downplays-the-trolley-problem/ Google's chief of self-driving cars downplays the 'trolley problem']''The Washington Post'', 01. Dec. 2015.</ref>. Urmson argues that it is impossible to ethically determine one person's worth over another. <ref name ="mcfarland"/> Google's driverless cars are engineered to first avoid pedestrians and bicyclists, then other vehicles, and then immobile objects. <ref name="mcfarland"/><br />
<br />
===Drinking and Driving===<br />
Autonomous Vehicles raise the question of drinking and driving, if the car drives itself is it okay for the driver (or passenger you may say) to drink? There are not laws surrounding this and it can be foreseen that many individuals will try to test the law and see what happens. Once fully autonomous vehicles become the norm this is an issue that must be dealt with. Cars that are fully autonomous must still have a driver that is not impaired. Yet on the flip side if we create cars that are entirely autonomous and reliable, does the 'driver' really need to be sober? Or could it be understood that since the car is driving itself that the driver can drink.<br />
<br />
===Implications===<br />
Many experts believe that the introduction of autonomous vehicles will change the automotive industry from a good-based economy to a service economy. Rather than owning a car, users will have own a subscription to an automotive company. It essentially uberizes the market, where userswill request rides and a car will come pick them up, drop you off, and then proceed to service another customer. This would have dramatic effects on parking services, as it would negate the need for parking as cars would be in constant use. Experts beleive that this will have severe consequences on the traffic, likely dramatically increasing congestion.<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Luciano Floridi]]<br />
*[[Autonomous Systems]]<br />
*[[OnStar]]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
<br />
[[Category: Information Ethics]]<br />
[[Category: Computer Simulation]]</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Instagram&diff=71665Instagram2018-04-16T20:33:32Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics#F}}<br><br />
{{SoftwareInfoBox<br />
|HEIGHT=590<br />
|NAME=Instagram<br />
|LOGO=icon.jpeg<br />
|SCREENIMAGE=49803d8eb5ea235a5860ac942caece70_download-png-download-eps-instagram-logo-clipart-png_1024-1024.png<br />
|CAPTION=Official App Icon<br />
|IMAGEURL=<br />
|TEXT=<br />
|PLATFORM=Cloud Service<br>[[iOS]]<br>[[Android]] <br />
|PRODUCT=Instagram<br />
|TYPE=Photo Sharing Service <br />
|SITEURL=http://instagram.com<br />
|URLTEXT=www.instagram.com <br />
|STATUS=Active<br />
|LAUNCH=October 6, 2010 <ref> Desreumaux, Geoff. [http://wersm.com/the-complete-history-of-instagram/ Complete History of Instagram]''wersm''. 3. January. 2014. Web. 23. April. 2017</ref><br />
}}<br />
'''Instagram''' is a free [[Social Networking|social networking]] and photo sharing service that allows users to share aspects of their life through photos and short videos. Profiles can be public and private. Instagrammers can edit photographs with filters and share them with "followers" and contacts from other social networks. Instagram originally required photos to have a 1:1 aspect ratio reminiscent of Kodak and Polaroid images, but new upgrades now allow users to post photos with different dimensions. Initially only supported by Apple devices and the iTunes App Store, Instagram added support for the [[Android]] Camera phones running 2.2 or higher through [[Google]] Play in 2012.<ref>Murph,<br />
Darren. [http://www.engadget.com/2012/04/03/instagram-android-download-now-available/ Instagram Comes to Android, Available to Download Now], engadget. ''AOL Inc.'', 3 April 2012. Web. 23 Apr.<br />
2017.</ref> After reaching 30 million [[iOS]] users, Instagram won Apple's "iPhone App of the Year" award in 2011.<ref>Perez, Sarah. [http://techcrunch.com/2011/12/08/apple-picks-instagram-as-the-iphone-app-of-the-year/ Apple Picks Instagram As The “iPhone App Of The Year”]. ''TechCrunch'', 08 Dec. 2011. Web. 23 Apr. 2017.</ref> As of April 2017, the app has over 400 million registered users.<ref> Instagram Blog. [http://blog.instagram.com/post/129662501137/150922-400million Celebrating a Community of 400 Million] ''Instagram'', 22 Sept. 2015. Web. 23 Apr. 2017. </ref> In April 2012, [[Facebook]] made an offer to purchase Instagram for approximately $1 billion in cash and stock, completing the transaction on September 5th, 2012.<ref>Rusli, Evelyn M. [http://dealbook.nytimes.com/2012/04/09/facebook-buys-instagram-for-1-billion Facebook Buys Instagram for $1 Billion]. ''The New York Times'', 9 Apr. 2012. Web. 23 Apr. 2017.</ref> Instagram has fallen under criticism for issues regarding privacy, nudity, and the effect of the application on professional photographers.<br />
<br />
== History ==<br />
===Creation===<br />
The development of Instagram began in early 2010 in San Francisco when [[Wikipedia:Kevin Systrom|Kevin Systrom]], CEO and co-founder, left a job in marketing at NextStop to pursue his side project Burbn. He had been working on programming a prototype in basic [[Wikipedia:HTML5|HTML5]] in his off time, trying to combine elements of [[Wikipedia:FourSquare|FourSquare]] and Mafia Wars. [[Wikipedia: Mike Krieger|Mike Krieger]] was a former classmate of Systrom’s and thought the project had potential so he joined Systrom in early 2010. Together, the pair raised $500k from investors [[Wikipedia: Andreessen Horowitz|Andreessen Horowitz]] and [[Wikipedia: Baseline Ventures|Baseline Ventures]] by March 5, 2010. <ref>Siegler, MG.[http://techcrunch.com/2010/03/05/burbn-funding/ TechCrunch: Burbn's Funding Goes Down Smooth. Baseline, Andreessen Back Stealthy Location Startup.]''Tech Crunch'', 5 Mar. 2010. Web 23 April 2017</ref> After full completion, the iPhone app Burbn felt too cluttered with features. The app included checking into locations, posting pictures, making plans, and earning points for hanging out with friends. Krieger and Systrom later decided to focus on the photo sharing aspect. Within eight weeks of switching tracks, Instagram was complete and ready to be launched at the end of March 2010. <ref>Synstrom, Kevin. [http://www.quora.com/Instagram/What-is-the-genesis-of-Instagram Quora: What is the genesis of Instagram?]''Quora'', 12. Jan. 2011. Web. 23 April 2017</ref><br />
<br />
<br />
In January of 2011, hashtags were implemented by Instagram. When version 2.0 came out later that year in the App Store, it included photo filters, instant tilt-shift, high-resolution photos, optional borders, one click rotation, and an updated icon. Finally, on April 3, 2012, Instagram released the app for [[Android]] mobile devices after being exclusively available for iPhone users for 18 months. It was downloaded more than one million times in less than a day. Currently, there are no future plans to release the app for BlackBerry devices. <br />
<br />
<br />
The [[Android]] interface is slightly different, following a familiar [[Android]] [[Wikipedia:user-interface|user-interface]] design as opposed to the [[iOS]] featured design. The two platforms also have features that are available exclusively to each platform. <ref>Instagram Blog [http://blog.instagram.com/post/20411305253/instagram-for-android-available-now/ Instagram Blog: Instagram for Android — Available Now]''Instagram'', 3. April. 2012. Web. 23 April 2017</ref> The [[Android]] app allows users to use the phone’s native camera by changing the camera settings on the profile settings page to not “Use Instagram’s Advanced Camera,” a feature unavailable on the iOS platform. Until May, 2012, the Android app did not have the popular Tilt-Shift feature that allows users to create a blurring effect and add depth to the picture. <ref>Murphy, Savannah [http://mashable.com/2012/05/09/instagram-tilt-shift-android/ Mashable: Instagram Adds Popular Tilt-Shift Feature to Android App]''Mashable'', 9. May. 2012. Web. 23 April 2017</ref> Unlike on the iOS platform, the Android app does not allow users to apply different filters or effects before the photo is taken using the camera within Instagram. <br />
<br />
[[File:NewInstagramMobile.jpg|250px|thumb|right|Mobile View]]<br />
<br />
=== Facebook Acquisition ===<br />
In 2012, [[Facebook]] made an offer equating to $1 billion in cash and stock to purchase Instagram and all 13 of its employees in April 2012, a month before Facebook went public. The acquisition plans intended to keep the company independently managed, as many were concerned their photo sharing capabilities on Instagram would be thwarted by Facebook. The Office of Fair Trading approved the deal on August 14, 2012, and on August 22, 2012, the [[Wikipedia:Federal Trade Commission|Federal Trade Commission]] in the United States closed its investigation.<ref>BBC News [http://mashable.com/2012/05/09/instagram-tilt-shift-android/ Mashable: Instagram Adds Popular Tilt-Shift Feature to Android App]''BBC News'', 14. August. 2012. Web. 23 April 2017</ref> On September 6, 2012, the deal between Instagram and [[Facebook]] officially closed. Instagram is now currently operating under the ownership of [[Facebook]].<ref>Upbin,Bruce.[http://www.forbes.com/sites/bruceupbin/2012/04/09/facebook-buys-instagram-for-1-billion-wheres-the-revenue/ Forbes: Facebook Buys Instagram For $1 Billion. Smart Arbitrage.]''Forbes'', 09. April. 2012. Web. 23 April 2017</ref><br />
<br />
===Instagram and Twitter===<br />
When Instagram first launched, users were able to share their photos directly to [[Twitter]] as Twitter cards. On December 4, 2012, Instagram disabled the ability for Twitter to properly display Instagram photos on its website and coinciding applications. The move escalated tensions between the two companies, which were once friends in the battle against Facebook but have now become direct competitors. <ref name= Display>Bilton, Nick.[http://bits.blogs.nytimes.com/2012/12/05/twitter-loses-ability-to-properly-display-instagram-photos/ Twitter Loses Ability to Properly Display Instagram Photos]''New York Times''.05. December. 2012. Web. 23 April 2017</ref> Although Instagram and Twitter worked closely together during Instagram’s early days, relations between the two companies have soured since the Facebook acquisition. <ref name= 'Display'/><br />
<br />
Since shutting off users' abilities to use Instagram, Twitter has released its own photo filter features, allowing users to create effects quite similar to those available on Instagram.<ref>Terdiman, Daniel. [http://news.cnet.com/8301-1023_3-57558617-93/instagram-photos-still-visible-in-tweets-in-tweetdeck/ Some Instagram photos still viewable on Twitter] ''Cnet'' .11. December. 2012. Web. 23 April 2017</ref> Instagram users can still share their photos to Twitter, but instead of tweeting the photo as a Twitter card, they can only tweet the link to the photo, which will take Twitter users to the Instagram app or website.<br />
<br />
== Use ==<br />
After the application is downloaded, an icon appears on the home screen of the user's device through which they can access the application. Once they access the app, the user must register and create a free account with a username and password. They can optionally add an email address or phone number to the account. The user can also add a photograph, which will appear on the user's profile along with their posted photos and username. Once an account has been registered, a user has the option to find friends through Facebook or by simply searching. Unlike Facebook, however, users do not have to follow friends who are following them and vice versa. Instagram also provides a list of recommended users to follow. Once a user follows other users, photos posted to the application will appear in a stream on the home page. A user can like or comment on those photos, which will send a notification to the user who posted the photos as well as appear with that photo on all other users' homepages. Along the bottom of the screen are five navigation icons. The first is the home page. The second is a magnifying glass that represents the "Explore" page. In addition to being able to search for other users or hashtags, the user can also find a list of suggested images that the app curates based on who the user follows and what photos they have liked. The middle button is a camera icon where users can select photos to edit from their phone's camera reels or take photos from the app's camera. The third is the notification page, which consists of two tabs: the first is a newsfeed of new followers, comments, and likes, and the second is a "following" section that serves as a short news feed of other users' activities. The last icon in the bottom right corner leads to the registered user's profile. <br />
<br />
From the settings page, the user has the option to make their profile private. This means that all of that user's photos are private unless other users request to follow that user. Upon acceptance of that request, other users can see those private photos. Users can also turn on photo sharing to other social networks through their settings. <br />
<br />
To post a picture, users click the bottom center camera icon where they can proceed to take a picture or use a previously taken photo. Once a user chooses a photo, filters can be added as well as a number of photo editing effects. Users can then add a caption or geotag and post it for all of that user's followers to see. <br />
<br />
===Users===<br />
As of 2016, Instagram reported having over 400 million accounts that are active monthly. The Pew Research Center found that 28% of all Americans on the internet have an Instagram account. 31% of all internet-using American women use Instagram versus 24% of Internet-using American men. In the United States, Instagram is most popular with people in the 18-29 age bracket, with over 50% of this demographic with Instagram accounts. <ref>Duggan, Maeve. [http://www.pewinternet.org/2015/08/19/the-demographics-of-social-media-users/ Pew Internet: Instagram User Demogrpahics] ''Pew Internet''. 19. August. 2015. Web. 23 April 2017</ref> Instagram's user base extends beyond just the United States, as almost 80% of users are from outside the US. <ref>Booton, Jenifer. [http://www.marketwatch.com/story/most-instagram-users-are-outside-the-us-2016-06-21 Market Watch: Instagram User Demogrpahics] ''Market Watch''. 21 June 2016. Web. 23 April 2017</ref> On average, Instagram users collectively share over 80 million photos, and like 3.5 billion posts per day. <br />
<br />
[[File:instagrampics.png|left|350px|thumb|right|Sample of a page]]<br />
<br />
===Professional Instagrammers===<br />
Some people have been able to use their huge following on Instagram as a way to gain endorsements, and even use their photos as a sort of social currency. For instance, Cole Rise, a professional wilderness photographer with over 900,000 Instagram followers, paid for his stay at a Nicaraguan hotel by posting a photo endorsement of the location on his Instagram account <ref name="insta"> Heath, Alex. [http://www.businessinsider.com/what-its-like-to-be-a-professional-instagrammer-2015-7 Life of A professional Instagrammer] ''Business Insider''. July 30, 2015. </ref>. Rise has also done professional posts on his page for the Norwegian Tourism Board, NASA, and jewelry companies <ref name="insta"/>. Though Cory Staudacher was not originally a professional photographer, he still entered into the realm of professional Instagram posting. With over 563,000 followers, Staudacher has done endorsed posts for big name companies including Apple, Ford, Gap, Nordstrom, Acura, Dos Equis, Warby Parker, and Marriott Hotels <ref name="insta"/>. He refers to these types of posts as "social influencer campaigns", in which companies provide the poster with royalties in return for their endorsement post on Instagram. For example, Acura provided Staudacher with a vehicle to drive at the Sundance Film Festival with the promise that he would photograph the car amid the scenery of Park City, Utah <ref name="insta"/>. These kinds of campaigns on social media reach consumers in a way that billboards of TV spots cannot. Both of these individuals belong to a collective of similar visual artists with large followings on social media known as Tinker Street <ref name="insta"/>. This is just one example of a number of these kinds of agencies that promote this new genre of social media endorsement and advertising.<br />
<br />
== Features ==<br />
====Timeline====<br />
Instagram displays a feed on the home page for users to view all of the photos that have been posted by their followers in chronological order. In 2016, Instagram began testing an algorithmic timeline that would organize posts on the home display based on popularity personalized to the user<ref>Isaac, Mike. [https://www.nytimes.com/2016/03/16/technology/instagram-feed.html?_r=0 Instagram may Personalize your Feed]"New York Times". 15. March. 2016. Web. 23. April. 2017. </ref>, similar to the way that [[Facebook]] and [[Twitter]] organize one's newsfeed and [[Twitter]] feed.<br />
<br />
==== Hashtags ====<br />
The hashtag was adopted from Twitter as a means for categorizing photos. Users can implement [[Wikipedia:hashtags|hashtags]] to tag photos and help other users discover photos. Instagram encourages users to use specific and relevant tags to help users find photos more easily. The hashtags feature has created a new Instagram phenomenon. Some users have adopted a habit to come up with as many hashtags as possible that are relevant to a picture. This is an attempt to have their pictures seen by as many Instagram users as possible through certain hashtags. Hashtags are generally collated by the app as part of the Discover feature, which offers image suggestions based on a user's individual preferences and patterns.<br />
<br />
==== Liking ====<br />
Users can like photos by clicking the heart-shaped button or by double tapping the photograph itself. With enough likes, a photo can make it to the Popular Page, which is broadcasted to every Instagram user and is constantly in flux. Depending on the number of likes, either each individual's username is displayed or the number of likes is displayed, as to not exceed four lines of text on the screen.<br />
<br />
====Commenting====<br />
Users can comment on photos to share their thoughts on a post. The most frequent comments are displayed on a user's Timeline. Tapping on "View all comments" on a photo in the Timeline expands the comments section on a new screen.<br />
<br />
====Tagging====<br />
Instagram users can tag their friends, family, businesses, and places in their Instagram posts. When uploading a post, users search for a name or Instagram handle to tag an account. <br />
<br />
==== Notifications ====<br />
Users can now turn on post notifications for accounts that they follow. This means they will receive a notification every time this account posts anything to Instagram. It's a way for users to stay informed and never miss a post from certain desired accounts. Celebrities and popular accounts often post pictures asking their followers to turn the notifications on to ensure their loyal following. <br />
<br />
==== Geotagging ====<br />
Photos can be tagged at a certain location where other users can view all photos tagged at that same location. This enables followers and friends to explore different places while browsing through Instagram. Geotagging is frequently used for pictures related to restaurants and tourist destinations to [[Facebook]]'s "Check-in" feature. Geotagging allows the user to check-in anywhere. The user does not have to physically be in the location they are tagging. Additionally, geotagging allows the user to select a suggested location or make up a location of their own.<br />
<br />
====Sharing====<br />
Users have the ability to share photos posted on their Instagram to their [[Facebook]], [[Twitter]], [[Tumblr]], or [[Wikipedia:Flickr|Flickr]] profiles. Instagram's privacy settings do not apply when users choose to share their picture to an external social media account. Instead, it will depend on the privacy settings set on their other profile.<br />
<br />
====Bookmarks====<br />
Users can now bookmark Instagram posts to save and look at later. The feature, which debuted in December of 2016, allows users to maintain a collection of photos and videos by simply tapping a bookmark icon located next to all posts. Bookmarked posts are saved in a gallery that only the user has access to and users are never notified when one of their posts have been bookmarked<ref>Garun, Natt. [http://www.theverge.com/2016/12/14/13941522/instagram-bookmark-tool-creepy The Verge: You can now bookmark Instagram posts to look at later]''The Verge'', 14. Dec. 2016. Web. 23 April 2017</ref>.<br />
<br />
====Multiple Photos====<br />
Users can now upload up to ten photos at one time, all under one post. The change, according to Instagram, was made so users would "no longer have to choose the single best photo or video from an experience you want to remember.” The feature was introduced in February of 2017<ref>Wagner, Kurt. [https://www.recode.net/2017/2/22/14693256/instagram-facebook-upload-photos-video-carousel Instagram will now let you upload 10 photos at once]''Recode'', 22. Feb. 2017. Web. 23 April 2017</ref>.<br />
<br />
====Instagram Direct====<br />
Instagram Direct is an instant messaging system within the Instagram app that allows users to share pictures or videos with a selected person or group of people. It features threaded messaging in which users can name their chats and also share other posts from Instagram in their messages. In addition to sharing images directly through this chat, members of a chat group can send text messages and heart icons that indicate liking.<br />
<br />
==== Filters ====<br />
[[File:Instagramfilters.jpeg|thumb|The same photo under different filters <ref name = theatlantic> Garber, Megan. [http://www.theatlantic.com/technology/archive/2012/04/a-guide-to-the-instagram-filters-youll-soon-be-seeing-on-facebook/255650/ Guide to Instagram Filters ]''The Atlantic'' 10. April . 2012. Web. 23. April. 2017.</ref>.]]<br />
Users have the ability to add different filters to their photos, which consist of different lighting, saturation, contrast, frames and color effects:<ref name = theatlantic/><br />
<br /><br />
<br />
*'''Aden'''- This filter gives a blue/green natural look. <br /><br />
*'''Amaro'''- Light with minimal fading and emphasis on beige <br /><br />
*'''Ashby'''- By adding a gold overlay, it creates a vintage feel to images without emphasizing shadows <ref name = theatlantic/> <br /><br />
*'''Brannan'''- Low-key with an emphasis on grays and greens <br /><br />
*'''Brooklyn'''- Purple undertones <br /><br />
*'''Clarendon'''- Creates a stronger contrast between shadows and light for images <ref name = theatlantic/> <br /><br />
*'''Charmes'''- Saturates red tones and tints warm colors <ref name = theatlantic/><br /><br />
*'''Crema'''- Adds a creamy look that both warms and cools the image. <br /><br />
*'''Dogpatch'''- Increases contrast and tints warm colors <ref name = theatlantic/><br /><br />
*'''Earlybird'''- Sepia- like, faded with blurred colors and an emphasis on yellow and beige<br /><br />
*'''Gingham'''- Adds yellow tone to create a brighter, faded look<ref name = theatlantic/><br /><br />
*'''Ginza'''- Overlays image with warm colors from the color wheel <ref name = theatlantic/> <br /><br />
*'''Hefe'''- Fuzzy with an emphasis on golden tones<br /><br />
*'''Helena'''- Saturates orange and teal colors in images <ref name = theatlantic/><br /><br />
*'''Hudson'''- Warm and saturated with an emphasis on blues and yellows<br /><br />
*'''Inkwell'''- Black and white feature <br /><br />
*'''Juno'''- Saturates warm colors on color wheel and shades darker colors <ref name = theatlantic/><br /><br />
*'''Kelvin'''- Saturated, retro photos with a distinctive scratchy border <br /><br />
*'''Lark'''- Saturates all colors except for red hues <ref name = theatlantic/><br /><br />
*'''Lo-Fi'''- Dreamy with a slight blur and saturated yellows and greens<br /><br />
