Module 05 Social Media - Notes
Watch: Module 05 Sociograms
>> NodeXL is an open source tool for analyzing and visualizing social networks. This is an image of a sociogram that reflects the relationships between characters in "The Lord of the Rings." This sociogram is based on data stored in Microsoft Excel. The data is stored on three tabs: possible pairs, existing connections, list of all characters. NodeXL processes this data to create a sociogram, but what does the sociogram tell us? Colored circles represent nodes. In this case, each node is one of the "Lord of the Rings" characters. Aragorn, Frodo, and Gandalf are larger green circles, indicating that they are central characters with the most relationships among characters. Less prominent characters, such as Tom and Elrohir, with fewer relationships, are represented by small red circles. The lines that connect the nodes are called sociogram edges. These lines show relationships between characters. The thickness of a line indicates the strength of the connection. In this sociogram, Frodo clearly has a strong relationship with Sam, while Aragorn seems to have a weak relationship with Gimli. NodeXL and similar tools can be used to examine a variety of social networks, including personal networks on social media sites such as Facebook and Twitter. Similar techniques can be used by law enforcement to unravel criminal networks and by marketing firms to reveal customer preferences. As you can see, sociograms can be an important tool for understanding relationships in today's connected world.
Watch: Module 05 Assigning Creative Common Rights
>> Creative Commons offers several types of licenses that you can assign to your original works such as photos, videos, and documents. The Choose page gets you started. The default settings allow your work to be shared and used commercially. The default options create a Creative Commons license that is BY, or attribution only. People can use and modify your work as long as they credit you as the source. If you do not want to allow your work to be changed and adapted, select No. That option creates a CC BY ND license. If you want your work and adaptations to be distributed under the same Creative Commons license, then select this option. That creates a CC BY SA license. You also have the option to prevent others from using your work in commercial products. Selecting this options adds the Noncommercial icon to the license. Once you have selected a license, add your attribution details.
[ Pause ]
Use HTML plus RDFA when you want to copy the license to a Web page. This data is machine readable, so it can be found by search engines. Licenses in XMP format can be embedded in some files such as PDFs. Licenses formatted for offline are output in plain text that can be used for printed documents and photos. Your CC BY NC SA license is here in HTML format. You can copy this code and paste it directly onto a Web page. This area shows how the HTML license will look when pasted on a Web page and displayed in a browser.
Watch: Module 05 Wikipedia Tabs
>> Most people who access Wikipedia for information simply read the article page, but there is also valuable information on other tabs. Here is a page about the little dots or umlauts that heavy metal bands sometimes use in their name. The main article is displayed when the article and read tabs are selected. It is sometimes interesting to look at the evolution of a Wikipedia article. Its history can provide valuable historical and sociological information. This is the article as it appeared on February 6th, 2014. The article is lengthy and contains at least one photo. What did the original article look like? At the bottom of the page is a link to the oldest version of the article. This is the original article. It was only two lines of text. The change log for this article is extensive. You can see that items were added and removed by a variety of contributors. Obviously, it is a topic of interest to many Wikipedians. Another way to get a sense about the background of a topic is to look at the talk page. Here is a list of the discussion topics for the metal umlaut article. Let's see what the Amon Duul discussion is all about. Contributors are discussing whether Amon Duul should be included. The talk pages are particularly useful if you wanted to learn where a certain fact originated. When you doubt the credibility of a statement in Wikipedia, you may find a discussion about it in the talk pages. You can add your own comments to the talk section by selecting the edit option. Notice that the text is written in a markup language similar to HTML. You can learn more about Wikipedia markup language from the talk page guidelines. Now you know how to follow the trail of data behind a Wikipedia article. Happy hunting.
