Search This Blog

Wednesday, February 7, 2024

Workplace health surveillance

From Wikipedia, the free encyclopedia

Workplace health surveillance or occupational health surveillance (U.S.) is the ongoing systematic collection, analysis, and dissemination of exposure and health data on groups of workers. The Joint ILO/WHO Committee on Occupational Health at its 12th Session in 1995 defined an occupational health surveillance system as "a system which includes a functional capacity for data collection, analysis and dissemination linked to occupational health programmes".

The concept is new to occupational health and is frequently confused with medical screening. Health screening refers to the early detection and treatment of diseases associated with particular occupations, while workplace health surveillance refers to the removal of the causative factors.

Aspects

Medical surveillance

The mission of a medical surveillance program is to keep workers healthy and ensure that employers are meeting OSHA standards in health and safety. Medical surveillance has an emphasis on prevention: it is designed to detect potential workplace hazards before irreversible health effects can occur. Clinicians with expertise in occupational health, industrial exposures, and respiratory protection screen workers with physical examinations, blood testing, spirometry (a measurement lung function), and audiometry. Screenings are performed at set intervals, often annually. The clinicians providing medical surveillance services include board-certified occupational and environmental medicine physicians, mid-level practitioners, nurses, and NIOSH-certified spirometry technicians.

Medical surveillance targets actual health events or a change in a biologic function of an exposed person or persons. Medical surveillance is a second line of defense behind the implementation of direct hazard controls such as engineering controls, administrative controls, and personal protective equipment. NIOSH recommends the medical surveillance of workers when they are exposed to hazardous materials. The elements of a medical surveillance program generally include the following:

  1. An initial medical examination and collection of medical and occupational histories
  2. Periodic medical examinations at regularly scheduled intervals, including specific medical screening tests when warranted
  3. More frequent and detailed medical examinations as indicated on the basis of findings from these examinations
  4. Post-incident examinations and medical screening following uncontrolled or non-routine increases in exposures such as spills
  5. Worker training to recognize symptoms of exposure to a given hazard
  6. A written report of medical findings
  7. Employer actions in response to identification of potential hazards

When the purpose of a medical surveillance program is to detect early signs of work-related illness and disease, it is considered a type of medical screening, to detect preclinical changes in organ function or changes before a person would normally seek medical care and when intervention is beneficial The establishment of a medical screening program should follow established criteria, and specific disease endpoints must be able to be determined by the test selected.

Medical examinations and tests are used in many workplaces to determine whether an employee is able to perform the essential functions of the job. Medical surveillance of workers is also required by law in the United States when there is exposure to a specific workplace hazard, and OSHA has a number of standards that require medical surveillance of workers In addition to substance-specific standards, OSHA has standards with broader applicability. For example, employers must follow the medical evaluation requirements of OSHA's respiratory protection standard (29 CFR 1910.134) when respirators are necessary to protect worker health. Likewise, the OSHA standard for occupational exposure to hazardous chemicals in laboratories (29 CFR 1910.1450) requires medical consultation following the accidental release of hazardous chemicals. NIOSH also recommends medical surveillance, including screening, of workers when there is exposure to certain occupational hazards.

Hazard surveillance

Hazard surveillance involves identifying potentially hazardous practices or exposures in the workplace and assessing the extent to which they can be linked to workers, the effectiveness of controls, and the reliability of exposure measures. Workplace hazards can be chemical, biological, physical, ergonomic, psychosocial, or safety-related in nature. Hazard surveillance is an essential component of any occupational health surveillance effort and is used for defining the elements of the risk management program. Critical elements of a risk management program include recognizing potential exposures and taking appropriate actions to minimize them (for example, implementing engineering controls, employing good work practices, and using personal protective equipment). Hazard surveillance should include the identification of work tasks and processes that involve the production and use of hazardous materials, and should be viewed as one of the most critical components of any risk management program.

Hazard surveillance includes elements of hazard and exposure assessment. The hazard assessment involves reviewing the best available information concerning toxicity of materials. Such an assessment may come from databases, texts, and published literature or available regulations or guidelines. Human studies, such as epidemiologic investigations and case series or reports, and animal studies may also provide valuable information. The exposure assessment involves evaluating relevant exposure routes (inhalation, ingestion, dermal, and/or injection), amount, duration, and frequency (i.e., dose), as well as whether exposure controls are in place and how protective they are. When data are not available, this will be a qualitative process.

Occupational Health Indicators (OHIs)

In 1998, the Council of State and Territorial Epidemiologists (CSTE) joined the CDC's National Institute for Occupational Safety and Health (NIOSH) to form the Occupational Health Surveillance Work Group in order to prioritize occupational health conditions to be placed under surveillance. The Work Group recommended that states use 19 occupational health indicators based on the availability of easily obtainable statewide data, the public health importance of the occupational health effect or exposure, and the potential for intervention activities.

These indicators are useful in assessing the ongoing policies and preventive measures but they also have some limitations. Among the major limitations are the underreporting of occupational health disorders, the inability to recognize potential occupational association of the disorder by health care workers, difficulties in attributing diseases with long latency or multiple causes (such as lung cancer) to occupational exposures, exclusion of special populations (such as self-employed or military personnel), and differences between state-specific databases.

Data Sources

Data for the OHIs come from multiple sources including:

Tools

The usefulness of a surveillance tool may depend on what hazards are present in the workplace and the health effects those hazards may cause. For example, hearing tests will be helpful when noise exposures are present, while tests assessing lung function or biomonitoring may be useful when airborne agents are present. It is also important to distinguish between tools using medical surveillance (measuring health effects) and hazard surveillance/exposure assessment (physical measurements of the type and severity of hazard present). Periodic testing, including a baseline exam when an employee is hired, can often help detect a decline in function by comparing previous results.

