Академический Документы
Профессиональный Документы
Культура Документы
S I
&
m
et
ho
do
Es
lo
gy
s
D
ro ce
here
you
may
read :
Design
Process
wherein lies
Design
Research
which may result in
Semantic
Design
and also a few
Case
Studies
Desig
is for
pro
gn
has as
ocess
The design process This same process of change and evolution ap-
plies to the development of design process. To use
‘The design process is the specific series of events, just one example of how design process emerged,
actions or methods by which a procedure or set of Adrian Forty cites Wedgwood in describing how the
procedures are followed, in order to achieve an in- development of technology separated the designer
tended purpose, goal or outcome.’ Best (2006). from the production process. Production activities
The design process consists of a series of activities were stretched and divided into distinct areas, or
and methods which are pulled together in a way processes.
which meets the requirements of a problem or proj-
ect. Though there are similarities which can be seen “The operation of designing thus became not just
across various case studies referenced by academics separate but also geographically removed from the
and practitioners (Clarkson and Eckert (2004), there manufacture of the pots.” Forty.
are in fact many different design processes which
vary depending on the size, scale and nature of the This shift, and division of tasks, naturally resulted in
problem. an increased level of productivity. But while speed-
ing up the Wedgwood’s development process
“Design processes are difficult to standardise, in created an opportunity to increase supply, it also
part because of their iterative, non-linear nature, brought to light the problems of ensuring quality,
and also because the needs of clients and users consistency and timely production. Furthermore,
are so different. In addition, real life, with its chang- an excessive choice of products that could be pro-
ing market conditions and customer preferences, duced, many of which used different manufactur-
is much more dynamic chaotic and fuzzy than any ing techniques, resulted in a considerable expense
standard model can fully accommodate and often, for Wedgwood. This resulted in an eventual down-
stages of the design process overlap.” (Best 2006) turn in profits. A decision was therefore made to
Literature on the design process is vast, yet mostly limit consumer choice and a standard number of
inconclusive. Debate is typically based around the product types were produced with a selection of
activity of defining, developing and monitoring a designs. From Wedgwood we learnt that it was co-
process for design and is largely concerned with ordinating the different aspects of the new process
its management and influence on business perfor- which arose as one of the greatest challenges of
mance. Case studies are often used to illustrate the mass production.
process, demonstrating its clear relevance to busi-
ness practice. Clarkson and Eckert (2004) have writ-This is just one of many examples of how design
ten extensively on the topic of design process and process emerged. This has clear connections to Bau-
have generated a comprehensive review of current haus theories in which form follows function, which
practice and methodologies. was adopted by industrial design. Also, Victor Pap-
anek’s powerful views about the value and impor-
“Despite the extensive research undertaken since tance of design endorsed the systematic approach
the 1950s, there is no single model which is agreed of process.
to provide a satisfactory description of the design
process.” Clarkson and Eckert. ’In this age of mass production when everything
must be planned and designed, design has become
the most powerful tool with which man shapes his
Historical perspectives tools and environments (and by extension, society
and himself )’. Papanek.
The history of design is one of constant evolution.
Originally from craft roots, it developed through the Papanek also references the Bauhaus hailing its suc-
division of labour created by mechanisation, which cess as “...the first school to consider design a vital
gave birth to the role of the industrial designer. Its part of the production process.”
development as a subject, process, activity and busi- So, with its origin in crafts, the design process
ness tool has been heavily documented and debat- sprung from an early movement to define not just
ed in recent years, and case histories demonstrate products, but also the way in which they were pro-
the changing role of design in a business context. duced. Since then, the design process has been ap-
plied to a varied number of scenarios, such
as science, engineering and manufacturing. Archer defined design as employing a combination
However, design itself has progressed and its scope of the intuitive and the cognitive, and therefore at-
has broadened to include disciplines such as inter- tempted to turn the design process into a science
action, experience and service design. Before de- by formalising a creative process. Archer was there-
veloping our conclusions on how this affects the by also trying to formalise the intuitiveness of de-
design process benchmarking study, some detailed sign and the designer, and place their creativity into
examples of the design processes will follow. the context of the production process, including its
external influencers.