*'''Ludwig'''- A slight hint of desaturation that also enhances light. <br /><br />
*'''Maven'''- Shades the image,lowers contrast of hues, and also has a yellow overlay <ref name = theatlantic/><br /><br />
*'''Mayfair'''- Applies a warm pink tone, subtle vignetting to brighten the photograph center and a thin black border <br /><br />
*'''Moon'''- Black and white feature <br /><br />
*'''Nashville'''- Sharpens the image with a magenta-purple tint and framed with a film strip border<br /><br />
*'''Normal'''- No effect<br /><br />
*'''Perpetua'''- Adding a pastel look, this filter is ideal for portraits. <br /><br />
*'''Reyes'''- Uses tint effects to create a more vintage look to images <ref name = theatlantic/><br /><br />
*'''Rise'''- Warm with an emphasis on yellow and light browns<br /><br />
*'''Sierra'''- Light with a slight blur and emphasis on beige<br /><br />
*'''Skyline'''- Adds tint to images acting as an auto-correct feature <ref name = theatlantic/><br /><br />
*'''Slumber'''- Desaturates the image as well as adds haze for a retro, dreamy look – with an emphasis on blacks and blues. <br /><br />
*'''Stinson'''- A subtle filter that brightens your image, washing out the colors ever so slightly. <br />
*'''Sutro'''- Sepia effect with an emphasis on purple and brown <br /><br />
*'''Toaster'''- High exposure with vignette corners and an emphasis on red<br /><br />
*'''Valencia'''- High contrast with a slightly brown and gray overtone<br /><br />
*'''Vesper'''- Decreases sharpness of photos and adds a warmer tint to the colors <ref name = theatlantic/><br /><br />
*'''X-Pro II'''- Warm and saturated with an emphasis on aquas and greens<br /><br />
*'''Walden'''- Washed out color with slight blue overtone<br /><br />
*'''Willow'''- Washed out black and white feature <br /><br />
*'''1977'''- 70's style flair<br /><br />
<br />
Frames can be added or taken away but are different depending on the filter used. One filter's frame cannot be used with another filter's look.<br />
<br />
==== Lux ====<br />
The Lux feature allows users to adjust saturation and contrast in photos simultaneously. Users can adjust the Lux slider to control the amount of saturation and contrast.<br />
<br />
==== Adjustments ====<br />
In addition to filters, users can adjust a number of aspects of their photos. These include:<br />
*'''Adjust'''- Users can tilt or skew the photo<br />
*'''Brightness'''- Users can make the photo lighter or darker<br />
*'''Contrast'''- Users can increase or decrease the contrast in their photos<br />
*'''Structure'''- Users can enhance lines, details, and textures in their photos<br />
*'''Warmth'''- Users can make their photos warmer or cooler <br />
*'''Saturation'''- Users can increase or decrease saturation<br />
*'''Color'''- Users have the ability to add different shades of yellow, orange, red, purple, blue, and green to either the shadows or highlights of their photos<br />
*'''Fade'''- Users can add a faded effect to their photos<br />
*'''Highlights'''- Users can increase or decrease the brightness of the highlighted portions of their photos<br />
*'''Shadows'''- Users can increase or decrease the darkness of the shadowy portions of their photos<br />
*'''Vignette'''- Users can add a vignette effect to the border of their photos<br />
*'''Tilt shift'''- Users can add an adjustable radial or linear blur to their photos<br />
*'''Sharpen'''- Users can sharpen their photos<br />
<br />
==== Video ====<br />
Instagram users can upload videos that are between 3 and 15 seconds long. When the user selects which video they would like to upload, they have the option of applying a filter to the video just as they would with a still photo. There are more restrictions to editing videos than photos. In March 2016, Instagram allowed users to post videos up to 60 seconds in length, putting more emphasis on videos than in previous years <ref> Soper, Taylor. [http://www.geekwire.com/2016/instagram-extends-video-length-limit-15-seconds-60-seconds/ "Instagram extends video length limit from 15-seconds to 60-seconds"] (29 March 2016. Retrieved on 23 April 2017.)</ref>. <br />
<br />
==== Boomerang ====<br />
On October 22, 2015, Instagram announced "Boomerang" <ref> [http://blog.instagram.com/post/131684343987/boomerang-from-instagram "Introducing Boomerang from Instagram"] (22 October 2015. Retrieved on 23 April 2017.)</ref> . A boomerang is a mix between a photo and a GIF. Boomerang takes a burst of photos and puts them in a video loop to add motion to what would otherwise be a static photo. <br />
<br />
====Stories====<br />
[[File:Instagramstories.jpg|thumbnail|right]]<br />
On August 2, 2016, Instagram launched their "Stories" feature. Similar to Snapchat Stories, this feature allows users to upload multiple pictures or videos throughout their day, which their followers are able to view for up to 24 hours. Users can also add various effects to the images or videos on their story including filters, text, drawings, geotags, rewind, etc. Stories appear in a bar at the top of the app, where an orange circle around someone's profile picture indicates an unwatched story. Users can view which of their followers have seen the post on their story by swiping up when looking at their own story. <ref>[http://blog.instagram.com/post/148348940287/160802-stories Instagram Blog] ''Instagram Blog''. 2. August. 2016. Web. 23. April. 2017. </ref><br />
<br />
====Instagram Business Tools====<br />
On May 31, 2016, Instagram announced the launch of its tools for business owners. Some of these new features include business profiles, insights, promote, and product tagging. <br />
=====Business Profile=====<br />
Business profiles are a free feature for Instagram accounts that want to be recognized as a business. To enable this feature, accounts must be on public mode and must have a Facebook page for their business that can be linked to their Instagram account. This filters out users on Instagram that use the platform for self-promotion (gaining followers, likes, etc.) and not for a commercial purpose. Business profiles have several exclusive features, such as the contact button. Businesses have the ability to link their email, phone number, and provide directions to their business through Google Maps, allowing their customers to reach them easier. <ref>[https://techcrunch.com/2016/05/31/instagram-officially-announces-its-new-business-tools/] "Instagram Officially Announces Its New Business Tools", 31 May. 2016</ref><br />
=====Insights=====<br />
The Insights feature provides businesses actionable information so that businesses can improve their reach. Insights focus on two main areas: post analytics and follower demographics. Utilizing the insights feature, users can compare their content easily and find information of how each of their posts is performing.<ref>Wright, Victoria. “4 Ways to Use Instagram Insights to Improve Your Marketing.” Social Media Examiner, 16 Feb. 2018, [[www.socialmediaexaminer.com/4-ways-to-use-instagram-insights-to-improve-marketing/]].</ref><br />
<br />
======Post Analytics======<br />
Post analytics allows businesses to learn about the performance of their Instagram content. The business can track data regarding impressions, reach, website clicks, and follower activity. Impressions refer to the number of times the post has been seen, whereas reach refers to the number of distinct Instagram accounts that have seen the post. Website clicks allow the business to track the number of users who have clicked on the website linked to their profile (if they have one). Follower activity provides the most popular times throughout the day where the accounts' followers are active so that businesses can better time their post and expand their reach.<ref> "Instagram Analytics Will Offer Audience Demographics Post Impressions Reach & More" 16 May. 2016, [https://beta.techcrunch.com/2016/05/16/instagrams-analytics-will-offer-audience-demographics-post-impressions-reach-more/?_ga=2.141467122.1134991809.1523478568-1924318621.1522084683]</ref><br />
<br />
======Follower Demographics======<br />
Follower demographics allows businesses to better understand their audience. Demographic details such as a follower's age, location (by country and city), and gender allow businesses of large and small scale to better time their post and cater their content to their consumers. In addition, the follower analytics section allows businesses to track the number of recent followers hourly and daily, allowing them to pinpoint which posts converted users into followers. <ref>"Instagram Analytics Will Offer Audience Demographics Post Impressions Reach & More" 16 May. 2016, [https://beta.techcrunch.com/2016/05/16/instagrams-analytics-will-offer-audience-demographics-post-impressions-reach-more/?_ga=2.141467122.1134991809.1523478568-1924318621.1522084683]</ref><br />
<br />
====Promote====<br />
The promote feature allows businesses to turn well-performing posts into advertisements within the Instagram application itself. Businesses can pick a post already featured on their Instagram page and add a button telling users to "take action". Instagram allows the business to select their target audience or let Instagram suggest an audience itself. After deciding on how long the ad will run and the budget spent on it, the post then becomes promoted as an advertisement.<br />
<ref>[https://business.instagram.com/blog/coming-soon-new-instagram-business-tools "Coming Soon: New Instagram Business Tools"].</ref><br />
=====Product Tagging=====<br />
One of Instagram's most recent business feature, product tagging, allows business profiles the ability to integrate an in-app shopping experience. This feature is currently only available to approved businesses in the United States, United Kingdom, Australia, Canada, France, Germany, Italy, Spain, and Brazil. Businesses can tag up to five products per image or twenty products per carousel, allowing consumers to shop directly within the app. Users have access to pricing and product details on the post itself and through the shop button on the business profile. From there, the user can click on the link provided on the post, forwarding them to the business's website where they can purchase the product.<ref>https://help.instagram.com/307876842935851/?helpref=hc_fnav&bc[0]=Instagram%20Help&bc[1]=Instagram%20for%20Businesses</ref><br />
<br />
====Other Platforms====<br />
<br />
'''Instagram.com Web Profiles''':<br />
Aside from Followgram.me, Instagram announced the release of Instagram profiles on the web in November of 2012. These web profiles feature a user's profile photo, bio, and a selection of their recently shared photographs. Through these profiles, you can like and comment on photos, edit your profile directly from the web, and follow other users. Each user's profile can be found by typing in their username in the search bar provided at the top of the page. If a user is private, you cannot see their web profile unless they accept you as a follower and you are logged on to Instagram. If a user's photos are set to public, any viewer who types their username into the browser will be able to see their profile. All photos a user has ever shared on Instagram can be accessed through their web profile. Currently, users cannot upload photos directly from the web, as Instagram focuses their application on uploading photos from mobile devices. The main goal of their web profiles is to make it easier for users to browse the shared content of their own content and the content of those they follow. <ref> [http://blog.instagram.com/post/35068144047/announcing-instagram-profiles-on-the-web Instagram.com Web Profiles] ''Instagram Blog'' 5. November. 2012. Web. 23. April. 2017. </ref><br />
<br />
== Ethical Concerns ==<br />
===Privacy===<br />
Instagram's privacy settings allow users to have a private or a public account. With a private account, a user must accept a friend request in order for their content to be seen by others. A public account allows anyone to follow their account and access their content. Users have permission to view posts and stories, in addition to performing activities like commenting and liking. If a user with a private account shares their photo to another social media site, such as Facebook or Twitter, the content will be visible to anyone on that social media network or anyone who has the permalink that accompanies the shared image. <ref name="instaprivacy">[https://help.instagram.com/196883487377501 "Privacy Settings & Information"] (Retrieved 23 April 2017).</ref> <br />
<br />
[[File: Instad.png|frame|App icon for Insta Download]]<br />
<br />
Many users, especially celebrities, have been susceptible to their Instagram accounts being hacked. This includes adding personal content from their phones as well as troll content; therefore spreading false information.<br />
<br />
===Stalking===<br />
Instagram's mapping feature has led to new privacy concerns. Geotagging picture locations share the user's location associated with his or her picture on the Instagram map. Privacy concerns take place when users do not want their home address or current location publicized on their Instagram profile, which can cause concerns such as stalking. Instagram uses [http://www.en.wikipedia.org/wiki/Foursquare Foursquare] for its geotagging feature, which in return taps into [http://en.wikipedia.org/wiki/Google_maps Google Maps]. <ref name=Kim>Holt, Kris.[http://www.dailydot.com/news/instagram-map-geotagging-privacy/ Geotagging and Privacy] ''Daily Dot'' 11. Dec. 2015. Web. 23. April. 2017</ref> An example of this ethical concern can be demonstrated by [http://www.iknowwhereyourcatlives.com I Know Where Your Cat Lives], which is a website that uses data from Instagram location tagging to display those Instagrams' and where the cat is located. The goal of the website was to encourage users to make their profiles private in order to prevent this potential stalking threat.<br />
<br />
Kim Kardashian West fell victim to this when she was in Paris on October 3rd, 2016. She was there for the biannual fashion week when a group of men broke into her room and held her at gunpoint. The men gagged her and tied her to the bed while they stole ten million dollars worth of jewelry from the celebrity. <ref name= 'Kim'/> Kim had taken multiple photos in the hotel room, some of which showing off the jewelry she had with her. While she did not geotag these pictures, they were easily recognizable by the hotel's iconic windows, giving the robbers information on her location. <ref>Buxton, Madeline. [http://www.refinery29.com/2016/10/125184/kim-kardashian-robbery-privacy-snapchat-instagram What Kim Kardashian's Robbery can teach us about Social Media Privacy ]. ''Refinery 29'' 4. October. 2016. Web. 23. April. 2016</ref><br />
<br />
===Security Research===<br />
In December 2015, a security researcher named Wesley Wineberg independently breached Instagram's servers. In November 2015, he reported to Facebook, owner of Instagram, about how he accessed internal data from Instagram servers such as passwords, private keys for encryption, as well as certificates. Earning him and another researcher $2,500 from Facebook as part of their bug bounty program. From these current findings, he probed further and found login credentials to access the digital storage units that Instagram used to store data. Once Wineberg released his new findings in December 2015, Facebook's security chief, Alex Stamos, threatened to file a lawsuit against Wineberg claiming that he violated Facebook's bug bounty program because he was potentially able to access personal user data. Wineberg claims that he followed the bug bounty program and was concerned that if he were able to successfully breach Instagram's systems, then an adversarial hacker could breach Instagram as well. While there was rhetoric from both sides, Wineberg exhibited his findings to Facebook and Facebook never filed a lawsuit against Wineberg. Since Wineberg's disclosure, Facebook announced that these bugs were fixed <ref name="insta"> "Researcher Finds 'Shocking' Instagram Flaws And Ends Up In A Fight With Facebook" Forbes. December 17, 2015. https://www.forbes.com/sites/thomasbrewster/2015/12/17/facebook-instagram-security-research-threats/#6c69daae2fb5 </ref> This raises the question about how far is too far in security research. Although the outcome was positive for Instagram users, the company was publicly embarrassed and credibility of Instagram was questioned by users. This raises questions whether it was appropriate for Facebook to restrict security research to protect user information. <br />
<br />
=== Copyright and Third Party Apps ===<br />
When a user posts a picture or video to Instagram, that piece of media is their personal property under copyright laws. The owner of the photo or video retains exclusive rights regarding its use, display, and distribution. Instagram's terms of use state that Instagram doesn't claim ownership of the content posted on its platform, which grants Instagram a non-exclusive, no-cost license to use the user's content that is subject to the private policy. This clause states that Instagram may sub-license its user's content to outside companies for a fee without providing any compensation to the user. <ref>Deslak, Craig. [http://www.nyccounsel.com/business-blogs-websites/who-owns-photos-and-videos-posted-on-facebook-or-twitter/ Who owns Instagram Content?] ''Law Offices of Craig Deslak'' 19. December. 2012. Web. 23. April. 2017</ref> Despite this loophole, Instagram does not allow users to download any content directly from the app or website due to copyright concerns. However, there are third-party apps and software that can be downloaded that circumvent this. Apps like [https://play.google.com/store/apps/details?id=com.originalgeek.instasave&hl=en Photo Saver] and [https://play.google.com/store/apps/details?id=com.znstudio.instadownload&hl=en Insta Download] allow users to bypass Instagram's copyright protocols and download and save any content from any user at will. This content then has the potential to be re-posted or circulated without the original poster's consent, further muddying how Instagram deals with copyright issues.<br />
<br />
=== Professional Photography ===<br />
According to Kate Bevan, a freelance writer for the UK's "The Guardian," many professional photographers believe the art of photography lies in the editing, not just capturing the picture. Some professional photographers feel that applications like Instagram are debasing genuine photography because simply adding a filter on a photograph degrades the integrity of the original picture.<ref>Bevan, Kate. [http://www.guardian.co.uk/technology/2012/jul/19/instagram-debasing-real-photography?INTCMP=SRCH Instagram is Debasing Photography]. ''The Guardian''. 19. July. 2012. Web. 23. April. 2017</ref> Others believe that Instagram standardizes the look of the photos because it offers nothing but basic filters and leaves minimal room for alterations. Rather than encouraging creativity, opponents feel it thwarts artistic ability.<ref>Burden. James [http://www.quora.com/Instagram/Why-do-real-photographers-hate-Instagram-so-much Why photographers hate Instagram ] ''Quora''. 22. March. 2012. Web. 23. April. 2017 </ref> Thus, there is a wide debate on whether or not popular applications such as Instagram that offer filtering and editing options cheat the photography game and more importantly professional photographers who make their living based on the artistic quality of their photography.<br />
<br />
Some professional photographers have suggested creating a professional version of Instagram for connoisseurs who wish to have more editing features.<br />
On the other hand, many people also believe the application has benefits. Due to the simplicity of the application, Instagram has managed to attract more people to photography by making it more accessible. Many photographers see Instagram as a practical on-the-go tool. Since professional cameras can sometimes be inconvenient to carry around, not to mention expensive, Instagram allows its user to capture pictures in spontaneous moments with their own handheld devices. This puts the power of photography, art, and creativity in the hands of people who normally would not have access to such an opportunity.<ref> Prives, Guy. [http://digital-photography-school.com/instagram-and-its-impact-on-the-world-of-photography How Instagram impacts Photography] ''Digital Photography School'' Retrieved December 4, 2012. Web. </ref><br />
<br />
=== Authenticity ===<br />
====Editing====<br />
As photos are the primary medium for Instagram, users want to have the most aesthetically pleasing pictures to get the most traction on their account. This often requires heavy editing, such as modifying the brightness of the original photo, adding filters, and changing the opacity of the photo. Small-scale edits are common in photography; however, the need for larger-scale editing is now so common that editing apps have been developed. For example, Facetune allows users to modify their appearance, such as making their nose appear smaller, eyes bigger, and face thinner.<ref>Keating, Lauren. [http://www.techtimes.com/articles/138731/20160420/facetune-vs-faceup-best-selfie-editing-app-ios.htm Facetune vs. BeautyPlus: The Best Selfie Editing App For iOS]. ''TechTimes Inc.'', 20 Apr. 2016. Web. Retrieved 23 Apr. 2017.</ref>. Users can also modify larger body parts, such as enlarging breast size and creating abs. This raises the question of authenticity and whether material being shared on photo sharing apps represent reality. Selfie-editing apps such as these often find such success on the market because many feel pressured to represent themselves in the best light possible, especially when it is uncertain how long their uploaded material will remain on the app or how long the impression it gives will last. <ref>Bosker, Bianca. [http://www.huffingtonpost.com/2013/12/05/selfie-instagram_n_4391220.html? New Selfie-Help Apps Are Airbrushing Us All Into Fake Instagram Perfection]. ''TheHuffingtonPost.com, Inc.'', 5 Dec. 2013. Web. Retrieved 23 Apr. 2017.</ref>.<br />
<br />
====Endorsements====<br />
As of late 2016, 32% of online adults reported using Instagram. Within that 32%, 38% were female while 26% were male. <ref>Greenwood, Shannon, Andrew Perrin, and Maeve Duggan.<br />
[http://www.pewinternet.org/2016/11/11/social-media-update-2016/ Social Media Update 2016], Pew Research Center: Internet, Science & Tech. ''Pew Research Center'', 11 Nov. 2016. Web. Retrieved 23 Apr. 2017.</ref>. With women, a lot of accounts are targeted towards bloggers, who show off their clothes and fashion accessories. Oftentimes, these bloggers are promoted by brands that pay them to wear certain clothing items and fashion accessories. Users do not realize the authenticity of the bloggers' lives and often splurge on the items the bloggers are wearing. However, it may be that the bloggers are being professionally dressed by others for the posted photo, and dress normally when without brand promotion.<br />
<br />
There have been many cases where brand influencers have not disclosed that their Instagram posts are paid placement. It goes against Federal Trade Commission's rules if brand influencers do not include #ad or #sponsored in their social media posts that they are getting paid for. <ref name="brandinfluencers">Coffee, Patrick. [http://www.adweek.com/brand-marketing/did-lord-taylors-hot-instagram-campaign-thumb-its-nose-ftc-disclosure-rules-163858/ "Did Lord & Taylor's Hot Instagram Campaign Thumb Its Nose at FTC Disclosure Rules?"] ''Adweek'' (3 April 2015. Retrieved 23 April 2017). </ref> Lord & Taylor received backlash when they sold out of a dress that 50 fashion influencers were wearing on Instagram. Lord & Taylor and the influencers never disclosed that it was a paid ad campaign. <ref name="brandinfluencers"/> The CEO of Izea, Ted Murphy, has said that while Instagram campaigns show the medium's power, the lack of disclosure by marketers may make it more of a norm. <ref name="brandinfluencers"/> "What are you legally required to do, and what's the right thing to do?" was stated by Murphy in terms of the two issues often involved in nondisclosure controversies. <ref name="brandinfluencers"/> The FTC does not always enforce its regulations. <br />