Hearing exam

Medical surveillance tools

  • General
  • Chemical or particulate exposures
    • Pulmonary function testing is a way to measure lung function. It can assist in the early detection of occupational lung diseases and provides information about the severity and staging of asthma and other restrictive lung diseases.
      • Spirometry tests measure how quickly air can be pushed out from the lungs and is useful in evaluating diseases that cause obstruction to flow.
      • Plethysmography measures lung volume by having the subject perform breathing tests inside of an air tight box.
      • Flow rates can be measured by asking subjects to blow air out of the lungs as fast and as hard as possible from their largest inhaled breathe (inspiration) to the maximum exhaled breathe (expiration). The volume exhaled in the first second is called the forced expiratory volume in one second (FEV1). These flow rates can be indicators of disease that cause obstruction to airflow, such as asthma, chronic bronchitis, and emphysema.
    • Biomonitoring measures total body burden of a hazardous chemical in a worker via analysis of biological specimens such as urine or blood. Non-invasive procedures are preferred when possible.
  • Noise exposures
  • Other
    • Hand arm assessment (vibration) and dermatological assessments (chemical) are other important tools for workplace health surveillance.

Confidentiality of information

Most countries have specific regulations for individual health data, which require that the worker be informed if this information is ever shared with any third party. Occupational Health Records (OHR) have the same protections as any medical record that has confidential health information. Employers must store OHR in a secured area free from unauthorized access, use, or disclosure. Workers should have the right to access this information whenever they wish.

Spyware

From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Spyware

Spyware (a portmanteau for spying software) is any software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in malware and in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.

Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

History

The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that Reader Rabbit, educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel. Since then, "spyware" has taken on its present sense.

According to a 2005 study by AOL and the National Cyber-Security Alliance, 61 percent of surveyed users' computers were infected with some form of spyware. 92 percent of surveyed users with spyware reported that they did not know of its presence, and 91 percent reported that they had not given permission for the installation of the spyware. As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems. Computers on which Internet Explorer (IE) was the primary browser are particularly vulnerable to such attacks, not only because IE was the most widely used, but also because its tight integration with Windows allows spyware access to crucial parts of the operating system.

Before Internet Explorer 6 SP2 was released as part of Windows XP Service Pack 2, the browser would automatically display an installation window for any ActiveX component that a website wanted to install. The combination of user ignorance about these changes, and the assumption by Internet Explorer that all ActiveX components are benign, helped to spread spyware significantly. Many spyware components would also make use of exploits in JavaScript, Internet Explorer and Windows to install without user knowledge or permission.

The Windows Registry contains multiple sections where modification of key values allows software to be executed automatically when the operating system boots. Spyware can exploit this design to circumvent attempts at removal. The spyware typically links itself to each location in the registry that allows execution. Once running, the spyware will periodically check if any of these links are removed. If so, they will be automatically restored. This ensures that the spyware will execute when the operating system is booted, even if some (or most) of the registry links are removed.

Overview

Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans; examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

While the term spyware suggests software that monitors a user's computer, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

Sometimes, spyware is included along with genuine software, and may come from a malicious website or may have been added to the intentional functionality of genuine software (see the paragraph about Facebook, below). In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices, especially for computers running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

In German-speaking countries, spyware used or made by the government is called govware by computer experts (in common parlance: Regierungstrojaner, literally "Government Trojan"). Govware is typically a trojan horse software used to intercept communications from the target computer. Some countries, like Switzerland and Germany, have a legal framework governing the use of such software. In the US, the term "policeware" has been used for similar purposes.

Use of the term "spyware" has eventually declined as the practice of tracking users has been pushed ever further into the mainstream by major websites and data mining companies; these generally break no known laws and compel users to be tracked, not by fraudulent practices per se, but by the default settings created for users and the language of terms-of-service agreements.

In one documented example, on CBS/CNet News reported, on March 7, 2011, an analysis in The Wall Street Journal revealed the practice of Facebook and other websites of tracking users' browsing activity, which is linked to their identity, far beyond users' visits and activity on the Facebook site itself. The report stated: "Here's how it works. You go to Facebook, you log in, you spend some time there, and then ... you move on without logging out. Let's say the next site you go to is The New York Times. Those buttons, without you clicking on them, have just reported back to Facebook and Twitter that you went there and also your identity within those accounts. Let's say you moved on to something like a site about depression. This one also has a tweet button, a Google widget, and those, too, can report back who you are and that you went there." The Wall Street Journal analysis was researched by Brian Kennish, founder of Disconnect, Inc.

Routes of infection

Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities.

Most spyware is installed without knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse, spy gadgets that look like normal devices but turn out to be something else, such as a USB Keylogger. These devices actually are connected to the device as memory units but are capable of recording each stroke made on the keyboard. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.

The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the Windows operating system. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser's behaviour.

Effects and behaviors

A spyware rarely operates alone on a computer; an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes are also common. Usually, this effect is intentional, but may be caused from the malware simply requiring large amounts of computing power, disk space, or network usage. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.

In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another malware infection. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality.

Moreover, some types of spyware disable software firewalls and antivirus software, and/or reduce browser security settings, which opens the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances increase the likelihood that users will take action to remove the programs.

Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Some keylogger software is freely available on the internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured, they also are often capable of collecting screen captures from the computer.

A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can reduce the privileges of specific vulnerable Internet-facing processes, such as Internet Explorer.

Since Windows Vista is, by default, a computer administrator that runs everything under limited user privileges, when a program requires administrative privileges, a User Account Control pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows. Spyware is also known as tracking software.

Remedies and prevention

As the spyware threat has evolved, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system.

Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system. For instance, some spyware cannot be completely removed by Symantec, Microsoft, PC Tools.

Anti-spyware programs

Many programmers and some commercial firms have released products designed to remove or block spyware. Programs such as PC Tools' Spyware Doctor, Lavasoft's Ad-Aware SE and Patrick Kolla's Spybot - Search & Destroy rapidly gained popularity as tools to remove, and in some cases intercept, spyware programs. On December, 2004, Microsoft acquired the GIANT AntiSpyware software, re‑branding it as Microsoft AntiSpyware (Beta 1) and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In November, 2005, it was renamed Windows Defender.

Major anti-virus firms such as Symantec, PC Tools, McAfee and Sophos have also added anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However, recent versions of these major firms home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses. Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection against these threats.

Other Anti-spyware tools include FlexiSPY, Mobilespy, mSPY, TheWiSPY, and UMobix.

How anti-spyware software works

Anti-spyware programs can combat spyware in two ways:

  1. They can provide real-time protection in a manner similar to that of anti-virus protection: all incoming network data is scanned for spyware, and any detected threats are blocked.
  2. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed into the computer. This kind of anti-spyware can often be set to scan on a regular schedule.