Watch: Module 05 Email Headers
>> E-mail headers contain a treasure trove of information that can be used to trace e-mail messages to their origins or troubleshoot e-mail delivery problems. Here is an e-mail message that was blocked and returned to the sender. The message was originally sent to susan64, but it was returned to the sender, heidi@mediamakers.net. Why was this message blocked? The first step is to expand the header. E-mail clients put this option on different menus. Look for options such as view all headers, show original, or show headers. Let's expand the header and see what it tells us. The header contains lots of text. Let's look at the most important parts. The message has this return address. Blocked or undeliverable messages will be returned to that address. It may not be the actual address of the sender because the return address can be changed in settings. This received list shows the list of servers that the message passed through on its way to the recipient. The senders actual e-mail address. The message is in plain ASCII text not HTML, so it is unlikely to contain any virus links. The message was created using the Apple Mail client software. The recipient's e-mail server checks the message for spam and gives it a score. If the score exceeds a threshold of suspicion, because it contains a subject line in all caps or other spam-like characteristics, the mail is blocked.
Watch: Module 05 Setting Up Local Mail
>> Local email is handled by email client software, such as Microsoft Outlook that is installed on your computer. Before you send and receive email, you have to configure your account. Options for configuring your account are available on the file tab. Clicking this button is the first step in adding an account. Most email client software asks for you name. You can enter it using spaces like this. You also have to supply your email address and email password. You should have a record of this information from your ISP or email host so you can enter it like this. You usually have to confirm your password by typing it again like this. Outlook attempts to verify your email address and identify your POP and SMTP servers. In this case, Outlook seems to have been successful. You can manually check the server addresses just to make sure. Clicking account settings allows you to check or verify your settings. Clicking this button allows you to view and modify the account settings that have been entered. Most of today's email accounts are POP3. The address of your incoming server is often the same as the last part of your email address. The outgoing mail server address often begins with SMTP. If all the settings seem accurate, you can test the connection. If the test is successful, then you can proceed. The account is set up and ready to send and receive messages.
Chapter Introduction
Section A: Social Networking
The Social Media Mix
Social Networking Evolution
Social Networking Basics
Geosocial Networking
Social Network Analytics
Section B: Content Communities
Evolution
Media Content Communities
Intellectual Property
Creative Commons
Section C: Blogs and More
Blogs
Microblogs
Wikis
Section D: Online Communication
Communication Matrix
Email
Online Chat
Voice and Video over IP
Section E: Social Media Values
Identity
Reputation
Privacy
Section A: Social Netoworking
What provides a visual model for classifying and comparing various social media services? → social media honeycomb
Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online. → true
When individuals contribute computer time, expertise, opinions, or money to defined project, they are participating in _____. → crowdsourcing
The circles in a sociogram are referred to as a sociogram ____. → nodes
Which of the following is the least important characteristic of content communities? → Identity
Editing of the source content is actively encouraged within media content communities. → false
Patents, trademarks, copyrights, and trade secrets are four categories or ____ property. → intellectual
A set of standardized licenses that copyright holders can use to extend the rights to use their works to others is provided by a nonprofit organization called ___. → Creative Commons (CC)
Which of the following elements would not be found on a blog page? → SMTP services
A keyword that can be used to find and group Twitter tweets by topic begins with the _____ symbol. → hashtag
Which one of the following options is not a Wikipedia content standard? → RSS
Which of the following would not be found on a standard Wikipedia page? → RSS Feed
When interchanges between parties happen in real time while all parties are online, their communcation is _____. → Synchronous
Incoming messages are stored in an inbox on the Web and then accessed through a browser in a classic ____ configuration. → webmail
Instant massaging technologies were available on local area networks even before the internet was open to the public. → true
The technology that ises a broadband internet connection instead of telephone landlines to place voice and cideo calls is called a _____. → VoIP
Along with a profile image, whihc of the following would also be included in a social media profile? → tagline
In the context of social media, the impression that is generated by an online personal is also called their online _____. → reputation
Communicating false statements that damage the reputation of another individual is referred to as ___. → defamation
What did Justice Bradeis define as the “right to be let alone”? → privacy