<br />
Many celebrities also promote products on Instagram and people have called into question their disclosure of sponsored content. The FTC has been planning on becoming more strict with its guidelines, also claiming that the #ad or #sponsored hashtags may not be strong enough indicators that the Instagram post is a paid advertisement. <ref name="bloomberg">Frier & Townsend. [https://www.bloomberg.com/news/articles/2016-08-05/ftc-to-crack-down-on-paid-celebrity-posts-that-aren-t-clear-ads "FTC to Crack Down on Paid Celebrity Posts That Aren't Clear Ads"] ''Bloomberg'' (5 August 2016. Retrieved 23 April 2017). </ref> Michael Ostheimer, a deputy in the FTC's Ad Practices Division, noted that the enforcements may make Instagram endorsements seem less authentic and therefore hurt the medium's marketing power for businesses. <ref name="bloomberg"/> <br />
<br />
In a recent April 2017 press release from the FTC, it was stated that they sent out more than 90 letters to influencers reminding them that they need to disclose their content as an advertisement and their affiliation with the brand. <ref name="ftc">[https://www.ftc.gov/news-events/press-releases/2017/04/ftc-staff-reminds-influencers-brands-clearly-disclose "FTC Staff Reminds Influencers and Brands to Clearly Disclose Relationship"] (19 April 2017. Retrieved 23 April 2017). </ref> The press release also included that the frequently used #sp, #partner, or thank you to a brand, is often still unclear to consumers that the accompanying post is a paid advertisement. <ref name="ftc"/><br />
<br />
====Followers====<br />
Some users choose to purchase followers through third-party apps. This is often motivated by the desire to have more followers on one's account, and subsequent increases in likes and comments, in order to appear more popular among one's social network on Instagram. Multiple celebrities or bloggers are presumed to have paid for followers as evidenced by dramatic increases in followers, comments, and likes, sometimes within a mere few hours <ref> Lieber, Chavie. [http://www.racked.com/2014/9/11/7577585/buy-instagram-followers-bloggers The Dirty Business of Buying Instagram Followers]. ''Racked''. 11, September, 2014. Web . 23. April. 2017</ref>. This raises ethical concerns related to authenticity in that these followers are not autonomous users who chose to follow the account, but rather they are purchased. Furthermore, this adds to the growing pressure on social media to appear popular on these social network sites.<br />
<br />
==="Finstas"===<br />
As Instagram has grown more popular and users have accumulated larger numbers of followers, some Instagram users, mainly teenage girls, have created "Finstagram" (short for fake Instagram) accounts, better known as "Finstas." These accounts are also known as "Sinstas" (short for second Instagram) accounts. A users main Instagram account is then referred to as a 'Rinsta", short for real Instagram. Finsta accounts aren't subject to the same norms usually present on social media, and users are able to share more personal photos with a smaller audience where the pressure to get a lot of likes is significantly lower. These kinds of accounts are typically set to “private,” making it difficult to identify their owners without first seeing the photos the account owner has posted. A finsta account is a place to share ugly or embarrassing photos, post about inside jokes, go on long rants, or post about anything that should not be seen in the public eye. <ref> [http://www.bewebsmart.com/social-media/instagram-social-media/what-is-a-finsta/ What is a Finsta?]. ''Be Web Smart'' 25. June. 2016. Web. 23 . April. 2017</ref><br />
<br />
Although Finsta accounts are intended for a smaller audience, Paul Booth, associate professor at DePaul University’s College of Communication, warns that users who have created Finstas still run the risk of the content they have created being leaked to the public. Booth noted, “Someone could also share it, or maybe a friend gets angry at you and sends it to everyone.” He continued, “You can also get hacked. Nothing that is online is ever private – that’s why it’s important to make sure everything you put online you’d be comfortable with your grandparents and teachers seeing.” <ref> Pennell, Julie. [http://www.teenvogue.com/story/how-teens-use-finsta-accounts-hide-on-social-media How Teens hide Finsta accounts] ''Teen Vogue''14. August 2016. Web. 23 . April. 201 </ref><br />
<br />
Younger users have also taken advantage of Finstas for the ability to post without judgment from their family members or educators. The National Cybersecurity Alliance released a study that found 60% of teen Internet users have created online accounts of which their parents were unaware. <ref>[https://kidsprivacy.net/2016/09/08/what-parents-need-to-know-about-finstaspam-accounts/ What Parents need to Know about Finsta Accounts]. 8. September. 2016. Web. 23. April. 2017</ref>The growing prevalence of Finsta accounts may be increasing this percentage, making it more difficult for parents to monitor their children’s social media usage and ensure that they are using it safely and responsibly.<br />
<br />
The New York Times warned that the creation of Finsta accounts may be indicative of adolescent insecurity and an increasing reliance on “likes” for self-validation. Finstas act as a vehicle to escape the pressure to get a lot of likes or to present a perfectly manicured self-portrayal online. <ref> Safronova, Valeriya. [https://www.nytimes.com/2015/11/19/fashion/instagram-finstagram-fake-account.html?_r=0 Fake Instagram as a chance to be real] ''New York Times'' 18. November 2015. Web. 23. April. 2017 </ref><br />
<br />
=== Nudity ===<br />
In the Terms of Use section on Instagram, it explicitly prohibits the posting of nude, partially nude, or sexually suggestive photos.<ref>[http://instagram.com/about/legal/terms/ Instagram: Terms of Use] ''Instagram'', Retrieved on 23 April 2017.</ref> However, porn sites and spammers maliciously use hashtags to gain a presence on Instagram and spam posts of inappropriate content. Since there is no way to flag inappropriate comments, the only way to rid these spammers is to delete their accounts. In spite of this, spammers are quick to repost images under newly created accounts while Instagram is unable to keep up with deleting the new accounts, consequently struggling to prevent the problem.<ref>Howie, Jason A. [http://aptsonic.com/instagram-facebooks-newest-porn-problem/ Instagram: Facebook’s newest Porn Problem], ''Aptsonic'', 14 June 2012.</ref><br />
As a result of the nudity clause, popular photographer [[Wikipedia:Daniel Arnold|Daniel Arnold]] was blocked out of Instagram after posting a photo of topless women. Instagram stated that even though he considered the nudity to be art, it violated their policy of use.<ref>Chen, Adrian. [http://gawker.com/5927104/the-best-photographer-on-instagram-got-banned-for-posting-boobs The Best Photographer on Instagram Got Banned for Posting Boobs], Gawker, 18 July 2012.</ref><br />
<br />
'''Free the Nipple''':<br />
Due to censorship issues surrounding the differences between female and male nudity, people identifying as women break rules outlined in Instagram's guidelines. While this is considered to be graphic content for women, men on Instagram are allowed to post images with their nipples showing. Their policies surrounding the appropriateness of certain nude images states "It also includes some photos of female nipples, but photos of post-mastectomy scarring and women actively breastfeeding are allowed". <ref>[https://help.instagram.com/477434105621119/ Community Guidelines], ''Instagram'', Retrieved 24 April 2016 </ref> This raises questions about consistency in enforcing their policies and how they define nudity. The exception of post-mastectomy scarring and active breastfeeding also represent Instagram's openness to certain kinds of nudity which is considered appropriate. Celebrity advocates include Miley Cyrus, Rihanna, and Caitlin Stasey, who publish content surrounding the issue. In a public statement, CEO Kevin Systrom explicitly referenced Apple's policies and standards concerning nudity. To remain available for download on Apple devices, the application must abide by Apple's rules.<ref>Friedman, Megan. [http://www.marieclaire.com/culture/news/a16199/instagram-nudity-free-the-nipple/ Instagram Finally Explains Why It Won't #FreetheNipple], 05 October 2015. Retrieved 24 April 2016.</ref><br />
<br />
In October 2014, comedienne Chelsea Handler protested Instagram's nudity policy by posting a topless photo of her side-by-side with Vladimir Putin. She mimicked a photo of Putin shirtless on a horse and appeared topless on a horse in her own photo. Instagram removed the photo, and she called the app "sexist" on Twitter when she tweeted the photo and said, "Taking this down is sexist. I have every right to show I have a better body than Putin." Twitter did not remove her photo. <ref>[http://www.hollywoodreporter.com/news/chelsea-handler-posts-topless-pic-745446 Chelsea Handler Posts Topless Pic in Protest of Instagram Policy]. ''The Hollywood Reporter'', 31 October 2014. Web. 23 Apr. 2017.</ref> She continued with her backlash by tweeting, "If a man posts a photo of his nipples, it's ok, but not a woman? Are we in 1825?"<ref>Handler, Chelsea. [https://twitter.com/chelseahandler/status/528002042498146304?ref_src=twsrc%5Etfw Chelsea Handler Tweet], 30 October 2014.</ref> She continued to speak out against Instagram in 2015 by posting a number of partially-nude photos that were eventually deleted by the app.<ref>Dicson, EJ. [http://www.dailydot.com/entertainment/chelsea-handler-nipple-instagram/ Chelsea Handler furthers Instagram-censorship fight with new topless photos], 29 December 2014</ref><br />
<br />
=== Spam ===<br />
Instagram has become notorious for spam-based accounts where users are spammed with generic comments asking them to go to external websites. Users are asked to report the comments and then delete them. Instagram has stated that they tackle spam every day and are trying to improve the app for users.<ref>Shetty, Anuradha. [http://tech2.in.com/news/general/instagram-promises-to-tackle-spam/631622 Instagram Promises to Tackle Spam] ''Tech2.in.com'', 10 December 2012.</ref> However, this spam problem is tedious and frustrating for the app's regular users to deal with. Currently, Instagram is still suffering heavily from spam accounts; a 2015 research study by a group of Italian security analysts found that about 30% of Instagram accounts are inactive and an estimated 8% of the total accounts behave like automated spam bots.<ref>Ingram, Matthew. [http://fortune.com/2015/07/02/instagram-fraud-spam/ Instagram has a problem it needs to solve if it wants to be an ad platform], ''Fortune'', 02 July 2015. Web. 23 Apr. 2017.</ref> There is a huge "follower economy" where people make money by using thousands of fake accounts to like content and follow other accounts. Instagram users can purchase thousands of followers and likes at bundle prices, such as 1000 followers for $5.<ref>Price, Shayla. [http://www.huffingtonpost.com/shayla-r-price/big-business-buying-fake_b_6322362.html Big Business: Buying Fake Instagram Followers], ''TheHuffingtonPost.com, Inc.'', 14 December 2014. Web. 23 Apr. 2017.</ref><br />
<br />
This is a large ethical issue because the business of selling bot followers and likes is legally murky and violates Instagram's terms of use. It also poses ethical concerns for users who build up their following organically; account users using the money to purchase the appearance of popularity could be perceived as 'cheating'. The reputations of celebrities, companies, or politicians may be harmed if the public finds out they are artificially boosting their Instagram presence and impact via bots. Some hotels actually offer free rooms and other free services to Instagram users who have enough followers, which also raises ethical concerns because some people might exploit the system by using the black market of spam bots.<ref>Newman, Lily Hay. [http://gizmodo.com/people-with-10k-instagram-followers-stay-free-in-this-h-1318364597 People With 10k Instagram Followers Stay Free In This Hotel], ''Gizmodo'', 15 September 2013.</ref> Instagram is also a place for heavy advertising to occur, but the existence of automated spam bots obscures the quality of Instagram's advertising capabilities.<br />
<br />
===Cyberbullying===<br />
Harassment is a significant problem on most social media platforms. On Instagram, users can post embarrassing photos of other users, post rude comments under another user’s photo, and tag users in public photos.<ref>(2013). “Cyberbullying on Instagram”. Cyberbullying Research Center. Retrieved 23 April, 2017, from http://cyberbullying.org/cyberbullying-on-instagram</ref> In 2016, Instagram introduced several new features aimed at alleviating cyberbullying on the platform. Users are now able to disable comments, “like” comments, and remove followers from private accounts.<ref name=features>Wiggers, K. (2016). “Instagram Rolls Out New Features in an Effort to Combat Cyberbullying”. Digital Trends. Retrieved 23 April, 2017, from http://www.digitaltrends.com/mobile/instagram-anti-abuse-tools/</ref> These features are meant to promote positivity and reduce the presence of negative content and problematic users from the platform.<ref name=features/> Users can also take advantage of Instagram’s new filtering tool, which allows for the hiding of particular words and phrases that an individual user doesn’t want to see in their comments.<ref name=comments>Heath, A. (2016). “Instagram has a new way to keep you from seeing offensive comments”. Business Insider. Retrieved 23 April, 2017, from http://www.businessinsider.com/instagram-lets-you-hide-inappropriate-comments-2016-9</ref> The feature was primarily made available to business and celebrities, but Instagram quickly implemented the feature for all users to promote a more positive culture on their platform: “‘To empower each individual, we need to promote a culture where everyone feels safe to be themselves without criticism or harassment.’”<ref name=comments/><br />
<br />
=== Hashtag Bans ===<br />
In 2015, Instagram banned a certain number of hashtags by making certain terms unsearchable. Users could still use the hashtags, but they were rendered useless because no other users could find the photos through those tags. Most notably, they banned the hashtag "#curvy," which had been used to celebrate body positivity among many female users. An Instagram rep explained that they banned the term because it was being used to share content that violated the site's community guidelines around nudity.<ref>Whelan, Nora. [http://www.buzzfeed.com/norawhelan/curvy-is-a-banned-search-term-on-instagram?bffbstyle&utm_term=.kkAM4reMP#.smQP0BzP9 Instagram Has Banned #Curvy As A Search Term]. ''Buzzfeed'', 14 Jul. 2015. Web. 23 Apr. 2017.</ref> Many users were upset with this ban since it targeted a certain body type. Ultimately, Instagram reversed the ban for this particular hashtag.<ref>Brouswell, Lauren. [http://www.cio.com/article/2969838/social-networking/why-instagram-started-banning-hashtags-and-why-its-a-bad-idea.html Why Instagram started banning hashtags (and why it's a bad idea)]. ''IDG Communications'', 12 Aug. 2015. Web. 23 Apr.<br />
2017.</ref> However, there are some hashtags that are still banned (especially relating to sex, drugs, or illegal activity).<ref>Edwards, Jim.<br />
[http://www.businessinsider.com/banned-instagram-hashtags-2013-8#ixzz2k4Eh7M1X These 12 Banned Hashtags Tell Us What Instagram Is Afraid Of Becoming]. ''Business Insider'', 27 Aug. 2013. Web. 23 Apr. 2017.</ref> These hashtag bans serve as a way for the company to impose its set of views and ideas on its users while enforcing a particular set of values and inherently passing judgment on particular terms.<br />
<br />
=== Incrimination ===<br />
The popularity of posting pictures and videos on Instagram of one's possessions and extravagant vacations has led to incrimination. Investigators commonly follow their subjects on social media to track their spending and potentially illegal activity <ref> Kibs, Kate. [http://www.digitaltrends.com/social-media/the-new-inside-source-for-police-forces-social-networks/ In the online hunt for criminals, social media is the ultimate snitch]. ''Digital Threads''. 13 July 2013. </ref>. For instance, after actor and rapper 50 Cent declared bankruptcy and shortly thereafter posted a picture of him surrounded by stacks of $100 bills, he received a court summons to explain the situation. In other cases, federal agents have used Instagram posts as evidence for fraud. For instance, children of wealthy individuals under investigation have incriminated their families of fraud and tax evasion by means of posting purchases or undocumented assets on the platform <ref> Knapton, Sarah. [http://www.telegraph.co.uk/news/2016/04/03/super-rich-caught-out-by-childrens-instagram--accounts/ Super-rich caught out by children’s Instagram accounts]. ''The Telegraph''. 3 April 2016. </ref>. In December 2013, a Florida man was charged with 142 felonies after investigators found incriminating evidence on Instagram containing illegal guns, drugs, and money. He had been under investigation for theft, and police were able to fortify his involvement in the case using this evidence <ref> Taylor, Victoria. [http://www.nydailynews.com/news/crime/man-instagram-leads-142-felony-charges-article-1.1547932 Florida man's Instagram photos lead to 142 felony charges]. ''New York Daily News''. 14 Dec. 2013. </ref>.<br />
<br />
== Controversies ==<br />
''Wealthy Kids Stir Up Controversy''<br />
In April 2012, trending habits among wealthy teens on Instagram sparked an online controversy, resulting in harsh criticism from the media and community. Wealthy kids used special hashtags to designate images that revealed their family's assets. These images were all edited with a gold frame surrounding the image. The collection of photos were assembled and posted to a popular blogging site, Tumblr, under the title "Rich Kids Of Instagram." The online community responded to these images with hateful messages and tweets.<ref>Imperatore, Tara.<br />
[http://www.justluxe.com/luxe-insider/trends/feature-1815082.php Disturbing or Expected? Wealthy Teens Stir Up Instagram Controversy], Luxe Inside/News & Trends. ''JustLuxe'', 22 Aug. 2012. Web. 23 Apr. 2017.</ref><br />
<br />
The 'Rich Kids of Instagram' inspired E! to create a reality television show based on them called '#Rich Kids of Beverly Hills.' It chronicled their luxurious lives and centered around their obsession with social media. The show has had mixed reviews. It has been criticized for promoting a materialistic lifestyle.<br />
<br />
In 2017, California teenager, Obdulia Sanchez, was on Instagram, live-streaming while driving with her younger sister, Jacqueline Sanchez. Sanchez was live streaming the drive when her car swerved and her sister, Jacqueline, was ejected out of the window, killing her. After the crash, Sanchez continued to film her sister's death on Instagram, which someone saved and shared before it was deleted. In a PS section of a letter, justifying her actions, Sanchez claimed, "I made that video because I knew I had more than 5K followers. It was the only way my sister would get a decent burial." <ref> Dailymail.com, Valerie Edwards For. [http://www.dailymail.co.uk/news/article-5369531/Teen-livestreamed-sisters-death-gets-6-years-jail.html “Girl, 19, Is given Six Years in Prison for Killing Her Sister, 14, in Horror Car Crash She Livestreamed While Drunk behind the Wheel.”] Daily Mail Online, Associated Newspapers, 8 Feb. 2018.<br />
</ref>. As of February 8, 2018, Sanchez has been guilty of gross vehicular manslaughter, DUI and child endangerment. The DUI came from Sanchez's reported 0.1% BAC at the time of the crash. She has been sentenced to six years with a maximum punishment of 12 <ref> Horton, Alex, and Cleve R. Wootson Jr. [http://www.washingtonpost.com/news/true-crime/wp/2018/02/09/i-killed-my-sister-okay-teen-who-live-streamed-fatal-crash-is-sentenced-to-prison/?noredirect=on&utm_term=.345f33150ee3 “'I Killed My Sister, Okay?': Teen Who Live-Streamed Fatal Crash Is Sentenced to Prison.”] The Washington Post, WP Company, 9 Feb. 2018. </ref>.<br />
<br />
==See Also==<br />
{{resource|<br />
*[[Facebook]]<br />
*[[Twitter]]<br />
*[[Pinterest]]<br />
*[[Tumblr]]<br />
*[[Social Networking]]<br />
*[[Privacy in Social Networking]]<br />
}}<br />
<br />
== External Links ==<br />
{{resource<br />
|*[http://instagram.com/instagram Instagram's Official Website]<br />
*[https://twitter.com/instagram Instagram on Twitter]<br />
}}<br />
<br />
==References==<br />
{{resource|<br />
<references/><br />
}}<br />
[[category: Websites]]<br />
[[Category: Media Content]]<br />
[[Category: Social Media]]<br />
<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Clickbait&diff=71661Clickbait2018-04-16T20:30:19Z<p>Hillcm: </p>
<hr />
<div>[[File:Clickbait6.jpg|thumbnail|Examples of clickbait headlines on the side of a website.]]<br />
'''Clickbait''' refers to web content designed to entice its readers into clicking an accompanying link. Josh Benton of Harvard’s Neiman Journalism Lab defined clickbait more colloquially as things not liked on the Internet, demonstrating the negative connotation associated with the term. <ref> It's Everywhere, the Clickbait https://www.theatlantic.com/entertainment/archive/2014/11/clickbait-what-is/382545/ </ref> Clickbait frequently appears in journalism and social media sites in the form of short teaser messages or images designed to attract attention. Its primary goal is to generate advertisement revenue especially through striking images and enticing headlines.<ref name="pot">Potthast, Martin; Köpsel, Sebatian; Stein, Benno; Hagen, Matthias (2016). ClickBait Detection Bauhaus-Universität Weimer</ref> Clickbait often encourages users to click on a link by withholding certain information about the article it links to. Often the landing pages of such links are composed of [[Fake News | fake news]] or opinion pieces without supporting research or evidence.<ref name="TWP">The Washington Post website: "What is ‘click bait’ and why Facebook wants to display less of it" https://www.washingtonpost.com/news/technology/wp/2014/08/26/what-is-click-bait-and-why-facebook-wants-to-display-less-of-it/?utm_term=.eccfff2e28b8</ref><ref >Tech Crunch: "*** is a clickbait "https://techcrunch.com/2016/09/25/wtf-is-clickbait/"</ref> Clickbait headlines are intriguing and bring readers in just enough to want to click on the link. Because online media outlets rely heavily on page views to generate ad revenue, clickbait is often used to artificially inflate ad impressions. <ref name="ch"> Chakraborty, Abhijnan; Paranjape, Bhargavi; Kakarla, Sourya; Ganguly, Niloy (2016). Stop Clickbait: Detecting and Preventing Clickbaits in Online News Media Cornell University Library</ref><ref >The dirty secrets of clickbait. This post will blow your mind! "https://econsultancy.com/blog/64399-the-dirty-secrets-of-clickbait-this-post-will-blow-your-mind/"</ref> Mainstream usage of clickbait has been criticized for misleading users and lowering quality standards in journalism.<br />
<br />
==History==<br />
<br />
[[File:Cnn clickbait.png|thumbnail| Clickbait headline taken from CNN's Twitter feed]]<br />
<br />
[[File:early.jpg|thumbnail| Clickbait in early 19th century.[http://io9.gizmodo.com/a-history-of-clickbait-the-first-100-years-1530683235]]]<br />
<br />