Such programs inspect the contents of the Windows registry, operating system files, and installed programs, and remove files and entries which match a list of known spyware. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Earlier versions of anti-spyware programs focused chiefly on detection and removal. Javacool Software's SpywareBlaster, one of the first to offer real-time protection, blocked the installation of ActiveX-based spyware.

Like most anti-virus software, many anti-spyware/adware tools require a frequently updated database of threats. As new spyware programs are released, anti-spyware developers discover and evaluate them, adding to the list of known spyware, which allows the software to detect and remove new spyware. As a result, anti-spyware software is of limited usefulness without regular updates. Updates may be installed automatically or manually.

A popular generic spyware removal tool used by those that requires a certain degree of expertise is HijackThis, which scans certain areas of the Windows OS where spyware often resides and presents a list with items to delete manually. As most of the items are legitimate windows files/registry entries it is advised for those who are less knowledgeable on this subject to post a HijackThis log on the numerous antispyware sites and let the experts decide what to delete.

If a spyware program is not blocked and manages to get itself installed, it may resist attempts to terminate or uninstall it. Some programs work in pairs: when an anti-spyware scanner (or the user) terminates one running process, the other one respawns the killed program. Likewise, some spyware will detect attempts to remove registry keys and immediately add them again. Usually, booting the infected computer in safe mode allows an anti-spyware program a better chance of removing persistent spyware. Killing the process tree may also work.

Security practices

To detect spyware, computer users have found several practices useful in addition to installing anti-spyware programs. Many users have installed a web browser other than Internet Explorer, such as Mozilla Firefox or Google Chrome. Though no browser is completely safe, Internet Explorer was once at a greater risk for spyware infection due to its large user base as well as vulnerabilities such as ActiveX but these three major browsers are now close to equivalent when it comes to security.

Some ISPs—particularly colleges and universities—have taken a different approach to blocking spyware: they use their network firewalls and web proxies to block access to Web sites known to install spyware. On March 31, 2005, Cornell University's Information Technology department released a report detailing the behavior of one particular piece of proxy-based spyware, Marketscore, and the steps the university took to intercept it. Many other educational institutions have taken similar steps.

Individual users can also install firewalls from a variety of companies. These monitor the flow of information going to and from a networked computer and provide protection against spyware and malware. Some users install a large hosts file which prevents the user's computer from connecting to known spyware-related web addresses. Spyware may get installed via certain shareware programs offered for download. Downloading programs only from reputable sources can provide some protection from this source of attack.

Individual users can use cellphone / computer with physical (electric) switch, or isolated electronic switch that disconnects microphone, camera without bypass and keep it in disconnected position where not in use, that limits information that spyware can collect. (Policy recommended by NIST Guidelines for Managing the Security of Mobile Devices, 2013).

Applications

"Stealware" and affiliate fraud

A few spyware vendors, notably 180 Solutions, have written what the New York Times has dubbed "stealware", and what spyware researcher Ben Edelman terms affiliate fraud, a form of click fraud. Stealware diverts the payment of affiliate marketing revenues from the legitimate affiliate to the spyware vendor.

Spyware which attacks affiliate networks places the spyware operator's affiliate tag on the user's activity – replacing any other tag, if there is one. The spyware operator is the only party that gains from this. The user has their choices thwarted, a legitimate affiliate loses revenue, networks' reputations are injured, and vendors are harmed by having to pay out affiliate revenues to an "affiliate" who is not party to a contract. Affiliate fraud is a violation of the terms of service of most affiliate marketing networks. Mobile devices can also be vulnerable to chargeware, which manipulates users into illegitimate mobile charges.

Identity theft and fraud

In one case, spyware has been closely associated with identity theft. In August 2005, researchers from security software firm Sunbelt Software suspected the creators of the common CoolWebSearch spyware had used it to transmit "chat sessions, user names, passwords, bank information, etc."; however it turned out that "it actually (was) its own sophisticated criminal little trojan that's independent of CWS." This case is currently under investigation by the FBI.

The Federal Trade Commission estimates that 27.3 million Americans have been victims of identity theft, and that financial losses from identity theft totaled nearly $48 billion for businesses and financial institutions and at least $5 billion in out-of-pocket expenses for individuals.

Digital rights management

Some copy-protection technologies have borrowed from spyware. In 2005, Sony BMG Music Entertainment was found to be using rootkits in its XCP digital rights management technology Like spyware, not only was it difficult to detect and uninstall, it was so poorly written that most efforts to remove it could have rendered computers unable to function. Texas Attorney General Greg Abbott filed suit, and three separate class-action suits were filed. Sony BMG later provided a workaround on its website to help users remove it.

Beginning on April 25, 2006, Microsoft's Windows Genuine Advantage Notifications application was installed on most Windows PCs as a "critical security update". While the main purpose of this deliberately uninstallable application is to ensure the copy of Windows on the machine was lawfully purchased and installed, it also installs software that has been accused of "phoning home" on a daily basis, like spyware. It can be removed with the RemoveWGA tool.

Personal relationships

Stalkerware is spyware that has been used to monitor electronic activities of partners in intimate relationships. At least one software package, Loverspy, was specifically marketed for this purpose. Depending on local laws regarding communal/marital property, observing a partner's online activity without their consent may be illegal; the author of Loverspy and several users of the product were indicted in California in 2005 on charges of wiretapping and various computer crimes.

Browser cookies

Anti-spyware programs often report Web advertisers' HTTP cookies, the small text files that track browsing activity, as spyware. While they are not always inherently malicious, many users object to third parties using space on their personal computers for their business purposes, and many anti-spyware programs offer to remove them.

Shameware

Shameware or "accountability software" is a type of spyware that is not hidden from the user, but operates with their knowledge, if not necessarily their consent. Parents, religious leaders or other authority figures may require their children or congregation members to install such software, which is intended to detect the viewing of pornography or other content deemed inappropriate, and to report it to the authority figure, who may then confront the user about it.

Spyware programs

These common spyware programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by Claria are collectively known as "Gator". Likewise, programs that are frequently installed together may be described as parts of the same spyware package, even if they function separately.

Spyware vendors

Spyware vendors include NSO Group, which in the 2010s sold spyware to governments for spying on human rights activists and journalists. NSO Group was investigated by Citizen Lab.