Design process methods With the emergence of design methods came the
mapping of the design process, generating models,
The exploration of the design process began to be formulae and diagrams that aimed to illustrate best
taken seriously in the work of the Bauhaus in the practice. In the early days of formalising the design
early 20th century, where attitudes to design were process (the 1960s), it often took on a linear format
radically changed, specifically in industrial design. and featured a series of arrows and boxes, such as
The new approach revolutionised many success the one below by Brian Lawson.vii The design pro-
ful companies and their products as they began to cess began to take on a tangible format and stan-
re-establish themselves on the basis of Bauhaus dard phases such as analysis, evaluation and syn-
theories thesis were associated with the practice of design
for the first time.
As such, the core-based model identified differ- Equally, another development is the recognition of
ent aspects of the process and the stages involved. the specific role that the designer plays within the
Models such as this one were used to understand design process. Cooper and Press (1994) recognise
situations, users and activities undertaken and the difference between the process used by the in-
proved very helpful with more complex problems, dividual designer and the design skills they use to
such as in engineering. solve a problem, and the design process as the stra-
tegic planning of product development (Figure 4).
Their model demonstrates
the design process as it oc-
curs from the individual’s
perspective, and describes
their thought process as
they address a problem.
This is often personal and
based on education and
experience.
In contrast, on a corpo-
rate level the process has
a much broader scope and
incorporates external fac-
tors such as finance, mar-
keting and tangible mea-
surable aspects of business.
Walker’s model (Figure 5)
refers to the external pro-
ductive process of design
because it reflects two key
activities, namely planning
Fig. 3 Stuart Pugh and production. Consequently, this model succeeds
in reflecting a combination of the corporate design
Pugh focused on a concept called total design which process, and the individual
he believes incorporates everything from the early
identification of market and user need through to
the selling of a product that meets that need.
Research alone as a noun would take us to the study Design methodologies have to be selected very
and analysis of materials , sources& ideologies in or- carefully if one has to achieve concrete results. You
der to establish facts and reach new conclusions. can either follow quantitative or qualitative meth-
Though this is only the tip of the iceberg when the odologies. While can be equally good they can be a
word design is combined with it. great waste of time and money if used for the wrong
things.
There have been numerous attempts at defin-
ing what design research is and how to classify its Here I would like to concentrate on qualitative re-
methodologies right from the Bauhaus movement search methodologies so that we can study this area
to the last time an expert spoke on it. I tend to like in a greater level of detail. The subtypes of method-
what Frayling identifies as three key modes of de- ologies can be put as
sign research;
Experimental
Research into design Speculative
Research through design Experiential
Research for design Performative
Discovery – led
Research into design is the traditional historical Procedural
and aesthetic studies of art and design. Research
through design is project based and includes ma- And many others ...
terials and development . Research for design is the
hardest to characterize as its purpose is to create
objects and systems that display the results of the
research and then prove its worth
. Focus groups
Also we need new categories of design research be-
cause of the impact of digital technologies on the Traditional focus groups are one of the oldest forms
design discipline over the past 30 years. The com- of qualitative methods where one tries to gain in-
puter democratized the access to the tools of the formation from what the user has to say. Mostly a
professional designer and has since brought about focus group is a gathering of about 10-12 people/
an amazing efflorescence of new styles. customers who are led in a tightly scripted discus-
sion by a trained moderator usually for about 2
Another way of putting design research is to think hours.
about it as research. Design as research uses its own
media to perform the investigations. Design as re- Originally used for any topic or purpose they are
search is a rational practice, but it is one now recommended primarily when you need to
generate ideas or and expand understanding with e. Triads
out needing to reach consensus. Three people who are either similar to each other,
or are different in a special way are interviewed by
Focus groups are a bad choice where your subject is a moderator following an outline or lightly scripted
sensitive or where the responses are related to per- guide.
sonal or professional status. Triads provide a lot more depth than a 1-on-1 inter-
view. Take for example professionals from compa-
Focus groups also tend to have led to several spin- nies varying in size. Then the answers they provide
offs which each have their own strengths and weak- can be seen in comparison, leading to a number of
nesses, some of them are findings usually difficult o find through 1-on-1’s.