Prior to the term clickbait being used, sensationalist headlines were used to amass an audience as early as the 19th century, where political cartoons were displayed to attract the attention of the readers. Similar tactics were also present in early 19th century journalism where provocative newspaper headlines competed for attention. <ref>A History of Clickbait: The First 100 Years http://io9.gizmodo.com/a-history-of-clickbait-the-first-100-years-1530683235</ref> The emergence of clickbait in [https://en.wikipedia.org/wiki/Tabloid_journalism tabloid journalism] <ref name="ch">Chakraborty, Abhijnan; Paranjape, Bhargavi; Kakarla, Sourya; Ganguly, Niloy (2016). Stop Clickbait: Detecting and Preventing Clickbaits in Online News Media Department of Computer Science and Engineering Indian Institute of Technology Kharagpur, India</ref> as well as its success in rousing interest have put pressure on [https://en.wikipedia.org/wiki/Old_media legacy media] due to competition for readers and revenue.<ref name="PBS">PBS website: "Column: Why click-bait will be the death of journalism" http://www.pbs.org/newshour/making-sense/what-you-dont-know-about-click-bait-journalism-could-kill-you</ref> Many research studies have been conducted to understand the psychological appeal of clickbait, leading to empirical methods for identifying it.<br />
<br />
==Backlash==<br />
<br />
===Facebook===<br />
<br />
In response to the spread of clickbait, Facebook has made efforts to improve news feed algorithms to help its users find content that is interesting and relevant by weeding out the clickbait-esque material that often frustrate users.<ref name="TWP">The Washington Post website: "What is ‘click bait’ and why Facebook wants to display less of it" https://www.washingtonpost.com/news/technology/wp/2014/08/26/what-is-click-bait-and-why-facebook-wants-to-display-less-of-it/?utm_term=.eccfff2e28b8</ref> In 2014, Facebook altered their newsfeeds to understand how long users spent on certain posts and articles that have intriguing titles. With this research, Facebook penalized publishers who used 'click-bait' titles to lure users into clicking on their articles. <ref> https://www.theguardian.com/technology/2016/aug/04/facebook-clickbait-algorithm-change-newsfeed</ref> Facebook penalized these publishers by placing their posts at a lower on newsfeeds to receive less attention from users. Facebook has attempted to remove clickbait by measuring the click-to-share ratio of links<ref name="ch">Chakraborty, Abhijnan; Paranjape, Bhargavi; Kakarla, Sourya; Ganguly, Niloy (2016). Stop Clickbait: Detecting and Preventing Clickbaits in Online News Media Department of Computer Science and Engineering Indian Institute of Technology Kharagpur, India</ref>, identifying phrases that are commonly used in clickbait headlines,<ref name="Facebook">Facebook newsroom website: "News Feed FYI: Further Reducing Clickbait in Feed"http://newsroom.fb.com/news/2016/08/news-feed-fyi-further-reducing-clickbait-in-feed/</ref> <ref >engadget: "Facebook is ramping up its fight against clickbait"https://www.engadget.com/2016/08/04/facebook-is-ramping-up-its-fight-against-clickbait/</ref> and identifying clickbait by measuring the amount of time that the user spend on the website after clicking the link. <ref name="TWP">The Washington Post website: "What is ‘click bait’ and why Facebook wants to display less of it" https://www.washingtonpost.com/news/technology/wp/2014/08/26/what-is-click-bait-and-why-facebook-wants-to-display-less-of-it/?utm_term=.eccfff2e28b8</ref> Other scholars have also developed clickbait detection models and extensions to further help decrease how often they appear<ref name="pot">Potthast, Martin; Köpsel, Sebatian; Stein, Benno; Hagen, Matthias (2016). ClickBait Detection Bauhaus-Universität Weimer</ref><ref name="ch">Abhijnan Chakraborty, Bhargavi Paranjape, Sourya Kakarla, Niloy Ganguly (2016). Stop Clickbait: Detecting and preventing clickbaits in online news media IEEE Xplore Digital Library</ref> as well as developing tools for analyzing news sources in order to distinguish real and fake news. <ref>"False, Misleading, Clickbait-y, and Satirical “News” Sources" https://d279m997dpfwgl.cloudfront.net/wp/2016/11/Resource-False-Misleading-Clickbait-y-and-Satirical-%E2%80%9CNews%E2%80%9D-Sources-1.pdf</ref><br />
<br />
===YouTube===<br />
<br />
In order to combat clickbait thumbnails and video titles, YouTube has incentivized content creators to accumulate watch time rather than views. An editor from DIY Musician explains that YouTube views are easily counted by misleading thumbnails, so their new way of measuring is to count the total amount of time a video is watched. <ref>The importance of watch time and subscribers to your YouTube Channel. DIY Musician. Jun 23, 2015. Web. Apr 7, 2017. http://diymusician.cdbaby.com/youtube/the-importance-of-watch-time-and-subscribers-to-your-youtube-channel/</ref><br />
<br />
<br />
==Types==<br />
<br />
===Exaggeration===<br />
Extreme exaggeration of what the content on the landing page will be.<br />
<br />
<pre>Example: Cringeworthy tattoos that will destroy your faith in humanity</pre><br />
<br />
<br />
===Teasing===<br />
The omission of important details from title to build suspense.<br />
<br />
<pre>Example: “Here’s Why Hillary Clinton Is ‘Deeply Worried’ About The UN’s Damning Climate Report”</pre><br />
<br />
<br />
===Inflammatory===<br />
Usage of inappropriate/vulgar words and misleading phrasing.<br />
<br />
<pre>Example: Putin Punched at G20 Summit.</pre><br />
<br />
<br />
===Formatting===<br />
Overuse of capitalization/punctuation, particularly ALL CAPS or exclamation points.<br />
<br />
<pre>Example: EXCLUSIVE: Top-Secret Method allowed a mother to break the world record: 12kg in 4 weeks!</pre><br />
<br />
<br />
===Graphic===<br />
Salacious, disturbing, overly descriptive, or unbelievable subject matter.<br />
<br />
<pre>Example: Donatella Versace plastic surgery overload: Waxy face resembles melting candle.</pre><br />
<br />
<br />
===Bait-and-switch===<br />
A title that lies about content promised/implied to be on the landing page/article; often requires additional clicks to find intended information or is completely missing from the article.<br />
<br />
<pre>Example: Beers Americans No Longer Drink.</pre><br />
<br />
<br />
===Ambiguous===<br />
Unclear or confusing title to spur curiosity.<br />
<br />
<pre>Example: Hands on: Samsung’s iPhone 5 is absolutely beautiful.</pre><br />
<br />
<br />
===Wrong===<br />
Factually incorrect article title.<br />
<br />
<pre>Example: Scientist Confesses: “Global Warming a $22 Billion Scam/center"</pre><br />
<br />
<br />
===Hubris===<br />
Articles that entice by challenging intelligence<br />
<br />
<pre>Example: Can you solve this easy riddle? 95% of people get it wrong!</pre><br />
<br />
==BuzzFeed==<br />
Internet media company, [[Wikipedia:Buzzfeed|Buzzfeed]], has often been criticized for employing the useful articles. In 2014, they released an article, [https://www.buzzfeed.com/bensmith/why-buzzfeed-doesnt-do-clickbait?utm_term=.vt52NQ3rP#.wkZEQKWkR Why Buzzfeed Doesn't Do Clickbait], explaining why they do not use the clickbait tactic. Several articles have been released, refuting this statement. According to this [http://keyhole.co/blog/buzzfeed-clickbait/ article], 63% of Buzzfeed's content falls into the clickbait category, defined as content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page by the Oxford dictionary. <ref> http://keyhole.co/blog/buzzfeed-clickbait/. Retrieved 10 April 2018. </ref><br />
A popular portion of the content provided by Buzzfeed is the Buzzfeed quiz. An example of some quizzes are [https://www.buzzfeed.com/jamedjackson/everybody-has-a-cardi-b-song-that-matches-their-personality?origin=filqui&utm_term=.cwvZDka9x#.jv99YlezR We'll Tell You What Cardi B Song You Are Based On These 6 Questions] and [https://www.buzzfeed.com/salmasaadeldeen/choose-some-celebs-as-your-friends-when-you-go-to-2s5yx?origin=filqui&utm_term=.nyjpqLyWA#.dawVR3Nrw Choose Seven Celebs To Go To College With And We'll Reveal Your Best Trait]. The sole purpose of contents like these are to get the audience to click on these quizzes, once the user clicks the quiz, it is redirected to the Buzzfeed main site where it has news articles and videos alongside additional entertainment. After Buzzfeed experienced a rise in popularity due to the quizzes, news outlets such as the New York Times began to do this as well. Many critics of Buzzfeed do not consider it "real news" and believe that it is the most avid employer of the click bait tactic.<br />
<br />
==Ways to prevent it==<br />
<br />
===Google Chrome===<br />
Stop ClickBait is an application offered through Google Chrome's services. Users can download this application on Google Chrome. This extension service works on many websites to identify clickbait posts and articles to prevent users from clicking on them. When the program sees a clickbait post, it will notify the user. This service also allows users to block clickbait content that they have come across once and do not want to see again. When browsing websites, users have the option to report thinks that they think are clickbait to the service for future references. Along with this reporting feature, users can suggest when a link has been misreported as clickbait. <ref> https://chrome.google.com/webstore/detail/stop-clickbait/iffolfpdcmehbghbamkgobjjdeejinma?hl=en</ref><br />
<br />
==Ethical concerns==<br />
Clickbait headlines typically aim to take advantage of viewers curiosity.<ref >Curiosity Has the Power to Change Behavior for the Better "http://www.apa.org/news/press/releases/2016/08/curiosity-behavior.aspx"</ref><ref>Wikipedia: Clickbait https://en.wikipedia.org/wiki/Clickbait</ref> These headlines are aimed at manipulating the emotions of the user. Users often report falling for clickbait content as a negative experience. The presence of clickbait in social media has also increased occurrences of fake news. Some have argued that a significant proportion of social media users are uneducated on how to distinguish fake news sources from genuine news sources, which in turn create [https://en.wikipedia.org/wiki/Filter_bubble filter bubbles] of misinformed users. <br />
<br />
===Negative experiences===<br />
Negative experiences are created when the user encounters a clickbait and has high expectations than what the article contains.<ref name="Clicks">Prakhar Biyani; Kostas Tsioutsiouliklis; John Blackmer (2016). “8 Amazing Secrets for Getting More Clicks”: Detecting Clickbaits in News Streams Using Article Informality Yahoo Labs</ref><ref >The Ethics of Clickbait "http://wegobusiness.com/the-ethics-of-clickbait/"</ref>. Clickbaits rely on emotions to attract viewers and often create headlines that cause anger, anxiety, humor, excitement, inspiration, or surprise.<ref> You’ll Be Outraged at How Easy It Was to Get You to Click on This Headline "https://www.wired.com/2015/12/psychology-of-clickbait/"</ref> Upon visiting the article, many people report finding the content disappointing because of low-quality writing and/or content that does not correspond to the title. Clickbait can also lead to frustration because of their frequency of occurrence on news feeds.<br />
<br />
===Fake news and misinformed users===<br />
<br />
''Main article: [[Fake News | Fake News]]''<br />
<br />
People are now using [https://en.wikipedia.org/wiki/Social_media social media] as their only way of acquiring news and many people do not know how to adequately identify genuine news sources <ref>"How We Broke Democracy" https://medium.com/@tobiasrose/empathy-to-democracy-b7f04ab57eee#.ocvg9cr5u</ref> making them vulnerable to believing click baits when they encounter one. Clickbait often take bits of true stories but insinuate and make up other details to make the users react to them and their success is due to the large amounts of views and shares they receive. Clickbait is often hard to distinguish from real news sources because their format is manipulated to resemble credible journalism. Clickbait is notorious for spreading misinformation<ref>Click Bait Websites and the Age of Misinformation "https://jordandetmers.com/2014/09/11/click-bait-websites-and-the-age-of-misinformation/"</ref> and if users believe the content of the clickbait chances are they are going to share it with their own network. This further popularizes the clickbait and presents it to a larger number of users who could do the same, creating filter bubbles of misinformed users <ref>Forget Facebook and Google, burst your own filter bubble http://www.digitaltrends.com/social-media/fake-news-and-filter-bubbles</ref> who are often not educated on how to distinguish fake from real news sources.<br />
<br />
Some sites dedicate themselves to sharing blatantly fake news stories, like The Onion<ref>[www.theonion.com|"The Onion"]. Retrieved on 20 April 2017.</ref> and ClickHole<ref>[www.clickhole.com|"ClickHole"]. Retrieved on 20 April 2017.</ref>. These sites are satirical, but neither of their home pages is clearly marked as such. Their headlines are notorious for clickbait. They also have the tendency to write articles that keep up with world events, so it is easy for sites such as these to be mistaken for credible news sites. This is dangerous for people who do not know that these sites are satire or for people who do not take the time to research their news before believing it, citing it or sharing it online with friends and followers.<br />
<br />
===Content Management===<br />
Clickbait takes up the space that can be filled with content relevant to the original intent of the user going to the given webpage. The same space could be filled with educational articles and posts that would allow readers to learn about new topics and be more aware of worldwide current events. The content that could otherwise be displayed would provide a more enriching experience to the user going to the website due to its relevancy to the users original topic of search. However, our paradigm of website monetization demonstrates our view on creating revenue online through clickbait, targeting advertising and other similar methods of revenue generation. This is opposed to creating donation based websites where the content users see would not include clickbait.<br />
<br />
==See Also==<br />
*[[Fake News]]<br />
<br />
==References==<br />
<references/></div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Spotify&diff=71653Spotify2018-04-16T20:27:52Z<p>Hillcm: </p>
<hr />
<div>{{SoftwareInfoBox<br />
|HEIGHT=520<br />
|NAME=Spotify<br />
|LOGO=spotify1.png<br />
|SCREENIMAGE=SpotifyDes.jpg<br />
|CAPTION=Spotify Compatible Devices <br />
|IMAGEURL=https://www.spotify.com<br />
|TEXT=site<br />
|PLATFORM=Cloud Service, iOS App, Android, Windows, Mac OS X <br />
|PRODUCT=Spotify<br />
|TYPE=Online Radio <br />
|SITEURL=http://spotify.com<br />
|URLTEXT=www.spotify.com<br />
|STATUS=Active<br />
|LAUNCH=2006 <ref name = "wiki"/><br />
}}<br />
<br />
'''Spotify,''' formally known as Spotify Technologies (NYSE: SPOT), is an online music streaming service that enables users to listen to full-length tracks from a variety of major record labels and artists. Founded in 2006 in Sweden and later launched in 2008, Spotify garnered a following and eventually launched in the United States in July of 2011, partnering with [[Wikipedia:Sony Music Entertainment|Sony Music Entertainment]], [[Wikipedia:EMI Group|EMI Group]], [[Wikipedia:Warner Music Group|Warner Music Group]], [[Wikipedia:Universal Music Group|Universal Music Group]], [[Wikipedia:Merlin Network|Merlin Network]], and The Orchard. Spotify was designed primarily as a desktop application, similar to [[Wikipedia:Apple Inc.|Apple Inc.]]'s [[Wikipedia:iTunes|iTunes]] in terms of functionality, but also provides mobile application support for iOS and Android devices. Spotify is a [https://en.wikipedia.org/wiki/Freemium freemium] service that allows its users to listen to full-length tracks or create music playlists without individual purchase. Users can also view their Facebook friends' playlists and share their own playlists.<ref name = "Spotify: About">Spotify. [http://www.spotify.com/us/about-us/press/information/ "About us."] Retrieved on 16 April 2016.</ref> The platform itself has presented ethical dilemmas regarding non-transparency of terms and conditions as well as a data breach that exposed the personal information of millions of users.<br />
<br />
==History==<br />
Spotify was founded in April 2006 by [[Wikipedia: Daniel Ek|Daniel Ek]] and [[Wikipedia: Marin Lorentzon|Martin Lorentzon]] in Stockholm, Sweden. The website was launched for public access on October 7th, 2008. Select users were given free accounts and could invite a limited number of other users to create accounts. The general public in the United Kingdom could open accounts, specified as Spotify Open accounts, without invitations beginning in February 2009. However, due to the unanticipated surge in new accounts, Spotify had to limit registration to "by invitation only" again. On April 14th, 2011, Spotify announced a change in the amount of music Spotify Open and Spotify Free users could stream, where Spotify Free users were able to stream unlimited hours of music for the first six months of their membership.<ref> White, Jer.[http://pansentient.com/2011/06/spotify-free-vs-spotify-open/ "Spotify Free vs. Spotify Open."] in 2011. Retrieved on 16 April 2016.</ref> Spotify was not launched in the United States until July 14, 2011, and now requires new users to sync their account with their Facebook account.<ref name = "wiki">[http://en.wikipedia.org/wiki/Spotify/ Spotify on Wikipedia]</ref> Spotify is also available as a downloadable app for [[Wikipedia:iPhone|iPhone]] and [[Android]] mobile access. Spotify was valued at $1 billion in February 2011 and rose to $3 billion by November 2012.<ref> Sorkin, Andrew Ross and Rusli, Evelyn M. [http://dealbook.nytimes.com/2011/02/21/spotify-raises-new-investments-at-1-billion-valuation/ "Spotify Raises New Investments at 1 Billion Valuation."] 21 February 2011. Retrieved on 16 April 2016.</ref><ref>Bradshaw, Tim. [http://www.ft.com/intl/cms/s/e11c1344-2e98-11e2-9b98-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2Fe11c1344-2e98-11e2-9b98-00144feabdc0.html&_i_referer=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSpotify#axzz2CIUrzHHC/ "Spotify in Top League with $3bn valuation."] 15 November 2012. Retrieved on 16 April 2016.</ref> In December 2012, Spotify had 20 million users, of which 5 million were paying users. Of these paying users, 1 million were located in the United States<ref>O'Brien, Terrence. [http://www.engadget.com/2012/12/06/spotify-doubles-user-base-in-last-year-1-million-paid-subscribe/ "Spotify doubles user base in last year, 1 million paid subscribers in the US."] 6 December 2012. Retrieved on 16 April 2016.</ref> Throughout the 65 markets Spotify is available in worldwide, the app has cumulated approximately 71 million subscribers and 157 million active users as of December 31, 2017.<ref>[https://press.spotify.com/us/about/"] Retrieved on 4 April 2018.</ref><br />
[[File:Danielelk.jpg|300px|left|float|thumb|Daniel Ek, co-founder and chief executive of Spotify]]<br />
Upon Spotify's first release, users were offered a six-month free trial period that was sponsored by visual and radio advertisements that appeared on the website screen. After the trial period expired, users had the ability to listen to music for up to 2.5 hours per week, with up to 10 hours of total listening time allowed per month. Now, Spotify offers unlimited streaming services with advertisements for nonpaying members. Spotify offers a premium subscription called "Spotify Premium," which allows users to listen to music offline on their mobile device after they download it and stream it with higher bit depth and eliminates advertisements. Spotify users can browse Spotify's 20 million songs by genre, record label, playlist, album, artist or song.<ref name = "Spotify: About"></ref> In June 2015, Spotify was valued at over 8 billion dollars.<ref>Davidson, Lauren. [http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/11664186/Spotify-hits-8.53bn-valuation-after-fresh-funding-round.html Spotify Valued at $8.53bn Valuation After Fresh Funding Round."] 10 June 2015. Retrieved on 16 April 2016.</ref> On April 3, 2018, Spotify eschewed a traditional initial public offering, instead choosing to directly list on the New York Stock Exchange. By the end of the day, the stock was valued at $149.01, earning Spotify a valuation of $26.5 billion.<ref>Anna Nicolaou and Nicole Bullock, Spotify ends first trading day at $26.5bn valuation, Financial Times, https://www.ft.com/content/3cfb00fc-3745-11e8-8b98-2f31af407cc8</ref> "Spotify ended its first day of trading at $149.01 a share, according to FactSet data. That was down nearly $17 from from the stock's first trade at $165.90 but above the reference price set Monday by NYSE of $132 a share. With a market value of more than $25 billion, Spotify will rank as one of the largest tech IPOs on record, according to Dealogic <ref = "Spotify">[https://www.wsj.com/livecoverage/spotify-debut-analysis Spotify Debut Analysis]</ref>."<br />
<br />
===Competition===<br />
Spotify emerged in the music streaming marketplace earlier than other streaming services, but has seen significant, growing competition from other providers since then.<br />
====Apple Music====<br />
The owner of [[Wikipedia: iTunes| iTunes]], Apple, launched its own streaming service of [[Apple Music|Apple Music]] in June 2015. <ref>[https://arstechnica.com/apple/2015/06/apple-music-is-the-next-chapter-in-music/ Apple Music is "the next chapter in music]. Ars Technica.</ref> The platform has the advantage of being pre-installed on every iOS device, making the barrier to entry easier for iPhone and iPod users. Apple Music included a radio station DJ'd by Zane Lowe, the renowned BBC DJ, and contained exclusives based on agreements with artists.<ref>https://www.macrumors.com/2017/03/17/apple-music-500000-chance-the-rapper-exclusive/ Apple paid $500,000 for Exclusive Access to Chance the Rapper's 'Coloring Book' Mixtape Macrumors. Retrieved April 23 2017.</ref> Apple Music comes with a 3-month free trial before users are prompted to pay $9.99 per month <ref>Apple Music https://www.apple.com/apple-music/plans/</ref>. With decreasing sales of the iPhone, Apple Music is seen as a revenue opportunity for Apple with its 36 million paid subscribers <ref name = hi>Apple Music is Now Worth $10 Billion https://money.usnews.com/investing/stock-market-news/articles/2018-02-28/apple-inc-aapl-stock</ref>. Bernstein analyst Toni Sacconaghi [[https://www.bernstein.com/]] estimated that in 2017, Apple Music revenue increased by 91% <ref name = hi>Apple Music is Now Worth $10 Billion [https://money.usnews.com/investing/stock-market-news/articles/2018-02-28/apple-inc-aapl-stock]</ref>.<br />
<br />
Apple music matches Spotify on price and reserves default functionality on iOS devices.<br />
<br />
====Tidal====<br />
[http://tidal.com/us Tidal] is an artist-owned platform created by rapper Jay-Z, that emphasizes artists through higher royalty returns from streaming. Its popularity comes from exclusive music, such as Beyonce's album ''Lemonade'' and Kanye's album ''The Life of Pablo'' that upon their release were only available through the platform. Both albums have become available over other platforms since: two months after its initial release, "The Life of Pablo," arrived on Google Play, Spotify, and Apple Music. Beyonce's album "Lemonade" has been added to iTunes but is still not offered by Spotify, although a comment appears on her artist page that Spotify "is working on it and hope to have it soon" [spotify.com]<ref>Flanagan, Andrew & Hampp, Andrew. [http://www.billboard.com/articles/news/6509498/jay-z-tidal-launch-artist-stakeholders "It's Official: Jay Z's istoric tidal Launches With 16 Artist Stakeholders."] <i>Billboard</i>. 30 March 2015. </ref> It serves massive amounts of content including "expertly curated editorial" to the public for a monthly fee of $9.99. Tidal also offers student and family discounts, all of which are similar to Spotify's rates.<ref>[https://support.tidal.com/hc/en-us/articles/115003662825-Subscription-Types "Subscription Types"]. <i>Tidal</i></ref> Tidal boasts a variety of unique features, such as full music and video content available to the public for free during certain weeks of the year, playlists curated by successful artists like Kanye West, greater visibility for up-and-coming artists, and access to music and concert videos.<ref> “Best Music App This Week: Tidal (It's Free).” SlashGear, 28 Dec. 2017, [[https://www.slashgear.com/best-music-app-this-week-tidal-its-free-28513110/]].</ref> Another marketing tactic is its exclusive releases, in which nine albums, including works by Kanye West and Prince, brought users to the platform within its first year of operation.<ref>Rys, Dan. [https://www.billboard.com/articles/business/7317891/tidal-one-year-anniversary-by-the-numbers "Tidal at One Year: By the Numbers with Jay Z's Streaming Service"]. <i>Billboard</i>. 30 March 2016.</ref><br />