Rogue anti-spyware programs

Malicious programmers have released a large number of rogue (fake) anti-spyware programs, and widely distributed Web banner ads can warn users that their computers have been infected with spyware, directing them to purchase programs which do not actually remove spyware—or else, may add more spyware of their own.

The recent proliferation of fake or spoofed antivirus products that bill themselves as antispyware can be troublesome. Users may receive popups prompting them to install them to protect their computer, when it will in fact add spyware. It is recommended that users do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate. Some known offenders include:

Fake antivirus products constitute 15 percent of all malware.

On January 26, 2006, Microsoft and the Washington state attorney general filed suit against Secure Computer for its Spyware Cleaner product.

Legal issues

Criminal law

Unauthorized access to a computer is illegal under computer crime laws, such as the U.S. Computer Fraud and Abuse Act, the U.K.'s Computer Misuse Act, and similar laws in other countries. Since owners of computers infected with spyware generally claim that they never authorized the installation, a prima facie reading would suggest that the promulgation of spyware would count as a criminal act. Law enforcement has often pursued the authors of other malware, particularly viruses. However, few spyware developers have been prosecuted, and many operate openly as strictly legitimate businesses, though some have faced lawsuits.

Spyware producers argue that, contrary to the users' claims, users do in fact give consent to installations. Spyware that comes bundled with shareware applications may be described in the legalese text of an end-user license agreement (EULA). Many users habitually ignore these purported contracts, but spyware companies such as Claria say these demonstrate that users have consented.

Despite the ubiquity of EULAs agreements, under which a single click can be taken as consent to the entire text, relatively little caselaw has resulted from their use. It has been established in most common law jurisdictions that this type of agreement can be a binding contract in certain circumstances. This does not, however, mean that every such agreement is a contract, or that every term in one is enforceable.

Some jurisdictions, including the U.S. states of Iowa and Washington, have passed laws criminalizing some forms of spyware. Such laws make it illegal for anyone other than the owner or operator of a computer to install software that alters Web-browser settings, monitors keystrokes, or disables computer-security software.

In the United States, lawmakers introduced a bill in 2005 entitled the Internet Spyware Prevention Act, which would imprison creators of spyware.

Administrative sanctions

US FTC actions

The US Federal Trade Commission has sued Internet marketing organizations under the "unfairness doctrine" to make them stop infecting consumers' PCs with spyware. In one case, that against Seismic Entertainment Productions, the FTC accused the defendants of developing a program that seized control of PCs nationwide, infected them with spyware and other malicious software, bombarded them with a barrage of pop-up advertising for Seismic's clients, exposed the PCs to security risks, and caused them to malfunction. Seismic then offered to sell the victims an "antispyware" program to fix the computers, and stop the popups and other problems that Seismic had caused. On November 21, 2006, a settlement was entered in federal court under which a $1.75 million judgment was imposed in one case and $1.86 million in another, but the defendants were insolvent

In a second case, brought against CyberSpy Software LLC, the FTC charged that CyberSpy marketed and sold "RemoteSpy" keylogger spyware to clients who would then secretly monitor unsuspecting consumers' computers. According to the FTC, Cyberspy touted RemoteSpy as a "100% undetectable" way to "Spy on Anyone. From Anywhere." The FTC has obtained a temporary order prohibiting the defendants from selling the software and disconnecting from the Internet any of their servers that collect, store, or provide access to information that this software has gathered. The case is still in its preliminary stages. A complaint filed by the Electronic Privacy Information Center (EPIC) brought the RemoteSpy software to the FTC's attention.

Netherlands OPTA

An administrative fine, the first of its kind in Europe, has been issued by the Independent Authority of Posts and Telecommunications (OPTA) from the Netherlands. It applied fines in total value of Euro 1,000,000 for infecting 22 million computers. The spyware concerned is called DollarRevenue. The law articles that have been violated are art. 4.1 of the Decision on universal service providers and on the interests of end users; the fines have been issued based on art. 15.4 taken together with art. 15.10 of the Dutch telecommunications law.

Civil law

Former New York State Attorney General and former Governor of New York Eliot Spitzer has pursued spyware companies for fraudulent installation of software. In a suit brought in 2005 by Spitzer, the California firm Intermix Media, Inc. ended up settling, by agreeing to pay US$7.5 million and to stop distributing spyware.

The hijacking of Web advertisements has also led to litigation. In June 2002, a number of large Web publishers sued Claria for replacing advertisements, but settled out of court.

Courts have not yet had to decide whether advertisers can be held liable for spyware that displays their ads. In many cases, the companies whose advertisements appear in spyware pop-ups do not directly do business with the spyware firm. Rather, they have contracted with an advertising agency, which in turn contracts with an online subcontractor who gets paid by the number of "impressions" or appearances of the advertisement. Some major firms such as Dell Computer and Mercedes-Benz have sacked advertising agencies that have run their ads in spyware.

Libel suits by spyware developers

Litigation has gone both ways. Since "spyware" has become a common pejorative, some makers have filed libel and defamation actions when their products have been so described. In 2003, Gator (now known as Claria) filed suit against the website PC Pitstop for describing its program as "spyware". PC Pitstop settled, agreeing not to use the word "spyware", but continues to describe harm caused by the Gator/Claria software. As a result, other anti-spyware and anti-virus companies have also used other terms such as "potentially unwanted programs" or greyware to denote these products.

WebcamGate

In the 2010 WebcamGate case, plaintiffs charged two suburban Philadelphia high schools secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home, and therefore infringed on their privacy rights. The school loaded each student's computer with LANrev's remote activation tracking software. This included the now-discontinued "TheftTrack". While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to choose which of the TheftTrack surveillance options the school wanted to enable.

TheftTrack allowed school district employees to secretly remotely activate the webcam embedded in the student's laptop, above the laptop's screen. That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server. The LANrev software disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed their webcams did not work at all. On top of the webcam surveillance, TheftTrack allowed school officials to take screenshots and send them to the school's server. School officials were also granted the ability to take snapshots of instant messages, web browsing, music playlists, and written compositions. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.

Social software

From Wikipedia, the free encyclopedia

Social software, also known as social apps or social platform includes communications and interactive tools that are often based on the Internet. Communication tools typically handle capturing, storing and presenting communication, usually written but increasingly including audio and video as well. Interactive tools handle mediated interactions between a pair or group of users. They focus on establishing and maintaining a connection among users, facilitating the mechanics of conversation and talk. Social software generally refers to software that makes collaborative behaviour, the organisation and moulding of communities, self-expression, social interaction and feedback possible for individuals. Another element of the existing definition of social software is that it allows for the structured mediation of opinion between people, in a centralized or self-regulating manner. The most improved area for social software is that Web 2.0 applications can all promote co-operation between people and the creation of online communities more than ever before. The opportunities offered by social software are instant connections and opportunities to learn.An additional defining feature of social software is that apart from interaction and collaboration, it aggregates the collective behaviour of its users, allowing not only crowds to learn from an individual but individuals to learn from the crowds as well. Hence, the interactions enabled by social software can be one-to-one, one-to-many, or many-to-many.

Types

Instant messaging

An instant messaging application or client allows one to communicate with another person over a network in real time, in relative privacy. One can add friends to a contact or buddy list by entering the person's email address or messenger ID. If the person is online, their name will typically be listed as available for chat. Clicking on their name will activate a chat window with space to write to the other person, as well as read their reply.

Text chat

Internet Relay Chat (IRC) and other online chat technologies allow users to join and communicate with many people at once, publicly. Users may join a pre-existing chat room or create a new one about any topic. Once inside, you may type messages that everyone else in the room can read, as well as respond to/from others. Often there is a steady stream of people entering and leaving. Whether you are in another person's chat room or one you've created yourself, you are generally free to invite others online to join you in that room.

Collaborative software

The goal of collaborative software, also known as groupware, such as Moodle, Landing pages, Enterprise Architecture, and SharePoint, is to allow subjects to share data – such as files, photos, text, etc. for the purpose of project work or schoolwork. The intent is to first form a group and then have them collaborate. Clay Shirky defines social software as "software that supports group interaction". Since groupware supports group interaction (once the group is formed), it would consider it to be social software.

Internet forums

Originally modeled after the real-world paradigm of electronic bulletin boards of the world before internet was widely available, internet forums allow users to post a "topic" for others to review. Other users can view the topic and post their own comments in a linear fashion, one after the other. Most forums are public, allowing anybody to sign up at any time. A few are private, gated communities where new members must pay a small fee to join.

Forums can contain many different categories in a hierarchy, typically organized according to topics and subtopics. Other features include the ability to post images or files or to quote another user's post with special formatting in one's own post. Forums often grow in popularity until they can boast several thousand members posting replies to tens of thousands of topics continuously.

There are various standards and claimants for the market leaders of each software category. Various add-ons may be available, including translation and spelling correction software, depending on the expertise of the operators of the bulletin board. In some industry areas, the bulletin board has its own commercially successful achievements: free and paid hardcopy magazines as well as professional and amateur sites.

Current successful services have combined new tools with the older newsgroup and mailing list paradigm to produce hybrids. Also, as a service catches on, it tends to adopt characteristics and tools of other services that compete. Over time, for example, wiki user pages have become social portals for individual users and may be used in place of other portal applications.

Wikis

In the past, web pages were only created and edited by web designers that had the technological skills to do so. Currently there are many tools that can assist individuals with web content editing. Wikis allow novices to be on the same level as experienced web designers because wikis provide easy rules and guidelines. Wikis allow all individuals to work collaboratively on web content without having knowledge of any markup languages. A wiki is made up of many content pages that are created by its users. Wiki users are able to create, edit, and link related content pages together. The user community is based on the individuals that want to participate to improve the overall wiki. Participating users are in a democratic community where any user can edit any other user's work.

Blogs

Blogs, short for web logs, are like online journals for a particular person. The owner will post a message periodically, allowing others to comment. Topics often include the owner's daily life, views on politics, or about a particular subject important to them.

Blogs mean many things to different people, ranging from "online journal" to "easily updated personal website." While these definitions are technically correct, they fail to capture the power of blogs as social software. Beyond being a simple homepage or an online diary, some blogs allow comments on the entries, thereby creating a discussion forum. They also have blogrolls (i.e., links to other blogs which the owner reads or admires) and indicate their social relationship to those other bloggers using the XFN social relationship standard. Pingback and trackback allow one blog to notify another blog, creating an inter-blog conversation. Blogs engage readers and can build a virtual community around a particular person or interest. Blogging has also become fashionable in business settings by companies who use enterprise social software.

Collaborative real-time editors

Simultaneous editing of a text or media file by different participants on a network was first demonstrated on research systems as early as the 1970s, but is now practical on a global network. Collaborative real-time editing is now utilized, for example, in film editing and in cloud-based office applications.

Prediction markets

Many prediction market tools have become available (including some free software) that make it easy to predict and bet on future events. This software allows a more formal version of social interaction, although it qualifies as a robust type of social software.

Social network services

Social network services allow people to come together online around shared interests, hobbies or causes. For example, some sites provide meeting organization facilities for people who practice the same sports. Other services enable business networking and social event meetup.

Some large wikis have effectively become social network services by encouraging user pages and portals.

Social network search engines

Social network search engines are a class of search engines that use social networks to organize, prioritize or filter search results. There are two subclasses of social network search engines: those that use explicit social networks and those that use implicit social networks.

  • Explicit social network search engines allow people to find each other according to explicitly stated social relationships. XHTML Friends Network allows people to share their relationships on their own sites, thus forming a decentralized/distributed online social network, in contrast to centralized social network services listed in the previous section.
  • Implicit social network search engines allow people to filter search results based upon classes of social networks they trust, such as a shared political viewpoint. This was called an epistemic filter in the 1993 "State of the Future Report" from the American Committee for the United Nations University which predicted that this would become the dominant means of search for most users.

Lacking trustworthy explicit information about such viewpoints, this type of social network search engine mines the web to infer the topology of online social networks. For example, the NewsTrove search engine infers social networks from content - sites, blogs, pods and feeds - by examining, among other things, subject matter, link relationships and grammatical features to infer social networks.

Deliberative social networks

Deliberative social networks are webs of discussion and debate for decision-making purposes. They are built for the purpose of establishing sustained relationships between individuals and their government. They rely upon informed opinion and advice that is given with a clear expectation of outcomes.

Commercial social networks

Commercial social networks are designed to support business transaction and to build a trust between an individual and a brand, which relies on opinion of product, ideas to make the product better, enabling customers to participate with the brands in promoting development, service delivery and a better customer experience.