<br />
====SoundCloud====<br />
[https://soundcloud.com/ SoundCloud], which was launched in 2008, is an online platform for music and audio. The service prides itself on its easy and transparent service and ships with two premium options: SoundCloud Go and SoundCloud Go+, priced at $4.99 and $9.99 respectively. Both packages allow users to download tracks for offline listening and remove advertisements from users' listening experience. Along with streaming music, SoundCloud allows users to upload, record, and promote their own original tracks through social media platforms such as Twitter and Facebook. [https://en.wikipedia.org/wiki/SoundCloud] SoundCloud allows artists with less streams to share their music on the aforementioned sites. This platform has achieved its critical success because of this ability to promote original songs that would go unnoticed otherwise. A differentiating factor between SoundCloud and Spotify is that each SoundCloud song is attached to its own radio station — where listeners can listen to similar songs on that station. Compared to Spotify's 75 million active users, SoundCloud has 175 million monthly listeners. <ref> Moazed, Alex.<br />
[https://techcrunch.com/2016/01/24/why-soundcloud-will-be-worth-more-than-spotify/ "Why SoundCloud Will Be Worth More Than Spotify"] <i>Tech Crunch</i>. 24 January 2016.</ref><br />
<br />
====Pandora Radio====<br />
[[Wikipedia: Tim Westergren|Tim Westergren]] and [[Wikipedia:Jon Kraft|Jon Kraft]] founded [[Wikipedia: Pandora Radio| Pandora Radio]] in 2000 <ref> Clifford, Stephanie. [www.inc.com/magazine/20071001/pandoras-long-strange-trip_pagen_2.html “Pandora's Long Strange Trip.”] <i>Inc.</i>01 October 2007</ref>. Pandora is powered by [[Wikipedia: Music Genome Project| Music Genome Project]], a music analysis software <ref name = "About Pandora">“About Pandora.” Pandora, www.pandora.com/about.</ref>. Pandora's Premium service is $5 which is almost half the price cheaper than Spotify's premium subscription. The user experience for Pandora users differs from what Spotify users see. Pandora offers a mobile application for IOS and Andriod users, an in-application browser player, and a desktop version but only available to premium users. <ref>Hastings, Nick.[https://www.digitaltrends.com/music/spotify-vs-pandora/ "Spotify vs. Pandora: Which is better for you?"] <i>Digital Trends</i>. 16 November 2017.</ref> Pandora allows users to personalize their own radio, enabling them to like, skip, or dislike songs that they are listening to. Once a user likes a song, the music streaming service will find songs similar to that soundtrack. When a song is disliked, the song will be filtered from the current station and other songs similar won't be suggested to the user.<br />
<br />
====Google Play Music====<br />
<br />
[[Wikipedia: Google Play Music|Google Play Music]] is a streaming service which was launched for public-use in November of 2011. Google Play Music offers a catalog of over 40 Million songs. Non-paying users can stream up to 50,000 of their own songs in addition to listening to curated stations with various songs on them. For paying Google Play Music users, they have access to the catalog of 40 million songs. Users can get a feature called YouTube Red in the application that eliminates all advertisement commercials which can be used in the Google Play Music application along with others. <ref> Wagoner, Ara. [https://www.androidcentral.com/google-play-music "Google Play Music: Everything you need to know!"] <i>Android Central.</i> 11 January 2018.</ref> Without a subscription, users can skip songs up to 6 times in one hour. With a subscription, users can skip songs as often as necessary. Similar to Spotify, Google Play Music allows its users to create playlists and radio stations and add songs and artists that best fit their interests to these playlists. <ref>[https://support.google.com/googleplaymusic/answer/4515411?hl=en "How to use Google Play Music"] <i>Google.</i></ref><br />
<br />
==Features==<br />
===Playlists===<br />
[[File:spotify_library.jpg|300px|right|thumb|Spotify library]]<br />
<br />
Playlists can be created and saved to the user's account and can be accessed instantly from any device with Spotify downloaded. There can be up to 10,000 tracks on a single playlist.<ref name = "Spotify for Dummys">Spotify. [http://www.dummies.com/how-to/content/how-spotify-playlists-work.html|For Dummys] Retrieved on 24 April 2016.</ref> Users can drag and drop songs or entire albums to create a playlist. Playlists can be shared with friends by emailing or instant messaging a link to the playlist. Upon following the link, the shared playlist is added to that user's library. Playlists can also be shared through social networking sites like Facebook.<br />
<br />
Users also have the choice to follow or save a pre-made playlist. This can be through Spotify's own recommendation based on what is trending, a user's mood, or new releases. There is also the opportunity to search a specific genre, artist, album, or another playlist that can then be added to a personal playlist. Users have the option to search and follow other users or artists and save or follow their playlists too.<br />
<br />
===Limitations===<br />
Artists can choose to withhold their music from Spotify, disabling users' ability to search for it. In some situations, the music will appear, but users will not be able to listen to it. Examples include some Disney albums like the soundtrack to the movie, Aladdin. Two tracks, "Friend Like Me" and "Prince Ali" are both withheld from Spotify. Another example is Adele's most recent album, "21", which did not release any of its songs to Spotify until several months after their release. Withholding of music primarily occurs when Spotify fails to acquire licenses to play certain record labels' music.<br />
<br />
In addition, while playlists can be made, the main page with all of your music is very difficult to keep track of. Unlike, say, Apple Music, who puts your downloaded songs in alphabetical order, Spotify keeps them in the order you downloaded them, which can be very confusing to find later. That being said, users can manually sort the songs they save by clicking the "Title" heading, which sorts songs alphabetically.<br />
<br />
===Mobile===<br />
Spotify can currently be accessed from a variety of mobile devices including any Apple [[iOS]], [[Android]], [[Wikipedia:Blackberry|Blackberry]] and Windows mobile. To use Spotify on a mobile device, the user must subscribe to the premium service for $9.99 per month (or $4.99 a month for students). There have been some complaints about the mobile app. Users cite problems with syncing their devices as well as the app frequently crashing. Other complaints with the mobile app include the inability to explore Spotify's vast library. Users are forced to build playlists of desired songs instead of searching for them on-the-fly if for instance, they are playing music while driving. Critics of the app say that the developers are poor programmers and need to find better ways for users to search for songs along with accessing the "top" sections of tracks, artists and albums.<br />
<br />
===Social Networking===<br />
Spotify has integrated social networking, allowing users connected to Facebook or Twitter accounts to share playlists and favorite songs.<ref> Spotify: The New Social Media https://www.campaigncreators.com/blog/spotify-the-social-network/ </ref> Through these platforms, Spotify becomes a social network where friends can collaborate on a playlist and share it when it has been finalized. Not only does this keep everyone connected on Facebook and Twitter up to date on music, but also promotes new music that were newly released. The desktop version of Spotify allows users to see what songs their Facebook friends have been listening to which allows for users to stay further up to date with the latest music.<br />
<br />
===Podcasts===<br />
Spotify offers thousands of podcasts that users can directly listen to on their device. Podcast episodes are recommended based off of the user's interests. Users can also search by category, including Lifestyle, News, Comedy, and Sports, among others. Users can download the podcasts to listen to on different devices with Spotify installed or when they are offline. <ref> “Podcasts.” Spotify, support.spotify.com/us/using_spotify/features/podcasts/. </ref>.<br />
<br />
===Offline mode===<br />
Spotify can be accessed without an Internet connection using the offline mode feature with a premium account. This enables the user to choose specific songs or playlists that sync to the computer or device allowing playback anywhere. Users must download these songs and playlists while they are online, however. Songs and playlists are stored in the computer's cache for later playback. You can store up to 3,333 songs offline on 3 different devices. The mobile client also has a "Force Offline" mode which immediately stops Spotify from using the Internet. This can be especially useful for users looking to extend their battery life or limit data usage<ref>Spotify.[http://www.spotify.com/us/about/features/offline-mode/ "Spotify Offline Mode."] Retrieved on 16 April 2016.</ref><br />
<br />
===Apps===<br />
On November 30, 2011, Spotify Apps were announced<ref name = "spotapps"> Spotify. [http://www.spotify.com/us/blog/archives/2011/11/30/say-hello-to-spotify-apps/ "Say Hello to Spotify Apps."] 30 November 2011. Retrieved on 16 April 2016.</ref>. The list of supported apps at the time of the announcement include [[Wikipedia:Last.fm|Last.fm]], [[Wikipedia:We Are Hunted|We Are Hunted]], [[Wikipedia:Rolling Stone|Rolling Stone]], [[Wikipedia:The Guardian|The Guardian]], [[Wikipedia:Pitchfork|Pitchfork]], [[Wikipedia:Tunewiki|Tunewiki]], and [[Wikipedia:Songkick|Songkick]].<ref name="spotapps"/> This feature will allow third-party and independent developers to build [[Wikipedia:HTML5|HTML5]]-based apps to supplement the Spotify service. Some of the expected tools will offer extra information regarding music recommendations, concerts, lyrics, and news.<ref>[http://www.spotify.com/us/about/apps/ Spotify Apps]</ref><br />
[http://youtu.be/q-8oHqnAChc/ Spotify Apps intro video]<br />
<br />
Apps are sectioned to the left under the first heading titled "APP". The Appfinder, TopLists, and Radio apps are defaulted into the section, but users are free to add and delete apps from the Appfinder. When a user adds an app, it is automatically added to the App section on the left where users can click and use it as they listen to music.<br />
<br />
===iTunes and Spotify===<br />
Upon signing up, Spotify scans a user's hard drive for MP3s and other digital music files. Spotify will detect the tracks individually, but is also capable of transferring the playlists users have previously created to their Spotify library to be utilized within the application. If a user does not wish to have their iTunes library imported, they can selectively import playlists from iTunes<ref>Dummies.com. [http://www.dummies.com/how-to/content/how-to-manage-spotify-and-itunes-playlists.html/ "How to Manage Spotify and iTunes Playlists."] Retrieved on 16 April 2016.</ref> When searching through Spotify's online mode, the name of the artist for any songs that the user currently owns on their hard drive will appear in a darker grey color, or with a music note icon on the side.<br />
<br />
==Membership==<br />
[[File:Spotify_Growth.png|600px|thumb|right|Spotify's growth in Premium Membership<ref name="growth"> Spotify; Tech Crunch. ''Number of paying Spotify subscribers worldwide from July 2010 to March 2017 (in millions)'. March, 2017. [https://www.statista.com/statistics/244995/number-of-paying-spotify-subscribers/ "Statista"]</ref>]]<br />
Spotify offers four different membership options to its users: Spotify Free, Spotify Premium, Spotify Premium for Students, and Spotify Family<ref> Spotify. ''Go Premium - Spotify''. 2017. [https://www.spotify.com/us/premium/ "Spotify"]</ref> As of March 2017, Spotify has 50 million paying subscribers – up from 30 million the same time in 2016.<ref name="growth"/><br />
<br />
Spotify's success is attributed to their unique "freemium" business model. The word combines both "free" and "premium" to describe a business model that offers both free and premium service. This business model works by offering elements of its basic services for free in order to draw users to its paid subscription. This has allowed for Spotify to remain a dominant player in the online music streaming industry.<ref name="freemium">[https://www.investopedia.com/terms/f/freemium.asp Freemium Definition]</ref>"<br />
<br />
=== Spotify Free ===<br />
Spotify Free is Spotify’s most basic streaming package. Streaming quality can range from 96 to 160 kbps depending on the user’s internet connection and device of choice. The package allows users to listen to all of Spotify’s tracks over an internet connection as well as create, edit, and share your own playlists. While listening is unlimited, the users are subject to a few restirctions which vary depending on whether users are on a desktop or a mobile decive. If using a desktop, users are able to select specific songs and switch between them freely with ads playing intermittently. On mobile, users are limited to “Shuffle Play” where they can listen to playlists only and are unable to select specific songs. Mobile users are also limited to six track skips per hour. Like desktop users, mobile users are subject to intermittent ads that cannot be skipped or muted. Attempting to mute ads or even make them noticeably quieter only pauses the ad until the users turns the volume back up.<ref> Spotify. ''Spotify Free''. 2017. [https://support.spotify.com/us/account_payment_help/subscription_information/spotify-free-on-your-mobile-phone/ "Spotify"]</ref><br />
<br />
===Spotify Premium === <br />
Spotify Premium, priced at $9.99/month, is Spotify’s most advanced streaming package. Streaming quality can range from 96 to 320 kbps depending on the user’s internet connection and device of choice. The package provides users all the perks of the “Free” package but with no limitations. Users are free to select specific songs, play them on repeat, and skip songs as often as they want. Users are also guaranteed a completely ad-free listening experience.<ref> Spotify. ''Go Premium. Be happy''. 2017. [https://www.spotify.com/us/premium/ "Spotify"]</ref><br />
<br />
Spotify Premium also introduces a number of completely new features. Of these features include “Spotify Connect,” which allows users to use their mobile Spotify app as a controller for over 300 different devices. By syncing devices over Wi-Fi connections, users can control what their account plays on devices ranging from the Playstation 4 to the Amazon Echo.<ref> Spotify. ''Spotify Connect''. 2017. [https://www.spotify.com/us/connect/ "Spotify"]</ref> “Offline Listening” is another feature available for premium users. This feature allows users to download up to 3,333 Spotify songs on up to three devices and listen to them later when they are not connected to the internet. This offline listening function allows users to not burn through their data when streaming music as the songs are already downloaded on the application on a user's phone.<ref> Spotify. ''Listen Offline''. 2017. [https://support.spotify.com/us/using_spotify/search_play/listen-offline/ "Spotify"]</ref><br />
<br />
In April 2017, Spotify announced that Premium users would soon begin to have access to select albums and singles two weeks before Spotify Free users.<ref>Singleton, Micah. ''Spotify Premium users will get some albums two weeks before free users''. 4, Apr 2017. [http://www.theverge.com/2017/4/4/15177004/spotify-premium-two-week-exclusive-albums-licensing-universal-music-group "The Verge"]</ref><br />
<br />
===Spotify Premium for Students===<br />
Spotify Premium for Students, priced at $4.99/month, offers all of the features of Spotify Premium at a discounted price. With the Spotify student discount, students can get 50% off a premium subscription. Users are able to receive this discount by registering for Spotify with a valid student email account. The discount is only valid for 12 months at a time, as each year students must re-sign up to continue to receive the discount. This offer is only offered for four consecutive years and then the price is back up to $9.99/month.<ref> Spotify. ''Spotify Premium. Only $4.99 for students.'' 2017. [https://www.spotify.com/us/student/?utm_source=magazine&utm_medium=offline&utm_campaign=con_mkt%7cde%7cstudent_fresher_h2_uc_intro "Spotify"]</ref><br />
<br />
===Spotify Family===<br />
Spotify Family, priced at $14.99/month, offers all of the features of Spotify Premium with the added possibility for multiple users under once account. Spotify Family’s $14.99/month charge is constant and supports up to six users, so long as those users a are family living under the same address. Each member of the family is given their own Premium account so users won’t have to share songs, playlists, or have to worry about multiple users being on the same account.<ref> Spotify. ''Up to 6 accounts. Just $14.99 per month. Premium for Family.'' 2017. [https://www.spotify.com/us/family/ "Spotify"]</ref><br />
<br />
===Spotify Hi-Fi===<br />
In March 2017, Spotify reportedly began preparing to launch a new, more expensive version of its premium version that would make hi-fi recordings available via streaming for interested customers. Currently, the highest-resolutionan of an audio file available for streaming through Spotify is at 320 kbps (kilobits per second), a level still considered sacrificing of quality in comparison to the audio files on CDs.<ref>Dillet, Romain. “Spotify Is Testing a Lossless Subscription Tier for $15 to $20 per Month.” TechCrunch, TechCrunch, 1 Mar. 2017, techcrunch.com/2017/03/01/spotify-is-testing-a-lossless-subscription-tier-for-15-to-20-per-month/.</ref> However, the introduction of Spotify Hi-Fi would bring CD quality audio with Spotify Premium features, according to its advertisements. <ref name = single>Singleton, Micah. “Spotify Is Preparing to Launch a Hi-Fi Music Tier.” The Verge, The Verge, 1 Mar. 2017, www.theverge.com/2017/3/1/14776780/spotify-hi-fi-preparing-launch-lossless-audio-tier.</ref> <br />
<br />
Reports of Spotify's intentions to launch a Hi-Fi version of its service first began circulating after a small circle of Reddit users posted screenshots of themselves being asked to upgrade their subscription version to Hi-Fi, each for a different price (anywhere from $5 to $10 above the standard premium version's $10 per month). It is believed that the streaming-service was using these preemptive requests to gauge users' interest in the new product, and to test potential price models for it. <ref name = single>Singleton, Micah. “Spotify Is Preparing to Launch a Hi-Fi Music Tier.” The Verge, The Verge, 1 Mar. 2017, www.theverge.com/2017/3/1/14776780/spotify-hi-fi-preparing-launch-lossless-audio-tier.</ref><br />
<br />
==Partnerships==<br />
<br />
===Bumble===<br />
In September 2016, Spotify partnered with the dating-app platform, Bumble. Users of Spotify can display their favorite musical artists on their Bumble profiles. Bumble automatically pulls data from a user's Spotify account every few days. If an artist appears on a Bumble user's profile, an "edit" page of the Bumble account allows users to remove artists they do not want displayed. A playlist on Spotify includes Bumble's top tracks "to get romance rolling." <ref>“Bumble.” Spotify, support.spotify.com/us/using_spotify/app_integrations/bumble/.</ref><br />
<br />
===Starbucks===<br />
In January 2016, Spotify announced a massive joint venture with international coffee and beverage conglomerate Starbucks, a partnership which, according to Starbucks' press release, connects the streaming-service to coffee-drinking customers at approximately 7,500 locations in the United States. <ref name = new>“New Era of Music Debuts at Starbucks with Spotify.” Starbucks Newsroom, 21 June 2017, news.starbucks.com/press-releases/new-era-of-music-debuts-at-starbucks-with-spotify.</ref> This partnership also pushes Spotify on My Starbucks Rewards loyalty members via the Starbucks app, and it allows those app users to take the music of the Starbucks stores with them through allowing customers to discover and save the music played by Starbucks in the Spotify app. <ref name = new>“New Era of Music Debuts at Starbucks with Spotify.” Starbucks Newsroom, 21 June 2017, news.starbucks.com/press-releases/new-era-of-music-debuts-at-starbucks-with-spotify.</ref><br />
<br />
===Tinder===<br />
In September 2016, Spotify announced a partnership with geo-based dating-app service Tinder. Through this partnership, Spotify aims to integrate personal music taste into swiping through profiles, something that users can now achieve by broadcasting their personal 'Anthem' via Tinder, displaying their favorite artists on their profiles, and seeking out romantic partners with similar music tastes.<ref name = tinder>Team, Spotify. “Spotify Partners with Tinder to Swipe Up the Volume.” News, 20 Sept. 2016, news.spotify.com/us/2016/09/20/spotify-partners-with-tinder-to-swipe-up-the-volume./</ref> A 'personal anthem' is described by Spotify as a track that describes your story or a song that is stuck in one's head. Overall, the firm believes that their partnership with the dating service is allowing users of Tinder to engage in an additional sensory experience. <ref name = tinder>Team, Spotify. “Spotify Partners with Tinder to Swipe Up the Volume.” News, 20 Sept. 2016, news.spotify.com/us/2016/09/20/spotify-partners-with-tinder-to-swipe-up-the-volume.</ref><br />
<br />
===Universal Music Group===<br />
In April 2017, Spotify announced an international, multi-year partnership with major music publishing company Universal Music Group, who controls properties such as Republic Records, Def Jam Records and Motown Records.<ref>“Our Labels & Brands.” UMG, www.universalmusic.com/labels/.</ref> The deal reportedly concluded more than two years of negotiations between the two firms, stabilizing their pay-per-stream agreements and, according to Billboard, alleviating pressure from Spotify's CEO by removing a barrier to their initial public offering (IPO).<br />
<br />
According to a press release from Spotify, the firm's partnership with UMG represents a mutual interest among the firms in further ensuring that there are opportunities with streaming for artists, fans, and labels through providing a range of experiences, flexibility with releases, and collaboration with marketing campaigns on Spotify's platform. <ref name = spotify>“Spotify and Universal Music Group Announce Global, Multi-Year License Agreement.” Press, 4 Apr. 2017, press.spotify.com/us/2017/04/04/spotify-and-universal-music-group-announce-global-multi-year-license-agreement/.</ref>In particular, the deal is said to offer UMG strategists access to user data, which is expected to create a foundation for artists and labels to engage, expand, and build better connections with their fans.<ref name = spotify>“Spotify and Universal Music Group Announce Global, Multi-Year License Agreement.” Press, 4 Apr. 2017, press.spotify.com/us/2017/04/04/spotify-and-universal-music-group-announce-global-multi-year-license-agreement/.</ref><br />
<br />
===Uber===<br />
Spotify has partnered with popular ride-sharing app Uber since 2014.<ref>[https://newsroom.uber.com/uber-spotify-music-for-your-ride/ Uber & Spotify bring music to your ride] </ref> Riders who have a Spotify premium account can connect their Spotify to the app, and if their driver has a music-enabled car, riders can select songs or playlists for the duration of their ride and DJ from the backseat. This feature was initially available in only 10 cities, but it is now available in every market where Spotify is. <ref>Ormsmeth, Holly “Your Ride, Your Music.” Uber. 8 Sept. 2016, https://www.uber.com/newsroom/ridermusic/.</ref><br />