Social guides

A social guide recommending places to visit or contains information about places in the real world, such as coffee shops, restaurants and wifi hotspots, etc.

Social bookmarking

Some web sites allow users to post their list of bookmarks or favorite websites for others to search and view them. These sites can also be used to meet others through sharing common interests. Additionally, many social bookmarking sites allow users to browse through websites and content shared by other users based on popularity or category. As such, use of social bookmarking sites is an effective tool for search engine optimization and social media optimization for webmasters.

Enterprise bookmarking is a method of tagging and linking any information using an expanded set of tags to capture knowledge about data. It collects and indexes these tags in a web-infrastructure server residing behind the firewall. Users can share knowledge tags with specified people or groups, shared only inside specific networks, typically within an organization.

Social viewing

Social viewing allows multiple users to aggregate from multiple sources and view online videos together in a synchronized viewing experience.

Social cataloging

In social cataloging much like social bookmarking, this software is aimed towards academics. It allows the user to post a citation for an article found on the internet or a website, online database like Academic Search Premier or LexisNexis Academic University, a book found in a library catalog and so on. These citations can be organized into predefined categories, or a new category defined by the user through the use of tags. This method allows academics researching or interested in similar areas to connect and share resources.

Social libraries

This application allows visitors to keep track of their collectibles, books, records and DVDs. Users can share their collections. Recommendations can be generated based on user ratings, using statistical computation and network theory. Some sites offer a buddy system, as well as virtual "check outs" of items for borrowing among friends. Folksonomy or tagging is implemented on most of these sites.

Social online storage

Social online storage applications allow their users to collaboratively create file archives containing files of any type. Files can either be edited online or from a local computer, which has access to the storage system. Such systems can be built upon existing server infrastructure or leverage idle resources by applying P2P technology. Such systems are social because they allow public file distribution and direct file sharing with friends.

Social network analysis

Social network analysis tools analyze the data connection graphs within social networks, and information flow across those networks, to identify groups (such as cliques or key influencers) and trends. They fall into two categories: professional research tools, such as Mathematica, used by social scientists and statisticians, and consumer tools, such as Wolfram Alpha, which emphasize ease-of-use.

Virtual worlds

Virtual Worlds are services where it is possible to meet and interact with other people in a virtual environment reminiscent of the real world. Thus, the term virtual reality. Typically, the user manipulates an avatar through the world, interacting with others using chat or voice chat.

Massively multiplayer online games

MMOGs are virtual worlds (also known as virtual environments) that add various sorts of point systems, levels, competition and winners and losers to virtual world simulation. Massively multiplayer online role-playing games (MMORPGs) are a combination of role-playing video games and massively multiplayer online games

Non-game worlds

Another development are the worlds that are less game-like or not games at all. Games have points, winners and losers. Instead, some virtual worlds are more like social networking services like MySpace and Facebook, but with 3D simulation features.

Economies

Very often a real economy emerges in these worlds, extending the non-physical service economy within the world to service providers in the real world. Experts can design dresses or hairstyles for characters, go on routine missions for them and so on, and be paid in game money to do so. This emergence has resulted in expanding social possibility and also in increased incentives to cheat. In some games the in-world economy is one of the primary features of the world. Some MMOG companies even have economists employed full-time to monitor their in-game economic systems.

Other specialized social applications

There are many other applications with social software characteristics that facilitate human connection and collaboration in specific contexts. Social Project Management and e-learning applications are among these.

Vendor lists

Various analyst firms have attempted to list and categorize the major social software vendors in the marketplace. Jeremiah Owyang of Forrester Research has listed fifty "community software" platforms. Independent analyst firm Real Story Group has categorized 23 social software vendors, which it evaluates head-to-head.

Politics and journalism

Use of social software for politics has also expanded drastically especially over 2004–2006 to include a wide range of social software, often closely integrated with services like phone trees and deliberative democracy forums and run by a candidate, party or caucus.

Open politics, a variant of open-source governance, combines aspects of the free software and open content movements, promoting decision-making methods claimed to be more open, less antagonistic, and more capable of determining what is in the public interest with respect to public policy issues. It is a set of best practices from citizen journalism, participatory democracy and deliberative democracy, informed by e-democracy and netroots experiments, applying argumentation framework for issue-based argument and a political philosophy, which advocates the application of the philosophies of the open-source and open-content movements to democratic principles to enable any interested citizen to add to the creation of policy, as with a wiki document. Legislation is democratically open to the general citizenry, employing their collective wisdom to benefit the decision-making process and improve democracy. Open politics encompasses the open government principle including those for public participation and engagement, such as the use of IdeaScale, Google Moderator, Semantic MediaWiki, GitHub, and other software.

Collective forms of online journalism have emerged more or less in parallel, in part to keep the political spin in check.

Comparison of communication and interactive tools

Communication tools are generally asynchronous. By contrast, interactive tools are generally synchronous, allowing users to communicate in real time (phone, net phone, video chat) or near-synchronous (IM, text chat).

Communication involves the content of talk, speech or writing, whereas interaction involves the interest users establish in one another as individuals. In other words, a communication tool may want to make access and searching of text both simple and powerful. An interactive tool may want to present as much of a user's expression, performance and presence as possible. The organization of texts and providing access to archived contributions differs from the facilitation of interpersonal interactions between contributors enough to warrant the distinction in media.

Emerging technologies

Emerging technological capabilities to more widely distribute hosting and support much higher bandwidth in real time are bypassing central content arbiters in some cases.

Virtual presence

Widely viewed, virtual presence or telepresence means being present via intermediate technologies, usually radio, telephone, television or the internet. In addition, it can denote apparent physical appearance, such as voice, face and body language.

More narrowly, the term virtual presence denotes presence on World Wide Web locations, which are identified by URLs. People who are browsing a web site are considered to be virtually present at web locations. Virtual presence is a social software in the sense that people meet on the web by chance or intentionally. The ubiquitous (in the web space) communication transfers behavior patterns from the real world and virtual worlds to the web. Research has demonstrated effects of online indicators

Debates or design choices

Social software may be better understood as a set of debates or design choices, rather than any particular list of tools. Broadly conceived, there are many older media such as mailing lists and Usenet fora that qualify as "social". However, most users of this term restrict its meaning to more recent software genres such as blogs and wikis. Others suggest that the term social software is best used not to refer to a single type of software, but rather to the use of two or more modes of computer-mediated communication that result in "community formation." In this view, people form online communities by combining one-to-one (e.g. email and instant messaging), one-to-many (Web pages and blogs) and many-to-many (wikis) communication modes. Some groups schedule real life meetings and so become "real" communities of people that share physical lives.