<br />
===Hulu===<br />
In September of 2017, Spotify partnered with [https://www.hulu.com Hulu], a subscription streaming service. <ref name = "Hulu" > Tran, Kevin. "Spotify-Hulu partnership targets college students". [http://www.businessinsider.com/spotify-hulu-partnership-targets-college-students-2017-9], 11 September 2017. Accessed 4 April 2017.</ref> The partnership has created a bundle which offers college students a free Hulu account with the purchase of a Spotify student account for $4.99 per month. While Spotify and Hulu offer different products, the partnership was created with the goal of expanding target customer segments for both companies.<br />
<br />
===Headspace===<br />
Spotify partnered with [https://help.headspace.com/hc/en-us/articles/115002916248-What-is-the-Headspace-Spotify-Bundle- Headspace] in 2018. Spotify users can now upgrade their premium account to include a Headspace subscription (contingent on them cancelling their existing Headspace subscription). This bundle is currently only available in few countries: Sweden, Denmark, Norway, Finland, Netherlands, and the United Kingdom. Spotify offers a three-month free Headspace trial, a £9,99 offer period price, and then a £14,99 normal bundle subscription fee. Students in the UK are able to get Headspace for free when they upgrade to premium. <ref> Headspace. ''What is the Headspace + Spotify Bundle?'' [https://help.headspace.com/hc/en-us/articles/115002916248-What-is-the-Headspace-Spotify-Bundle- "Spotify and Headspace"]</ref><br />
<br />
===Waze===<br />
Waze, the Google-owned navigation app, partnered with Spotify in 2017.<ref>[https://techcrunch.com/2017/09/18/waze-and-spotify-integration-arrives-on-ios/]</ref> Users of both apps are now able to access their playlists within the Waze app; they can skip songs, play, and pause. Waze users do not need to exit the app to play music from Spotify.<br />
<br />
===AXS and Eventbrite===<br />
In June 2017, Spotify partnered with AXS a music and live entertainment subsidiary of AEG and Eventbrite an event and ticketing booking technology company. The partnership was put in place to offer Spotify's users recommendations for local live music entertainment and access to ticket purchasing. The partnership with help music streaming user learn about when their favorite artists will be having a local show and how to get tickets. <ref>Spotify Partners With AXS and Eventbrite to Offer Personalized Event Recommendations and Ticket Purchases https://www.billboard.com/articles/news/7833033/spotify-axs-partner-personalized-event-recommendations</ref><br />
<br />
==Ethical Issues==<br />
There have been continuous debates about the ethical rights of Spotify. These ethical implications encompass not only major labels and signed artists, but also indie artists, and consumers themselves. <br />
<br />
===Ethical Concerns for Artists and Labels===<br />
One of the main ethical questions concerning Spotify is how much compensation artists should receive for streaming their music through the service. A large part of the issue is that labels, copyright holders, and publishers receive money from Spotify, but then fail to compensate their artists because there are no contractual terms of how much they will be compensated from this specific service. Some artists say that they receive on average between $0.0006 and $0.0084 per play. <ref>Keating, Lauren [http://www.techtimes.com/articles/65658/20150703/here-artists-won-t-find-apple-music-tidal-spotify.htm "Here Are The Artists You Won’t Find On Apple Music, Tidal and Spotify."] 3 July 2015. Retrieved on 16 April 2016.</ref>. The company has claimed to have paid out over 100 million dollars worth of revenue to the music rights holder.<ref> Hypebot. [http://www.hypebot.com/hypebot/2011/09/spotify-offers-additonal-response-to-independent-label-defections.html "Spotify Offers Additional Reponse to Independent Label Defections."] 1 September 2011. Retrieved on 16 April 2016.</ref> <br />
<br />
Various members of the music industry have spoken out against Spotify, claiming that Spotify fails to compensate artists properly. For example, Patrick Carney of The Black Keys accused Spotify board member Sean Parker of stealing $2 million worth of royalties from artists.<ref> Makarechi, Kia. [http://www.huffingtonpost.com/2012/03/28/black-keys-sean-parker-spotify-asshole_n_1384882.html "Black Keys: Sean Parker is an A**hole, Spotify isn't Fair to Artists."] 28 March 2012. Retrieved on 16 April 2016.</ref> Some artists such as Jay-Z, Beyonce, and Dr. Dre. <ref>Saharan, Jacqueline. "Artists You Can't Find on Spotify in 2017".[https://www.cheatsheet.com/entertainment/artists-you-cant-find-on-spotify.html/?a=viewall] 30 October 2017. Accessed 4 April 2018.</ref> have chosen to release their music for purchase on other streaming services such as Apple Music.<br />
<br />
There are also indirect effects on the success of artists, separate from compensation paid directly to the publishers, copyright holders, and record labels that are hard to quantify. For example, Spotify's integration with [[Facebook]], which has been a large cause for the software's success, provides self-sustaining marketing for any artist whose song is played. If a user has 50 Facebook friends online, and the Facebook ticker displays that he is listening to a song, those 50 users have been exposed to the artist, which will result in some expected value of sales for the label.<br />
<br />
===Devaluing Music===<br />
Many artists claim that free music streaming services, including Spotify, are devaluing their music. These streaming services allow users to listen to an unlimited amount of music without paying anything. By allowing users to listen to an unlimited amount of music with ads, many artists believe Spotify perpetuates the idea this music is not worth paying for and should be offered for free, decreasing sales for artists. Popular artists such as Adele, Taylor Swift, and Jay-Z have refused to make their music available on Spotify, citing Spotify's devaluation of their music as the reason for their decision. <ref>France, Lisa. “Jay-Z's '4:44' Everywhere but Spotify.” CNNMoney, Cable News Network, 7 July 2017, https://money.cnn.com/2017/07/07/media/jay-z-album-spotify/index.html</ref><br />
<br />
===Streams-As-Sales===<br />
On February 1, 2016, the Recording Industry Association of America (RIAA) announced its intentions to begin incorporating a new "methodology for its Gold & Platinum Program, the industry’s premier award for recognizing artistic achievement in the music marketplace." According to the RIAA's new model, on-demand audio and video streams are now officially counted as unique consumptions, contributing toward Gold and Platinum statuses for successful songs and albums.<ref name = ria> RIAA Debuts Album Award With Streams https://www.riaa.com/riaa-debuts-album-award-streams/</ref> The updating of the rule alters an earlier adjustment to the measurement system which made on-demand streams count as sales figures, but not to count towards the iconic Gold and Platinum statuses.<ref name = ria> RIAA Debuts Album Award With Streams https://www.riaa.com/riaa-debuts-album-award-streams/</ref> The RIAA's reconsideration of the value of a streams adds weight and stability to Spotify's placement in the music industry.<br />
<br />
====Vulfpeck, ''Sleepify''====<br />
In 2014, funk band Vulfpeck released an album on Spotify called "Sleepify", consisting of nothing but thirty-second soundless tracks. Vulfpeck encouraged their fans to stream the album while they slept so the band could collect royalties to fund their upcoming tour. With these funds, Vulfpeck promised to offer free admission to their fans.<ref>Vulf. [https://www.youtube.com/watch?time_continue=60&v=KXvncV79LXk "SLEEPIFY /// The Spotify Funded Vulfpeck Tour"], ''Youtube'', 11 March 2014.</ref> Sleepify was available to stream for seven weeks before Spotify removed the album, claiming that it had violated their terms of content. Before Spotify removed the album, Vulfpeck accumulated roughly $20,000 in royalties from Sleepify, and was able to successfully produce six shows free of charge to their fans as they had promised.<ref>Wilkinson, Dan. [https://noisey.vice.com/en_uk/article/youneedtohearthis-the-band-that-cheated-spotify-have-been-banned-from-spotify-sleepify-vulfpeck "A Band That Tried to Make Money From Spotify Have Been Banned From Spotify"], 30 April 2014.</ref><ref>[https://www.facebook.com/vulfpeck/posts/748705795175214 "Vulfpeck - Posts"], ''Facebook'', 8 August 2014.</ref> This hinders the credibility of Spotify because it is essentially tricking users to listen to nothing to get money. This album and the tactics of Vulfpeck uncovered a large loophole in Spotify's policies that pay artists royalties for how often their songs are listened to by users.<ref> How Vulfpeck Album 'Sleepify' Used Spotify Loophole to Earn $20,000 http://www.classicalite.com/articles/28710/20151001/vulfpeck-album-sleepify-spotify-loophole-earn-20000.htm</ref><br />
<br />
====Gaming the System====<br />
The RIAA (Recording Industry Association of America) modified how it certifies singles and albums in relation to streaming. Under the new guidelines, RIAA now deems 1,500 streams to be equal to 10 track sales which equals an album sale.<ref>Michael Jackson's "Thriller" Hit 32 Million as RIAA Adds Streaming to Gold and Platinum Certs https://www.forbes.com/sites/melindanewman/2016/02/01/michael-jacksons-thriller-hits-32-million-as-riaa-adds-streaming-to-gold-and-platinum-certs/#3bf6f4a18c1c</ref> This has fundamentally changed how artists release their albums. Artists, such as [https://en.wikipedia.org/wiki/Migos Migos], were quick to figure out how to game this system and released Culture II in early 2018. The album clocked in at over 100 minutes spread over 24 tracks. By streaming the album all the way through, the user has effectively 'bought' the album twice. More and more artists are catching onto this and thus making longer and longer albums.<br />
<br />
====Fake Artists====<br />
From as early as August 2016, songs have appeared on Spotify which are attributed to non-existent artists. At approximately the same time as when these songs began appearing, Spotify's recommendation algorithm began recommending these songs with fake artists. These songs would quickly rise from around a thousand plays to hundreds of thousands of plays in short periods of time. Some users accused Spotify of promoting songs with no real artist or of creating these songs with fake artists. Regardless, streams of songs without a real artist cannot be compensated since there is company or individual to pay. Spotify is able to allow its user's the ability to stream these songs without paying to have the song available on their service.<ref>Ingram, Tim. "Spotify is making its own records...and putting them on playlists." Music Business Worldwide. 31 August 2016. https://www.musicbusinessworldwide.com/spotify-is-creating-its-own-recordings-and-putting-them-on-playlists/</ref><br />
<br />
===Fighting Piracy===<br />
Spotify offers the ability to download your iTunes playlists, as described above. This is meant to convenience the buyer so that they can have all their songs in one place. While this helps to limit piracy due to the inability to share your local files among other users, it may encourage people to continue pirating songs in order to add them to their Spotify playlists. Again, Spotify combats the ability to share the file to prevent illegal file sharing. To limit piracy all together, Spotify should continue to expand their library. Spotify also offers offline mode so people can listen to music while not connected to the internet. Though Spotify has offered many features to limit privacy, there are still ways around this via other services, like Soundiiz, a website that converts online playlists to Youtube files. One can then use a Youtube to mp3 converter. Spotify's many efforts to reduce piracy have paid, off however.<br />
<br />
One thing that Spotify has done is educate its users on piracy. Using short advertisements, Spotify informs listeners that use of Spotify is not piracy, and that they properly compensate the artists you listen to. As a result of this brief education of piracy, Spotify has made a significant contribution in reducing piracy. In 2009, piracy in Sweden (where Spotify originated) dropped by 25% just one year after Spotify was launched.<ref>Ernesto.[http://torrentfreak.com/music-piracy-continues-to-decline-thanks-to-spotify-110928/ "Music Piracy Continues to Decline Thanks to Spotify."] 28 September 2011. Retrieved on 16 April 2016.</ref> Many contribute this downward trend of piracy to the popularity of legal music streaming services, namely Spotify.<br />
<br />
===Privacy Issues===<br />
====Transparency of Social Account Links====<br />
While a Facebook account is not required in order to use Spotify, there are concerns regarding the Terms of Service for Spotify users who do choose to link with their Facebook account. If a user syncs their Facebook and Spotify accounts, the application, by default, shows the user's activity from Spotify on their Facebook profile. New users have pointed to this lack of transparency and lack of awareness of the application's actions. Spotify then allowed users to manage their own Facebook privacy settings and not sync their activity to post on their Facebook pages. There have been many complaints about the difficulty of this action within Spotify's settings and the preferences being reset on login timeouts. Because of this, some Spotify users make new Facebook accounts as a way to circumvent Spotify's activity being shared on their main Facebook account. Privacy concerns also included the ability for a user's Facebook friends to see what artists and songs the user was listening to in real-time, but Spotify has since added a feature to allow users to disable sharing updates on their linked Facebook account.<br />
<br />
====Data Breach====<br />
On March 4, 2009, Spotify issued a privacy notice to all of its users stating that security protocols had been breached, possibly leading to unwanted access to private user information such as passwords and email addresses.<ref>Spotify. [http://www.spotify.com/fi/blog/archives/2009/03/04/spotify-security-notice/ "Spotify Security Notice."] 4 March 2009. Retrieved on 16 April 2016.</ref> The problem existed when users added another users shared playlists, leading the Spotify software requesting private information from the Spotify servers. The servers would then return information about the original author of the playlist, potentially compromising that person's security.<ref>DeSpotify. [http://despotify.se/criticism/ "Criticism."] Retrieved on 16 April 2016.</ref><br />
[[File:spotify_ad.png|300px|right|thumb]]<br />
<br />
====Wixen Music Publishing Lawsuit====<br />
In December 2017, Spotify was sued by Wixen Music Publishing Lawsuit for allegedly using thousands of songs without a proper license. Some of the songs included were from Tom Petty, Neil Young and the Doors. Wixen is an exclusive licensee for specific songs on the platform and is seeking 1.6 billion in damages. <ref>Spotify hit with $1.6 billion copyright lawsuit. (2018). reuters.com. Retrieved 4 April 2018, from https://www.reuters.com/article/us-spotify-lawsuit/spotify-hit-with-1-6-billion-copyright-lawsuit-idUSKBN1ER1RX</ref><br />
<br />
====Marketing Campaigns====<br />
Spotify has run a series of marketing campaigns that use user listening data to generate ads about streaming habits. The topics of these campaigns have included "Thanks 2016, it's been weird" and "2018 goals".<ref = "marketing"> Maheshwari, Sapna. "Netflix and Spotfy Ask: Can Data Mining Make for Cute Ads?". [https://www.nytimes.com/2017/12/17/business/media/netflix-spotify-marketing.html]. 17 December 2017. Accessed 4 April 2018.</ref> Some users took issue with their specific usage behavior being displayed in highly public settings, despite the data being anonymous. Spotify users have taken to other social media platforms to express their concern with their privacy while using the application. Other users have felt as though the ads were created to mock user's listening habits.<br />
<br />
==See Also==<br />
{{resource<br />
|<br />
*[[Cloud Computing]]<br />
*[[Digital Piracy]]<br />
*[[Digital Rights Management]]<br />
*[[File Sharing]]<br />
*[[Information Ethics]]<br />
*[[Information Integrity]]<br />
*[[Pandora]]<br />
*[[Bandcamp]]<br />
*[[Digital DJing]]<br />
*[[ITunes Store]]<br />
*[[Limewire]]<br />
*[[Mashup]]<br />
*[[Napster]]<br />
}}<br />
<br />
==References==<br />
{{resource<br />
|<br />
<references/><br />
}}<br />
<br />
<br />
[[Category: Services]]<br />
[[Category: Websites]]<br />
[[Category: Social Networking]]<br />
[[Category:Music]]<br />
[[Category: Media Content]]<br />
[[Category: Piracy]]<br />
[[Category:GoldStar]]<br />
<br />
([[Topics|back to index]])</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Wearable_health_tech&diff=70759Wearable health tech2018-04-11T04:44:55Z<p>Hillcm: </p>
<hr />
<div>The term '''Wearable health technology'' refers to a type of technology that is made wearable for consumers to have portability and efficiency. The advancement of ubiquitous computing health metric collection has resulted in the popularity of wearable accessories which collect health data. Examples of Wearable health tech include Fitbit devices and the Apple Watch. These types of smartwatch devices are referred to as “activity trackers” to reference their capability to capture and analyze movement. The Apple Watch itself sold more watches in the fourth quarter of 2016 than Rolex, Omega, and Swatch combined <ref>"Fortune Article on Apple Watch Sales" http://fortune.com/2018/02/20/apple-watch-sales-smartwatch/</ref>. It has also represented almost half of all smartwatch units, with Fitbit following and nearly 80% of smartwatch revenue, amounting to USD $2.6 billion<ref>"Canalys's article on Apple Watch Revenue Analysis" https://www.canalys.com/newsroom/media-alert-apple-watch-has-its-best-quarter-and-takes-nearly-80-total-smartwatch-revenue-q</ref>. Wearable health tech fits under the umbrella of the Internet of Things (IoT), where everyday devices are sending and receiving data simultaneously to generate new insights. Because Wearable health tech is often utilized in a data-driven setting, ethical concerns regarding it surround the issue of data utilization and the security of collected data.<br />
<br />
[[File:Iarasheed applewatch.jpeg|300px|thumbnail|right|A stock photo of a user looking at their phone which captures physical activity data collected by the user's Apple Watch.]]<br />
<br />
==Popular Features==<br />
Smartwatches come with a variety of features such as messaging, alarms, calendar, and other application connection. In addition to those, many offer or focus only on capabilities for health tracking. These devices can capture comprehensive data (such as altitude in addition to distance), analyze the data, and display them in relation to each other in the form of an activity tracker. <br />
<br />
Devices are gaining capabilities to motivate users as well to be mindful of their health in the form of encouraging visualizations of data and reminders to be active. For example, the Apple Watch has default reminders to stand at certain intervals, such as once an hour, and has the capability to evaluate whether the user has stood or not<ref>"Article on the Features of Apple Watch" https://www.iphonetricks.org/apple-watch-time-to-stand-notifications/</ref>.<br />
<br />
Smartwatches may also provide the framework for 3rd-party developers to create apps to further expand the selection of capabilities of health-related initiatives<ref>"Apple Healthcare Development Article" https://www.apple.com/healthcare/products-platform/</ref>.<br />
<br />
===Heart-rate monitor===<br />
The heart-rate monitor is one popular feature of wearable tech. Devices such as the Apple Watch and Fitibits use photoplethysmography to measure the user’s heart rate<ref>"Techadvisor article on Photoplethysmography" https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>. These devices have the capabilities to record rates at different intervals throughout the day and adapt to the interval of collection when detecting activity, such as running. <br />
<br />
Users have used such wearable tech devices to monitor their heart rate for issues. Cases have occurred when users were able to detector early signs of a heart attack using a Fitbit<ref>"Yahoo News Article on Heart Attack Instance" https://au.news.yahoo.com/a/30839939/life-saving-fitbit-detects-grandfathers-heart-attack-before-it-happened/</ref> and the Apple Watch even provides the capability to alert the user if the device records an unusually high spike in heart rate during leisurely activity<ref>"Apple Website's news on Heart Track"https://www.apple.com/newsroom/2017/11/apple-heart-study-launches-to-identify-irregular-heart-rhythms/</ref>.<br />
<br />
===Calories burned===<br />
Smartwatches and wearable health technology are often able to calculate calories burned in some form for the purpose of evaluating a workout or cardio activity. The Apple Watch used the motion and heart monitoring data it collects to determine calories burned<ref>"TechAdvisor Article on Calories Tracking"https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>. The Fitbit estimates using the heart rate tracker and BMR data<ref><br />
TechAdvisor Article on Fitbit Heart Rate Track and BMR Data"https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref> A user can make use of the caloric data to evaluate their activity and calories burned against the caloric intake they have manually logged for the day. <br />
<br />
===Sleep monitoring===<br />
Smartwatch devices and wearable tech may also offer services for sleep monitoring. These services use movement and heart rate monitoring to calculate time of sleep, time of waking up, duration of sleep, and movement between cycles and depth of sleep<ref><br />
TechAdvisor Article on Sleep Monitoring" https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>.<br />
<br />
==Benefits==<br />
Wearable Health Technology offers many benefits to help the user stay healthy and feel responsible for their health.<br />
===Mindfulness===<br />
In addition to physical health, these Wearable devices provide help with a user's mental health and mindfulness. The Apple Watch by default offers a “Breathe” function which prompts the user throughout the day to pause and monitor their breathing. The Watch signals the user to inhale and exhale at calculated moments. The Apple Watch App Store also has a comprehensive section for health-related apps which includes multiple apps focused on guided meditation and mindfulness<ref>"Imore Article on Apple Watch Meditation App" https://www.imore.com/best-meditation-apps-apple-watch</ref><br />
===Motivation===<br />
Researchers have found benefit for patients when an activity tracker is used to motivate physical activity for patients with depression. Activity tracking devices were used to complement behavioral activation therapy; patients cited “positive experiences included self-awareness, peer motivation and goal-setting opportunities” as well as “[n]egative themes included inconvenience, inaccuracies and disinterest"<ref>Chum J, Kim MS, Zielinski L, et al<br />
Acceptability of the Fitbit in behavioural activation therapy for depression: a qualitative study<br />
Evidence-Based Mental Health 2017;20:128-133. http://ebmh.bmj.com/content/20/4/128</ref>.<br />
===Responsibility===<br />
Wearable health technology urges users to take an active role in their healthcare through exercising and nutrition by seeing real time health data. Wearable health technology helps users feel responsible for staying healthy by creating an awareness of the user's daily activity (or lack thereof).<br />
<br />
==Apple Watch==<br />