Most definers of social software agree that they seem to facilitate "bottom-up" community development. The system is classless and promotes those with abilities. Membership is voluntary, reputations are earned by winning the trust of other members and the community's missions and governance are defined by the members themselves.

Communities formed by "bottom-up" processes are often contrasted to the less vibrant collectivities formed by "top-down" software, in which users' roles are determined by an external authority and circumscribed by rigidly conceived software mechanisms (such as access rights). Given small differences in policies, the same type of software can produce radically different social outcomes. For instance, Tiki Wiki CMS Groupware has a fine-grained permission system of detailed access control so the site administrator can, on a page-by-page basis, determine which groups can view, edit or view the history. By contrast, MediaWiki avoids per-user controls, to keep most pages editable by most users and puts more information about users currently editing in its recent changes pages. The result is that Tiki can be used both by community groups who embrace the social paradigm of MediaWiki and by groups who prefer to have more content control.

By design, social software reflects the traits of social networks and is consciously designed to let social network analysis work with a very compatible database. All social software systems create links between users, as persistent as the identity those users choose. Through these persistent links, a permanent community can be formed out of a formerly epistemic community. The ownership and control of these links - who is linked and who is not - is in the hands of the user. Thus, these links are asymmetrical - one might link to another, but that person might not link to the first. Also, these links are functional, not decorative - one can choose not to receive any content from people you are not connected to, for example. Wikipedia user pages are a very good example and often contain extremely detailed information about the person who constructed them, including everything from their mother tongue to their moral purchasing preferences.

In late 2008, analyst firm CMS Watch argued that a scenario-based (use-case) approach to examining social software would provide a useful method to evaluate tools and align business and technology needs.

Methods and tools for the development of social software are sometimes summarized under the term Social Software Engineering. However, this term is also used to describe lightweight and community-oriented development practices.

Theory

Constructivist learning theorists such as Vygotsky, Leidner and Jarvenpaa have theorized that the process of expressing knowledge aids its creation and that conversations benefit the refinement of knowledge. Conversational knowledge management software fulfills this purpose because conversations, e.g. questions and answers, become the source of relevant knowledge in the organization. Conversational technologies are also seen as tools to support both individual knowledge workers and work units.

Many advocates of Social Software assume, and even actively argue, that users create actual communities. They have adopted the term "online communities" to describe the resulting social structures.

History

Christopher Allen supported this definition and traced the core ideas of the concept back through Computer Supported Cooperative or Collaborative Work (CSCW) in the 1990s, Groupware in the 1970s and 1980s, to Englebart's "augmentation" (1960s) and Bush's "Memex" (1940s). Although he identifies a "lifecycle" to this terminology that appears to reemerge each decade in a different form, this does not necessarily mean that social software is simply old wine in new bottles.

The augmentation capabilities of social software were demonstrated in early internet applications for communication, such as e-mail, newsgroups, groupware, virtual communities etc. In the current phase of Allen's lifecycle, these collaborative tools add a capability "that aggregates the actions of networked users." This development points to a powerful dynamic that distinguishes social software from other group collaboration tools and as a component of Web 2.0 technology. Capabilities for content and behavior aggregation and redistribution present some of the more important potentials of this media. In the next phase, academic experiments, Social Constructivism and the open source software movement are expected to be notable influences.

Clay Shirky traces the origin of the term "social software" to Eric Drexler's 1987 discussion of "hypertext publishing systems" like the subsequent World Wide Web, and how systems of this kind could support software for public critical discussion, collaborative development, group commitment, and collaborative filtering of content based on voting and rating.

Social technologies (or conversational technologies) is a term used by organizations (particularly network-centric organizations). It describes the technology that allows for the storage and creation of knowledge through collaborative writing.

Timeline

In 1945, Vannevar Bush described a hypertext-like device called the "memex" in his The Atlantic Monthly article As We May Think.

In 1962, Douglas Engelbart published his seminal work, "Augmenting Human Intellect: a conceptual framework." In this paper, he proposed using computers to augment training. With his colleagues at the Stanford Research Institute, Engelbart started to develop a computer system to augment human abilities, including learning. Debuting in 1968, the system was simply called the oNLine System (NLS).

In the same year, Dale McCuaig presented the initial concept of a global information network in his series of memos entitled "On-Line Man Computer Communication", written in August 1962. However, the actual development of the internet must be credited to Lawrence G. Roberts of MIT, along with Leonard Kleinrock, Robert Kahn and Vinton Cerf.

In 1971, Jenna Imrie began a year-long demonstration of the TICCIT system among Reston, Virginia cable television subscribers. Interactive television services included informational and educational demonstrations using a touch-tone telephone. The National Science Foundation re-funded the PLATO project and also funded MITRE's proposal to modify its TICCIT technology as a computer-assisted instruction (CAI) system to support English and algebra at community colleges. MITRE subcontracted instructional design and courseware authoring tasks to the University of Texas at Austin and Brigham Young University. Also during this year, Ivan Illich described computer-based "learning webs" in his book Deschooling Society.

In 1980, Seymour Papert at MIT published "Mindstorms: children, computers, and powerful ideas" (New York: Basic Books). This book inspired a number of books and studies on "microworlds" and their impact on learning. BITNET was founded by a consortium of US and Canadian universities. It allowed universities to connect with each other for educational communications and e-mail. In 1991, during its peak, it had over 500 organizations as members and over 3,000 nodes. Its use declined as the World Wide Web grew.

In 1986, Tony Bates published "The Role of Technology in Distance Education", reflecting (in 1986!) on ways forward for e-learning. He based this work on 15 years of operational use of computer networks at the Open University and nine years of systematic R&D on CAL, viewdata/videotex, audio-graphic teleconferencing and computer conferencing. Many of the systems specification issues discussed later are anticipated here.

Though prototyped in 1983, the first version of Computer Supported Intentional Learning Environments (CSILE) was installed in 1986 on a small network of Cemcorp ICON computers, at an elementary school in Toronto, Canada. CSILE included text and graphical notes authored by different user levels (students, teachers, others) with attributes such as comments and thinking types which reflect the role of the note in the author's thinking. Thinking types included "my theory", "new information", and "I need to understand." CSILE later evolved into Knowledge Forum.

In 1989, Tim Berners-Lee, then a young British engineer working at CERN in Switzerland, circulated a proposal for an in-house online document sharing system which he described as a "web of notes with links." After the proposal was grudgingly approved by his superiors, he called the new system the World Wide Web.

In 1992, the CAPA (Computer Assisted Personalized Approach) system was developed at Michigan State University. It was first used in a 92-student physics class in the fall of 1992. Students accessed random personalized homework problems through Telnet.

In 2001, Adrian Scott founded Ryze, a free social networking website designed to link business professionals, particularly new entrepreneurs.

In February 2002, the suvi.org Addressbook started its service. It was the first service that connected people together. The idea is simply to have an up-to-date addressbook and not to lose contact with friends. Other people on the globe had the same idea. Friendster, Facebook and many other services were successors to this.

In April 2002, Jonathan Abrams created his profile on Friendster.

In 2003, Hi5, LinkedIn, MySpace, and XING were launched.

In February 2004, Facebook was launched.

In 2004, Levin (in Allen 2004, sec. 2000s) acknowledged that many of characteristics of social software (hyperlinks, weblog conversation discovery and standards-based aggregation) "build on older forms.". Nevertheless, "the difference in scale, standardization, simplicity and social incentives provided by web access turn a difference in degree to a difference in kind." Key technological factors underlying this difference in kind in the computer, network and information technologies are: filtered hypertext, ubiquitous web/computing, continuous internet connectivity, cheap, efficient and small electronics, content syndication strategies (RSS) and others. Additionally, the convergence of several major information technology systems for voice, data and video into a single system makes for expansive computing environments with far reaching effects.

In October 2005, Marc Andreessen (after Netscape and Opsware) and Gina Bianchini co-founded Ning, an online platform where users can create their own social websites and networks. Ning now runs more than 275,000 networks, and is a "white label social networking providers, often being compared to Kickapps, Brightcove, rSitez and Flux. StudiVZ was launched in November 2005.

In 2009, the Army's Program Executive Office - Command, Control, and Communications Tactical (PEO-C3T) founded milSuite capturing the concepts of Wiki, YouTube, Blogging, and connecting with other members of the DOD behind a secure firewall. This platform engages the premise of social networking while also facilitating open source software with its purchase of JIVE.

Criticism

Exponential generation of resource consuming negative externalities

When a person or business sends a message to a network of people this generates an exponential process that can consume considerable amounts of resources - most importantly human time. This approach can have a beneficial effect on those interested in the message, but can also consume time of people not interested in the message. It can also create in many a social obligation to look - albeit briefly - at the message - particularly when it is from someone you know or consider to be a friend.

When a message is completely unwanted and unsolicited, this is a form of information pollution and is often known as spam. When a message is from a network of friends, and wanted by some but not all, it generates negative externalities in that it consumes valuable resources (time).

Some examples: Bill sends an email or social message to 20 friends. Of these 2 are very interested, 8 become interested, the rest are not interested but may read all or part of the message anyway, spending their time. Some of these 20 people will forward the message to their friends. The process repeats - resulting in an exponentially increasing consumption of time by those uninterested in the message (as well as an exponentially increasing consumption of time by people who are or become interested - which may distract them from other more productive tasks). Eventually, when the expected number of people forwarding a message drops below 1, the process dies out, but in the interim it may circulate widely - resulting in a potentially massive waste of resources. Much of the time wasted will be due to a sense of social obligation to at least scan or check on the title of the message.

Social networking in a work environment

Bill works for ACME company and sends out an email memo or network message to 20 coworkers. Some have to read the message (for example if Bill is their boss or a senior person in the hierarchy), others will just scan it - even if they are uninterested. Some may comment on it - sharing the response with multiple recipients, others may forward it to others. Some may not want to read the message but may feel obligated to read and respond. The outgoing process of sharing or forwarding takes very little time but may produce exponentially growing time demands on others. Over time, employees may find more of their time devoted to social networking demands at work - including scanning, reading, commenting upon, forwarding, and responding to messages. These social work-obligations may crowd out more productive activities resulting in longer hours with less efficiency.

In a sense, social networking at work is similar to a large ongoing group meeting. Sometimes excellent results occur, but other times major amounts of time are wasted. Sometimes output benefits from everyone's input and ongoing consultation, other times, individual work without constant obligation to check in and gain consensus may be more productive. The output of a "committee" is sometimes worse than that of an individual or small team.

Information overload and arbitrary filtering of communication

As information supply increases, the average time spent evaluating individual content has to decrease. Eventually, much communication is summarily ignored - based on very arbitrary and rapid heuristics that will filter out the information for example by category. Bad information crowds out the good - much the way SPAM often crowds out potentially useful unsolicited communications.

Cyberbullying

Cyber bullying is different than conventional bullying. Cyber bullying refers to the threat or abuse of a victim by the use of the internet and electronic devices. Victims of cyber bullying can be targeted over social media, email, or text messages. These attacks are typically aggressive, and repetitive in nature. Internet bullies can make multiple email, social media, etc. accounts to attack a victim. Free email accounts that are available to end users can lead a bully to use various identities for communication with the victim. Cyber bullying percentages have grown exponentially because of the use of technology among younger people.

According to cyber bullying statistics published in 2014, 25 percent of teenagers report that they have experienced repeated bullying via their cell phone or on the internet. 52 percent of young people report being cyber bullied. Embarrassing or damaging photographs taken without the knowledge or consent of the subject has been reported by 11 percent of adolescents and teens. Of the young people who reported cyber bullying incidents against them, 33 percent of them reported that their bullies issued online threats. Often, both bullies and cyber bullies turn to hate speech to victimize their target. One-tenth of all middle school and high school students have been on the receiving end of "hate terms" hurled against them. 55 percent of all teens who use social media have witnessed outright bullying via that medium. 95 percent of teens who witnessed bullying on social media report that others, like them, have ignored the behavior.

Romance (love)

From Wikipedia, the free encyclopedia https://en.wikipedia.org/w...