The Apple Watch is a smartwatch that syncs up to a user's iPhone. The Apple Watch displays a user's notifications, steps, distance traveled, and minutes of activity. All 3 models of the Apple Watch have a heart rate monitor. The monitor tracks users' resting heart rate and how it fluctuates during a fixed amount of time. Series 1 watches are splash resistant and Series 3 watches are water resistant up to 50 meters <ref>“Apple Watch - Compare.” Apple, Apple, Inc., www.apple.com/watch/compare/.</ref>. All watches can operate over wifi. The Series 3 has cellular and LTE capabilities and allows users to receive notifications as well as makes calls and send text messages.<br />
<br />
==FitBit==<br />
There are 8 FitBit trackers available on the market, each offering different features at their price points.<br />
===Zip===<br />
The FitBit Zip is modeled more after the traditional pedometer. It clips onto the user's clothing, such as their waistband, pocket, or undergarments. At $59.95, this model tracks steps, distance, and calories burned. It sends the data it collects to a user's smartphone or laptop and allows them to compare their statistics to others around them. The battery lasts up to 6 months and it comes in 2 colors, black and pink. <ref>“Fitbit Zip.” Fitbit, Fitbit, Inc., www.fitbit.com/zip.</ref><br />
<br />
===Flex 2===<br />
This piece of technology is wearable. Securing itself to the wrists of users, it tracks steps, distance, calories burned, minutes of exercise completed, and active hours. It also tracks sleep, is water-proof, and alerts users to notifications they receive on their cell phones, which means users never have to take it off. The battery lasts up to 5 days and the device syncs to smartphones and laptops so that users can track their progress. <ref>“FitBit Flex 2.” Fitbit, Fitbit, Inc., www.fitbit.com/flex2.</ref><br />
<br />
===Alta===<br />
The Alta comes in two different versions: one with a heart rate monitor and one without.<br />
===Ace===<br />
This model is one of FitBit's newest models designed specifically for children.<br />
===Charge 2===<br />
===Ionic===<br />
===Versa===<br />
<br />
<br />
==Controversy and Concerns==<br />
The criticism has occurred on whether the collection, storage, and analysis of this data is ethical. <br />
<br />
===Continuous Tracking Controversy===<br />
In 2018, a heat map by fitness app Strava was released that highlighted the routes of all their users – including running and bike riding paths <ref>"Strava Heatmap Article" https://www.strava.com/heatmap#2.95/59.86091/47.61165/hot/all</ref>. This caused controversy as military personnel was using this app as well. While military bases had been identified before using other mapping services, this capability of wearable devices to track both running and riding locations in addition to the frequency of use made it possible to see transpiration routes as well<ref>"The Verge Article on Tracking Locations" https://www.theverge.com/2018/1/28/16942626/strava-fitness-tracker-heat-map-military-base-internet-of-things-geolocation</ref>. This could cause a threat to military personnel as anyone could see how what paths Strava app users are moving on and also with what speed and frequency. The military is currently looking into any implications of the map<ref>"Washington Post Article on Location Controversy for Wearable Tech" https://www.washingtonpost.com/world/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing/2018/01/28/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.db3c0da67fee</ref>.<br />
<br />
==What Companies do with Sensitive Information==<br />
In 2009, David Shoemaker wrote a paper regarding self-exposure and informational privacy. He explores if there’s a way to come to terms whether it is ethically incorrect to share “innocent” personal data. In his exploration, he cites another author, Helen Nissenbaum, who has created a framework to justify the issue. First, just because data is offered, does not mean it can be ethically right for a party to gather and analyze it for a different context. For example, though the Strava location information was meant for an individual’s use to track their exercise, it is ethically wrong for someone to gather that data and use it to attack military personnel. Because – according to Nissenbaum – while bits of data may not be impactful, the collection of data could expose people. Therefore, user’s can feel be justified in feeling uncomfortable if their location data is being gathered and profiled<ref>Shoemaker, D. W. (2009). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1), 3-15. doi:10.1007/s10676-009-9186-x</ref>. User’s now must be mindful about the collection, storage, and privacy setting of location services for their wearable technology. It is critical that they understand its implications and whether they are comfortable with what someone can do with a mass amount of such information.<br />
==Security Risk==<br />
Wearable health technology is constantly gathering data about the user. It is continuously connected to the internet in order to upload this data and save it. Being connected to the internet poses a security threat to this data because most companies handling this sensitive health information does not encrypt this data appropriately. This allows hackers to gain access to to this protected information. Many times, the user's data can be compromised without the user even knowing.<br />
<br />
==References==</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Wearable_health_tech&diff=70756Wearable health tech2018-04-11T04:32:11Z<p>Hillcm: </p>
<hr />
<div>The term '''Wearable health technology'' refers to a type of technology that is made wearable for consumers to have portability and efficiency. The advancement of ubiquitous computing health metric collection has resulted in the popularity of wearable accessories which collect health data. Examples of Wearable health tech include Fitbit devices and the Apple Watch. These types of smartwatch devices are referred to as “activity trackers” to reference their capability to capture and analyze movement. The Apple Watch itself sold more watches in the fourth quarter of 2016 than Rolex, Omega, and Swatch combined <ref>"Fortune Article on Apple Watch Sales" http://fortune.com/2018/02/20/apple-watch-sales-smartwatch/</ref>. It has also represented almost half of all smartwatch units, with Fitbit following and nearly 80% of smartwatch revenue, amounting to USD $2.6 billion<ref>"Canalys's article on Apple Watch Revenue Analysis" https://www.canalys.com/newsroom/media-alert-apple-watch-has-its-best-quarter-and-takes-nearly-80-total-smartwatch-revenue-q</ref>. Wearable health tech fits under the umbrella of the Internet of Things (IoT), where everyday devices are sending and receiving data simultaneously to generate new insights. Because Wearable health tech is often utilized in a data-driven setting, ethical concerns regarding it surround the issue of data utilization and the security of collected data.<br />
<br />
[[File:Iarasheed applewatch.jpeg|300px|thumbnail|right|A stock photo of a user looking at their phone which captures physical activity data collected by the user's Apple Watch.]]<br />
<br />
==Popular Features==<br />
Smartwatches come with a variety of features such as messaging, alarms, calendar, and other application connection. In addition to those, many offer or focus only on capabilities for health tracking. These devices can capture comprehensive data (such as altitude in addition to distance), analyze the data, and display them in relation to each other in the form of an activity tracker. <br />
<br />
Devices are gaining capabilities to motivate users as well to be mindful of their health in the form of encouraging visualizations of data and reminders to be active. For example, the Apple Watch has default reminders to stand at certain intervals, such as once an hour, and has the capability to evaluate whether the user has stood or not<ref>"Article on the Features of Apple Watch" https://www.iphonetricks.org/apple-watch-time-to-stand-notifications/</ref>.<br />
<br />
Smartwatches may also provide the framework for 3rd-party developers to create apps to further expand the selection of capabilities of health-related initiatives<ref>"Apple Healthcare Development Article" https://www.apple.com/healthcare/products-platform/</ref>.<br />
<br />
===Heart-rate monitor===<br />
The heart-rate monitor is one popular feature of wearable tech. Devices such as the Apple Watch and Fitibits use photoplethysmography to measure the user’s heart rate<ref>"Techadvisor article on Photoplethysmography" https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>. These devices have the capabilities to record rates at different intervals throughout the day and adapt to the interval of collection when detecting activity, such as running. <br />
<br />
Users have used such wearable tech devices to monitor their heart rate for issues. Cases have occurred when users were able to detector early signs of a heart attack using a Fitbit<ref>"Yahoo News Article on Heart Attack Instance" https://au.news.yahoo.com/a/30839939/life-saving-fitbit-detects-grandfathers-heart-attack-before-it-happened/</ref> and the Apple Watch even provides the capability to alert the user if the device records an unusually high spike in heart rate during leisurely activity<ref>"Apple Website's news on Heart Track"https://www.apple.com/newsroom/2017/11/apple-heart-study-launches-to-identify-irregular-heart-rhythms/</ref>.<br />
<br />
===Calories burned===<br />
Smartwatches and wearable health technology are often able to calculate calories burned in some form for the purpose of evaluating a workout or cardio activity. The Apple Watch used the motion and heart monitoring data it collects to determine calories burned<ref>"TechAdvisor Article on Calories Tracking"https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>. The Fitbit estimates using the heart rate tracker and BMR data<ref><br />
TechAdvisor Article on Fitbit Heart Rate Track and BMR Data"https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref> A user can make use of the caloric data to evaluate their activity and calories burned against the caloric intake they have manually logged for the day. <br />
<br />
===Sleep monitoring===<br />
Smartwatch devices and wearable tech may also offer services for sleep monitoring. These services use movement and heart rate monitoring to calculate time of sleep, time of waking up, duration of sleep, and movement between cycles and depth of sleep<ref><br />
TechAdvisor Article on Sleep Monitoring" https://www.techadvisor.co.uk/feature/wearable-tech/fitbit-vs-apple-watch-2018-3612954/</ref>.<br />
<br />
==Benefits==<br />
Wearable Health Technology offers many benefits to help the user stay healthy and feel responsible for their health.<br />
===Mindfulness===<br />
In addition to physical health, these Wearable devices provide help with a user's mental health and mindfulness. The Apple Watch by default offers a “Breathe” function which prompts the user throughout the day to pause and monitor their breathing. The Watch signals the user to inhale and exhale at calculated moments. The Apple Watch App Store also has a comprehensive section for health-related apps which includes multiple apps focused on guided meditation and mindfulness<ref>"Imore Article on Apple Watch Meditation App" https://www.imore.com/best-meditation-apps-apple-watch</ref><br />
===Motivation===<br />
Researchers have found benefit for patients when an activity tracker is used to motivate physical activity for patients with depression. Activity tracking devices were used to complement behavioral activation therapy; patients cited “positive experiences included self-awareness, peer motivation and goal-setting opportunities” as well as “[n]egative themes included inconvenience, inaccuracies and disinterest"<ref>Chum J, Kim MS, Zielinski L, et al<br />
Acceptability of the Fitbit in behavioural activation therapy for depression: a qualitative study<br />
Evidence-Based Mental Health 2017;20:128-133. http://ebmh.bmj.com/content/20/4/128</ref>.<br />
===Responsibility===<br />
Wearable health technology urges users to take an active role in their healthcare through exercising and nutrition by seeing real time health data. Wearable health technology helps users feel responsible for staying healthy by creating an awareness of the user's daily activity (or lack thereof).<br />
<br />
==Apple Watch==<br />
The Apple Watch is a smartwatch that syncs up to a user's iPhone. The Apple Watch displays a user's notifications, steps, distance traveled, and minutes of activity. All 3 models of the Apple Watch have a heart rate monitor. The monitor tracks users' resting heart rate and how it fluctuates during a fixed amount of time. Series 1 watches are splash resistant and Series 3 watches are water resistant up to 50 meters <ref>“Apple Watch - Compare.” Apple, Apple, Inc., www.apple.com/watch/compare/.</ref>. All watches can operate over wifi. The Series 3 has cellular and LTE capabilities and allows users to receive notifications as well as makes calls and send text messages.<br />
<br />
==FitBit==<br />
There are 8 FitBit trackers available on the market, each offering different features at their price points.<br />
===Zip===<br />
The FitBit Zip is modeled more after the traditional pedometer. It clips onto the user's clothing, such as their waistband, pocket, or undergarments. At $59.95, this model tracks steps, distance, and calories burned. It sends the data it collects to a user's smartphone or laptop and allows them to compare their statistics to others around them. The battery lasts up to 6 months and it comes in 2 colors, black and pink. <ref>“Fitbit Zip.” Fitbit, Fitbit, Inc., www.fitbit.com/zip.</ref><br />
<br />
===Flex 2===<br />
This piece of technology is wearable. Securing itself to the wrists of users, it tracks steps, distance, calories burned, minutes of exercise completed, and active hours. It also tracks sleep, is water-proof, and alerts users to notifications they receive on their cell phones, which means users never have to take it off. The battery lasts up to 5 days and the device syncs to smartphones and laptops so that users can track their progress. <ref>“FitBit Flex 2.” Fitbit, Fitbit, Inc., www.fitbit.com/flex2.</ref><br />
<br />
===Alta===<br />
The Alta comes in two different versions: one with a heart rate monitor and one without.<br />
===Ace===<br />
This model is one of FitBit's newest models designed specifically for children.<br />
===Charge 2===<br />
===Ionic===<br />
===Versa===<br />
<br />
<br />
==Controversy and Concerns==<br />
The criticism has occurred on whether the collection, storage, and analysis of this data is ethical. <br />
<br />
==Always Tracking==<br />
In 2018, a heat map by fitness app Strava was released which highlighted the routes of all their users – including running and bike riding paths<ref>"Strava Heatmap Article" https://www.strava.com/heatmap#2.95/59.86091/47.61165/hot/all</ref>. The app is offered on the Apple Watch as well. This caused controversy as military personnel were using this app as well. While military bases had been identified before using other mapping services, this capability of wearable devices to track both running and riding locations in addition to the frequency of use made it possible to see transpiration routes as well<ref>"The Verge Article on Tracking Locations" https://www.theverge.com/2018/1/28/16942626/strava-fitness-tracker-heat-map-military-base-internet-of-things-geolocation</ref>. This could cause a threat to military personnel as anyone could see how what paths Strava app users are moving on and also with what speed and frequency. The military is currently looking into any implications of the map<ref>"Washington Post Article on Location Controversy for Wearable Tech" https://www.washingtonpost.com/world/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing/2018/01/28/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.db3c0da67fee</ref>.<br />
==What Companies do with Sensitive Information==<br />
In 2009, David Shoemaker wrote a paper regarding self-exposure and informational privacy. He explores if there’s a way to come to terms whether it is ethically incorrect to share “innocent” personal data. In his exploration, he cites another author, Helen Nissenbaum, who has created a framework to justify the issue. First, just because data is offered, does not mean it can be ethically right for a party to gather and analyze it for a different context. For example, though the Strava location information was meant for an individual’s use to track their exercise, it is ethically wrong for someone to gather that data and use it to attack military personnel. Because – according to Nissenbaum – while bits of data may not be impactful, the collection of data could expose people. Therefore, user’s can feel be justified in feeling uncomfortable if their location data is being gathered and profiled<ref>Shoemaker, D. W. (2009). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1), 3-15. doi:10.1007/s10676-009-9186-x</ref>. User’s now must be mindful about the collection, storage, and privacy setting of location services for their wearable technology. It is critical that they understand its implications and whether they are comfortable with what someone can do with a mass amount of such information.<br />
==Security Risk==<br />
Wearable health technology is constantly gathering data about the user. It is continuously connected to the internet in order to upload this data and save it. Being connected to the internet poses a security threat to this data because most companies handling this sensitive health information does not encrypt this data appropriately. This allows hackers to gain access to to this protected information. Many times, the user's data can be compromised without the user even knowing.<br />
<br />
==References==</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Face_recognition&diff=70754Face recognition2018-04-11T03:37:45Z<p>Hillcm: </p>
<hr />
<div>'''Face Recognition''' is a technology that allows a computer to identify a person by their facial features. It utilizes biometrics and algorithms to identify and process an individual facial feature.<ref>“Biometrics Expert Delivers Lecture on Facial Recognition.” RAND Corporation, www.rand.org/natsec_area/products/facialrecog.html.</ref>. The data collected is cross-referenced with a database of faces to identify each individual. Companies like Snapchat, Apple, and Amazon have adopted the use of facial recognition in order to augment users' experiences. <br />
[[File:facemanbhumika2.JPG|right|thumb|500px]]<br />
==History==<br />
In the 1960s, Woodrow Wilson Bledsoe used a manual device called RAND to measure facial features like mouth, nose, eyes, hairline as well as others. The system would record the coordinates of these features and input them into a database. When the system was given a new image the database was able to retrieve the image with the most similar metrics. At the time, the system was extremely limited by the manual work required and the processing power of computers. <ref>https://www.facefirst.com/blog/brief-history-of-face-recognition-software</ref><br />
In the 1970s, Goldstein, Harmon, and Lesk were able to improve on the Bledsoe facial recognition system by adding 21 specific features. The measurements still needed to be taken by hand but their efforts improved the accuracy of the system.<ref>https://www.facefirst.com/blog/brief-history-of-face-recognition-software</ref><br />
In 1988, Sirovich and Kirby used linear algebra to improve upon the system and began effort toward what became the Eigenface approach. Later in 1991, Turk and Pentland, improved this approach through the development of a system that was able to recognize faces in images. This advancement was the beginning of what became automatic facial recognition. <br />
DARPA, otherwise known as The Defense Advanced Research Projects Agency, and the National Institute of Standards and Technology began the FERET project, Face Recognition Technology, to encourage the use of commercial facial recognition and innovation in the facial recognition field. A database of 2,413 still facial images representing 856 people was created as a part of the project, which included high-resolution 24-bit color images.<br />
<ref>https://www.facefirst.com/blog/brief-history-of-face-recognition-software</ref><br />
==Progress==<br />
<br />
In recent years, facial recognition technology has improved. It is being used equally in different fields, most notably security. Recent developments have even made systems that can recognize differences in identical twins. The 2002 Face Recognition Vendor Test shows that the technology of face recognition capabilities is increasing rapidly. The rate of error in facial recognition has gone down 50%<ref>D. Voth, "Face recognition technology,"IEEE Intelligent Systems, vol. 18, no. 3, pp. 4-7, May-Jun 2003.</ref> according to this test. <br />
<br />
===FRVT 2002===<br />
<br />
The Face Recognition Vendor Test of 2002 is a test that inspected the accuracy of facial recognition and explored areas for future development. The FRVT 2002 tested each face recognition system on its ability to identify correctly, verify the right individual, and "watch-list screening." Watch-list-screening is the process of facial recognition software identifying a particular individual and who that individual is. The test resulted in an 85% identification rate, 96% verification rate, and a 77% detection rate for the top few facial recognition systems.<ref>Flanagan, Patricia A. “Face Recognition Vendor Test (FRVT) 2002.” NIST, 25 Aug. 2016, www.nist.gov/itl/iad/image-group/face-recognition-vendor-test-frvt-2002.</ref><br />
<br />
===3D recognition systems===<br />
<br />
Face recognition technology is gaining popularity, and new features and capabilities are surfacing to improve the accuracy of recognition systems. One particular feature was developed by the Bronstein brothers. Michael and Alexander Bronstein are electrical engineering graduate students and identical twins. As identical twins, they were always being mistaken for one another. Facial recognition software could not tell them apart, so their information was not safe. They created new facial recognition features that utilizes 3D technology to solve the identical twin problem.<ref Name = "Three Dimensional Face Recognition">Bronstein, Alexander, et al. “Three Dimensional Face Recognition.” Numerical Geometry of Non-Rigid Shapes Monographs in Computer Science, 2008, pp. 261–275., doi:10.1007/978-0-387-73301-2_13.</ref> This feature enhances the software because it maps specific features to the face instead of processing the face as a single image.<ref Name = "Three Dimensional Face Recognition"/> The technology is resistant to the effects of lighting and makeup in recognizing faces.<br />
<br />
==Major Uses==<br />
<br />
Facial recognition has proven to be a very useful technology. Being able to access an individual's face has changed the way businesses and institutions handle everyday security concerns.<br />
<br />
===Facebook===<br />
The most prominent form of face recognition that people see is on social media. A research group at Facebook developed DeepFace, a facial recognition algorithm using machine learning, to identify faces with 97% accuracy.<ref> Russell Brandom (July 7, 2014), "Why Facebook is beating the FBI at facial recognition", The Verge</ref> Facebook has implemented this software to automatically tag a user's friend in their photos using face recognition software. <ref name="hi">“Top 8 Ways Facial Recognition Software Is Being Used Today.” Tech Guru, LLC, 14 July 2015, www.techguruit.com/top-8-ways-facial-recognition-software-used-today/</ref><br />
<br />
===Snapchat===<br />
Snapchat uses facial recognition in order to allow users to add filters to their Snapchat photos. The app recognizes a face, and then users can add a dog filter, flower crown, or glasses to their photo.<br />
<br />
===Dating===<br />
<br />
Some dating websites also use facial recognition technology to match people based on facial feature preferences. <ref name="hi">“Top 8 Ways Facial Recognition Software Is Being Used Today.” Tech Guru, LLC, 14 July 2015, www.techguruit.com/top-8-ways-facial-recognition-software-used-today/.</ref> For example, the app "Dating.ai" allows the user to upload a photo of someone that they would like to date, and using facial recognition technology, it would match the user with another user that has similar facial features. <ref> https://nakedsecurity.sophos.com/2017/06/23/dating-app-boss-sees-no-problem-on-face-matching-without-consent/ </ref><br />
<br />
===Crime===<br />
Law enforcement uses face detection to track down criminals, improving the crime rate.<ref name="hi"> “Top 8 Ways Facial Recognition Software Is Being Used Today.” Tech Guru, LLC, 14 July 2015, www.techguruit.com/top-8-ways-facial-recognition-software-used-today/</ref> The US Department of State manages a facial recognition database with over 117 million Americans that the FBI uses to aid investigative efforts. The database contains mostly photos from state-issued licenses and IDs. <ref> "Here's How Many Adult Faces Are Scanned From Facial Recognition Databases" Fortune, 18 October 2016. http://fortune.com/2016/10/18/facial-recognition-database/</ref><br />
<br />
===iPhone X===<br />
Today, facial recognition is integrated into the new iPhone X. The iPhone X uses Face Id, a technology that detects a user's face when looking at the phone and unlocking the device if the face is identified as the users. While scanning one's face, the iPhone uses infrared and visible light scans to identify one's face. These biometric authentication security measures are uniquely designed for the iPhone owner. This feature on the iPhone X relies on many unique facial features such as lighting conditions and accessories to enhance the user experience. The user must look at the phone attentively in order for the facial recognition technology to work. Apple claims that their Face Id technology is secure and that there is a 1 in a 1,000,000 chances that another face will match as another user. <ref>Fleishman, Glenn. “Face ID on the IPhone X: Everything You Need to Know about Apple's Facial Recognition.” Macworld, Macworld, 25 Dec. 2017, www.macworld.com/article/3225406/iphone-ipad/face-id-iphone-x-faq.html.</ref><br />
<br />
==Types of Facial Recognition==<br />
There are many different ways that Facial Recognition has made itself a prominent and rising technology in our society.<br />
<br />
==Benefits==<br />
<br />
*'''Increased Security''' - Facial recognition is mostly used for security purposes. Most business have adapted this technology to add more security to their confidential data and files. <ref name="name">“Face Recognition Is Transforming the Security Industry.” Kairos, 31 Aug. 2017, www.kairos.com/blog/face-recognition-and-the-future-of-security.</ref><br />
*'''Business''' - Facial recognition is also be used in marketing. The software can determine attributes such as gender, age, and ethnicity. Retailers use this information for targeted advertising.<ref name= "name">“Face Recognition Is Transforming the Security Industry.” Kairos, 31 Aug. 2017, www.kairos.com/blog/face-recognition-and-the-future-of-security.</ref> <br />
*'''Airport Security''' - In the near future, airports may be adding facial recognition to their security systems. This would streamline the security process at airports, making travel more efficient and safe.<ref name ="name">“Face Recognition Is Transforming the Security Industry.” Kairos, 31 Aug. 2017, www.kairos.com/blog/face-recognition-and-the-future-of-security.</ref><br />
*'''Event Feedback Research''' - Facial recognition technology allows for better understanding human's facial expressions which in turn can be used to figure out what a particular person is thinking at that particular moment. <ref> https://blog.capterra.com/3-major-benefits-of-facial-recognition-technology-for-event-planners/ </ref><br />
<br />
[[File:facemanbhumika.JPG|right|thumb|600px]]<br />
<br />
==Ethical Concerns==<br />
<br />
As facial recognition technology has improved, more users have developed opinions on the nature of the technology. <br />
<br />
===Security===<br />
While facial recognition technology aids security measures, many individuals fear that it is an invasion of privacy. People fear false positives, meaning the facial recognition system could wrongly identify an individual <ref> “False-Positive.” Dictionary.com, Dictionary.com, www.dictionary.com/browse/false-positive.</ref>. This would have many repercussions including: allowing them access to someone else's private information and/or falsely accuse someone of a crime they did not commit.<br />
<br />
===Identity===<br />
There are a plethora of issues related to what a person ''should'' look like and how the biases of programmers who create the IA for these technologies can be included in facial recognition software. Many individuals have plural selves or multiple identities.<ref>Cocking, Dean. (2008). “Plural Selves and Relational Identity: Intimacy and Privacy Online,” in Information Technology and Moral Philosophy, edited by Jeroen Van Den Hoven and John Weckert. Cambridge University Press, pp. 123-41.</ref> Yet, facial recognition software only allows for one identity to be recognized and allowed access to the information it is protecting. For people who have multiple identities, they will only have access to certain information, regarding themselves, when they choose to identify a certain way. This raises many ethical dilemmas about who has the right to this information and why only certain individual's identities should be allowed to access their protected information. <br />
<br />
===Power===<br />
The abuse of power with this new technology is a large ethical concern. For example, a parent or spouse could track their child or significant other without their knowledge. This again addresses the issue of privacy invasion.<ref>K.W. Bower. "Face recognition technology: security versus privacy" IEEE Technology and Society Magazine, vol. 23, no. 1, pp. 9-19, Spring 2004</ref> A parent may also program their facial recognition into their child's phone without them knowing, allowing the parent to have unauthorized complete access to all information on the device.<br />
<br />
== References ==<br />
{{resource|<references/>}}</div>Hillcmhttp://si410wiki.sites.uofmhosting.net/index.php?title=Waze&diff=70651Waze2018-04-09T21:28:02Z<p>Hillcm: </p>
<hr />
<div>{{Nav-Bar|Topics##}}<br><br />
{{SoftwareInfoBox<br />
|NAME=''Waze''<br />
|HEIGHT=680<br />
|LOGO=Waze.jpg<br />
|SCREENIMAGE=waze2.jpeg<br />
|CAPTION="Waze"<br />
|IMAGEURL=https://www.waze.com<br />
|TEXT=Waze<br />
|TYPE=GPS Software<br />
|LAUNCH=2008<br />
|STATUS=Active<br />
|PLATFORM=iOS, Android, Blackberry 10, Windows Mobile, Windows Phone, Symbian, Maemo<br />
|PRODUCT=4.0 (IOS);<br><br />
3.9.9.0 (Android); <br><br />
3.7.4.5 (Windows Phone 8); <br><br />
2.1.99 (Symbian); <br><br />
2.0.2.304 (BlackBerry); <br><br />
2.1.99.114 (Windows Mobile 6.x); / 25 November 2015; 2 months ago<br />
|DEVELOPER=Google<br />
|SITEURL=https://www.waze.com<br />
|URLTEXT= Waze<br />
}}<br />
<br />
''{{initial|W}}aze'' (pronounced ''ways'') is a [[wikipedia:GPS|GPS-based]] mobile application for smartphones and tablets that provides geographical navigation by relying on [[wikipedia:crowdsourcing|crowdsourcing]] for traffic data and user-generated content of various traffic updates. The app offers turn-by-turn directions, traffic reports, highway patrol alerts, gas prices, road closures, and the ability to chat with other users that have an account with the app. Waze not only connects users but also the government in its app by providing a data sharing program that provides traffic analysis for municipal work. Now owned by [[wikipedia:Google|Google]], Waze is the world's largest community-based traffic and navigation app by serving drivers in 13 countries worldwide.<ref> Waze.com [https://www.waze.com/] Retrieved 12 January 2016 </ref> Waze is a free application to use and provides GPS navigation to communities. <br />
<br><br />
<br />
=History=<br />
Waze, formerly known as FreeMap Israel, began out of the frustration that co-founder Ehud Shabati had with traditional GPS systems. <ref name = "history">Eye2Israel. Waze-A Brilliant Israeli Invention[http://www.israel1.org/waze-a-brilliant-israeli-invention/] Retrieved 4 April 2018.</ref> What started as a solo project of Shabati's soon expanded to a community project to generate a free map of Israel.<ref> Waze [https://en.wikipedia.org/wiki/Waze#cite_note-14/] Retrieved 14 February 2016 </ref> The first round of funding came in 2008 from BlueRun Ventures and Magma Venture Partners, with the second round in 2010. FreeMap Israel changed its name to Waze in 2009. After a third round 2011 from Horizons Ventures and Kleiner Perkins Caufield & Byers, Google bought Waze in 2013.<ref> MacMillian, Douglas, et al. Google Is Said to Be Acquiring Waze for $1.1 Billion.[https://www.bloomberg.com/news/articles/2013-06-09/google-is-said-to-be-acquiring-waze-for-1-1-billion] June 10, 2013. Retrieved 9 April 2018.</ref><br />
<br />
=== Acquisition by Google ===<br />
While [[wikipedia:Facebook|Facebook]], [[wikipedia:Apple|Apple]], and others were interested in purchasing Waze, Google acquired Waze in 2013 for $1.3 billion. <ref> Lobello, Carmel. Why Waze is Worth $1.3 Billion. [http://theweek.com/articles/463399/why-waze-worth-13-billion-google] 10 June 2013. Retrieved 9 April 2018 </ref>. [[wikipedia:Federal Trade Commission| The U.S. Federal Trade Commission]] investigated the deal as Google was already a player in the mapping market. In the end, the antitrust challenge was not aggressive enough to impact competition, and the case was dropped.<ref> Grey, Melissa. FTC will not challenge Google's $1 billion Waze acquisition [http://www.engadget.com/2013/10/01/ftc-will-not-challenge-google-waze-acquisition/] 1 October 2013. Retrieved 14 February 2016. </ref><br />
<br />
=Overview=<br />
===Personalization===<br />
Users are able to change the display of the map, the mode (day or night), and the sound (voice) for navigation. The language, units, and events radius can also be changed depending on the user's preference. Waze also has the ability to play the navigation through the user's speaker phone or [[wikipedia:Bluetooth|Bluetooth]] device. Users can update their navigation preferences to avoid toll roads, freeways, and unpaved roads, finding alternate routes to get to the same destination. Waze can also sync with a user's calendar, Facebook profile, and Twitter profile. Users can also set a preferred gas station, gas type, and then sort gas stations by distance, price, or brand. <br />
<br />
Users can set a ''Home'' and ''Work'' address for easy, one-tap navigation, as well as updates on unusual traffic events. Users can choose a "mood" for their car which determines how they are displayed on the app if they have an account. There is an option for users to join teams, such as with local TV stations, so that their contributions are included in the morning traffic update. Users can also add their friends and communicate in different ways.<br />
<br />
===Live Traffic Updates===<br />
The main interface of Waze is equipped with a fully interactive map, based on the users' geolocation. When the user opens this iPhone application, the cellular phone transmits its location to the application servers, and traffic updates in real time are pulled from Waze users who are near you. This allows drivers to make decisions on their routes, based on traffic information that users have contributed recently. Although this application has communication capabilities, the map is designed well enough that the average user (someone looking to get traffic updates) can look at the map and read all necessary information without having to communicate with other users. Also, users can update other users on traffic, accidents, police cars, and potholes on the road. When a user passes that location and doesn't see a police there anymore, or the accident got cleaned up, they can update other users that it is not there anymore.<br />
<br />
===User Interaction===<br />
Users can communicate in different ways. If they are friends on Waze, they are able to send their ETA, send a "Beep Beep", call them, or send a private message. Users can also thank you by giving you a thumbs up on something you reported, as well as send a map chat. It is not required that a user be friends with a user to communicate. Rather, it depends on the other Wazers that are traveling in the same area as you. <br />
<br />
===User Contribution===<br />
[[File:Reports.PNG|250px|framed|right|Waze Reports]]<br />
Users earn points by reporting to traffic updates. This can be done by reporting the traffic, police, an accident, a hazard on the road, gas prices, chatting, reporting map issue, taking a picture of a place, reporting a camera or a road closure. Each report is worth a different amount of points. See tables below.<ref> Google Support. Earn Points in Waze. [https://support.google.com/waze/answer/6078593?hl=en/ Google Support Waze Help] Retrieved 9 April 2018. </ref> <br />
<br />
{| class="wikitable"<br />
|-<br />
! Activity !! Points !! Unit<br />
|-<br />
| Road reporting || 6 || per report<br />
|-<br />
| Gas/fuel price reports || 8 || per report<br />
|-<br />
| Report comments || 3 || per comment<br />
|-<br />
| Editing the map || 3 || per edit<br />
|-<br />
| Solving map update requests || 3 || per request solved <br />
|-<br />
| Adding street names || 3 || per name<br />
|-<br />
| Adding house numbers || 1 || per segment<br />
|-<br />
| Adding Place Photo || 6 || per photo<br />
|-<br />
| Updating Place || 3 || per detail added<br />
|-<br />
| Forum posts || 2 || per 3 posts<br />
|-<br />
| Road goodies || 2 || per goodie<br />
|}<br />
<br />
Users can gain points per mile/KM driven with the Waze application is running. <br />
{| class="wikitable"<br />
|-<br />
! Activity !! Per mile !! Per KM <br />
|-<br />
| Normal driving || 5 || 3.2<br />
|-<br />
| Road munching || 16 || 10<br />
|-<br />
| New road recording (paving) || 64 || 40<br />
|}<br />
Wazers can also earn bonus points by achieving set goals. Examples are 200 points for adding your first friend, 30 points for your first weekend report, and so on. These points acts an incentives for users to contribute in a way they might not otherwise.<br />
<br />
===Waze Levels===<br />
Waze keeps scores by the reports and miles driven by the user. First time users are labeled as a Waze Baby. Users remain a Waze Baby for their first 100 miles of travel. After new users complete their first 100 miles, they become a Waze GrownUp. Once a GrownUp, users can choose a mood for their Waze. Levels continue to Waze Warrior, where the user is in the top 10% of high scorers in their state, Waze Knight, where the user is in the top 4% of high scorers their state, and Waze Royalty, where the user is in the top 1% of high scorers in their state. Each level accompanied by a symbol: a shield, a sword, and a crown respectively. There is a final option to be a Waze editor by contributing to the development of the map itself. With this accomplishment comes three exclusive moods.<br />
<br />
=Government Interaction=<br />
Waze is partnering with governments by sharing their real-time data for planning purposes, such as garbage collection routes.<ref> Ungerleider, Neal. Waze Is Driving Into City Hall. [http://www.fastcompany.com/3045080/waze-is-driving-into-city-hall] 15 April 2016. Retrieved 16 February 2016.</ref> Furthermore, Waze has started the Connected Citizens Program. This is designed to be an exchange of information between Waze and local governments. The governments get up to date traffic and accident information, allowing them to respond faster to incidents. In turn, Waze gets information about the roads such as any information from censors as well as current available accident and construction reports from the government to give them concise, thorough, up to date information about the current road conditions. The program is currently global, with 72 cities participating in North America, 10 in Latin America, 14 in Europe, 2 in the Middle East, and 2 in the Asia-Pacific region. Local government agencies, municipalities, cities, states, departments of transportation, departments of public works, utility companies, 911 emergency dispatch centers, and police departments are all eligible to apply to be a part of the Connected Citizens Program.<br />
<ref> Connected Citizens Program [https://wiki.waze.com/wiki/Connected_Citizens_Program] Retrieved 9 April 2018.</ref><br />
<br />
=Ethical Concerns=<br />
The information on the app is provided by other users in the form of a product and resource to other users of the application. The information can be truthful or misleading, depending on the intentions of the <br />
a Waze user. It has increased social and ethical concerns for those who do and do not use the app. <br />
<br />
===Dangerous Driving===<br />
Distracted driving is one of the leading causes of car accidents in the United States. Over 600,000 vehicles are being driven by someone who is using a hand-held device. <ref> Distracted Driving [https://www.nhtsa.gov/risky-driving/distracted-driving] Retrieved 16 February 2016</ref> Waze allows their users to input real-time traffic information to be used as a product and resource to other users. Waze shows more traffic information on their app than any other GPS application.<ref> Did Google Just Buy a Dangerous Driving App? Kevin Roose, 14 June 2013 Did Google Just Buy a Dangerous Driving App? Retrieved 16 February 2016</ref> Waze implicitly adds to the 421,000 people injured in motor vehicle accidents involving a distracted driver. <ref> Hengesbach, Coleman. Does the App Waze Pose a Risk To Drivers [https://www.dolmanlaw.com/app-waze-pose-risk-drivers/] 10 February 2015. Retrieved 16 February 2016</ref>Waze has taken action by disabling text input while a vehicle is in motion. It can be overridden if the user specifies that they are in the passenger's seat. If a user selects the passenger seat, they are prompted to pull over their vehicle and provide their destination. Waze will also detect the speed limit of the vehicle and let the user know if they are maintaining the correct speed.<br />
<br />
Waze also allows nearby stores to have the ability to advertise their company on Waze, which creates a pop-up that blocks most of the screen. The only way to get rid of the advertisement is to click on the "X" button, causing the driver to take a hand off the wheel to look at their phone. Many users on the internet have complained about this feature and have voiced that they would rather pay for a pro version of Waze without the advertisements.<br />
<br />
===Hacking, Trolling, and Privacy===<br />
Students at Technion-Israel Institute of Technology staged a traffic jam on Waze by creating fake profiles and providing false information on a highway. While no real accidents occurred in this incident, this example reveals the potential of using Waze for more dangerous cyber attacks and trolling in the future, since any user could potentially exploit the system.<ref> Atherton, Kelsey D. Israeli Students Spoof Waze App With Fake Traffic Jam [[http://www.popsci.com/article/gadgets/israeli-students-spoof-waze-app-fake-traffic-jam]] 31 March 2014. Retrieved 16 February 2016.</ref> Another way users can misuse this application is by inputting wrong information about construction sites for traffic purposes. By doing this, users could be misguided by directions to avoid this traffic that is not existent thus taking them on an unnecessary detour. Apps such as Waze that rely heavily on user contribution often include users who troll the system by creating fake alerts, which can threaten the integrity of the system. If the quality and reliability of Waze and its features become too low, and the platform becomes a place where information is hard to trust, this will only raise the costs of using Waze because of its tendency to distract drivers, potentially to a point where the costs outweigh the benefits of using the phone application.<br />
<br />
Researchers at the University of California, Santa Barbara recently discovered the ability to create thousands of "ghost drivers" on the road that allows them to track the drivers surrounding them. The researchers have been able to track an individual's location over multiple days through this vulnerability in the application. They are able to see exactly where a user is and where they have stopped previously giving them information at a hotel they are staying at, for example. <ref> Hill, Kashmir. If You Use Waze, Hackers Can Stalk You [http://fusion.net/if-you-use-waze-hackers-can-stalk-you-1793856445] 26 April 2016. Retrieved 23 April 2017.</ref> <br />
<br />
[[File:wazepolice.jpg|110px|left|thumb|Example of a Waze Police Alert.]]<br />
<br />
===Mistreatment of Police===<br />
Waze has become an issue in the public enforcement sector due to the fact that users are able to report the location of police on the roads. Wazers are able to specify whether the police are visible or hidden and at what time they saw the police car. While this allows users to evade or ensure that they drive safely and slowly while passing patrol cars, law enforcement is indubitably concerned by this feature because it can be used by people who intend to cause harm to police. Sergio Kopelev, a sheriff in Southern California, likens Waze to a cop-stalking application that threatens the safety of the police force and highway patrol. <br />
<br />
Google counters by stating that this feature actually keeps citizens safe and promotes faster emergency response.<ref> Police say Waze cop-tracker is threat to officers. [http://www.cbsnews.com/news/police-say-waze-cop-tracker-is-threat-to-officers/] 26 January 2015. Retrieved 16 February 2016. </ref> Thus, there is a gray line between keeping the safety and privacy of security officers and promoting safer and slower driving behavior by showing where police are located on the streets, which causes tension with the police department as the benefits and drawbacks of this GPS phone application are debated.<br />
<br />
Charlie Beck, a Los Angeles Police Chief, stated that police hate the application by putting both the police and other civilians lives in danger. The application shows criminals where they can find law enforcement on the road which would help criminals avoid them while they are on the run. <ref> Bond, John-Michael. Cops hate Google’s Waze App. [https://www.dailydot.com/debug/waze-may-be-outlawed-in-brazil/] 6 September 2016. Retrieved 23 April 2017. </ref><br />
<br />
===Speed Limit Monitoring===<br />
Waze has been implementing a new update that notifies the user when they are going over the speed limit.<ref> Korosec, Kirsten. New Waze Feature Helps Drivers Avoid Speeding Tickets. [http://fortune.com/2016/03/29/waze-speed-limit-google/] 29 March 2016. Retrieved 9 April 2018. </ref> This can be a very useful tool for drivers who have a 'lead foot' and don't realize that they are actually going over the speed limit. There may be ethical concerns that arise from this information. Waze, which is owned by [[Google]] which participated in PRISM, has this information. Police could utilize the information that Waze gathers about the speed of its users to set up more speed traps and blocks, putting users in an untrustworthy position regarding the app. In doing so, drivers could get a speeding ticket because they were in the wrong place at the wrong time because the police had a lead of where drivers speed more. However, it's feature to alert the location of Police could help keep this feature as a net-positive for users rather than a crutch.<br />
<br />
=References=<br />
{{resource|<br />
<references/><br />
}}<br />
<br />
=External Links=<br />
{{resource|<br />
*[https://www.waze.com Waze's Official Website]<br />
*[https://en.wikipedia.org/wiki/Waze Wikipedia Page]<br />
}}<br />
<br />
[[Category:GPS]]<br />
[[Category:Mobile Application]]<br />
[[Category:Crowdsourcing]]<br />
<br />
([[Topics|back to index]])</div>Hillcm