>>
tween two people far apart in space and separated
in time.
Doubling output formats RDF is a simple language for expressing data mod-
els, which refer to objects (“resources”) and their
Another criticism of the semantic web is that it would relationships. An RDF-based model can be
be much more time-consuming to create and publish represented in XML syntax.
content because there would need to be two formats
for one piece of data: one for human viewing and one RDF Schema is a vocabulary for describing proper-
for machines. However, many web applications in ties and classes of RDF-based resources, with se-
development are addressing this issue by creating a mantics for generalized-hierarchies of such proper-
machine-readable format upon the publishing of data ties and classes.
or the request of a machine for such data. The devel-
opment of microformats has been one reaction to this OWL adds more vocabulary for describing proper-
kind of criticism. Specifications such as eRDF and ties and classes: among others, relations between
RDFa allow arbitrary RDF data to be embedded in classes (e.g. disjointness), cardinality (e.g. “exactly
HTML pages. The GRDDL (Gleaning Resource De- one”), equality, richer typing of properties, charac-
scriptions from Dialects of Language) mechanism al- teristics of properties (e.g. symmetry), and enumer-
lows existing material (including microformats) to be ated classes.
automatically interpreted as RDF, so publishers only
need to use a single format, such as HTML. SPARQL is a protocol and query language for se-
mantic web data sources.
Need
Current ongoing standardizations
The idea of a ‘semantic web’ necessarily coming from include:
some marking code other than simple HTML is built
on the assumption that it is not possible for a machine Rule Interchange Format (RIF) as the Rule Layer of
to appropriately interpret code based on nothing but the Semantic Web Stack
the order relationships of letters and words. If this is
not true, then it may be possible to build a ‘semantic The intent is to enhance the usability and usefulness
web’ on HTML alone, making a specially built ‘se- of the Web and its interconnected resources through:
mantic web’ coding system unnecessary. There are la- Servers which expose existing data systems using the
tent dynamic network models that can, under certain RDF and SPARQL standards. Many converters to
conditions, be ‘trained’ to appropriately ‘learn’ mean- RDF (http://esw.w3.org/topic/ConverterToRdf) exist
ing based on order data, in the process ‘learning’ rela- from different applications. Relational databases are
tionships with order (a kind of rudimentary working an important source. The semantic web server attach-
grammar). See for example latent semantic analysis. es to the existing system without affecting its
Documents “marked up” with semantic informa- Semantic markup is often generated automatically,
tion (an extension of the HTML <meta> tags used rather than manually.
in today’s Web pages to supply information for Web
search engines using web crawlers). This could be Common metadata vocabularies (ontologies) and
machine-understandable information about the maps between vocabularies that allow document
human-understandable content of the document creators to know how to mark up their documents
(such as the creator, title, description, etc., of the so that agents can use the information in the sup-
document) or it could be purely metadata repre- plied metadata (so that Author in the sense of ‘the
senting a set of facts (such as resources and services Author of the page’ won’t be confused with Author
elsewhere in the site). (Note that anything that can in the sense of a book that is the subject of a book
be identified with a Uniform Resource Identifier review).
(URI) can be described, so the semantic web can
reason about animals, people, places, ideas, etc.) Automated agents to perform tasks for users of the
semantic web using this data. foundationalism in philosophy, debates over the
Cyc project in AI). Differences between the two are
Web-based services (often with agents of their largely matters of focus. Philosophers are less con-
own) to supply information specifically to agents cerned with establishing fixed, controlled vocabular-
(for example, a Trust service that an agent could ask ies than are researchers in computer science, while
if some online store has a history of poor service or computer scientists are less involved in discussions
spamming).Lets now look at the building blocks of first principles (such as debating whether there
starting with ontology. are such things as fixed essences, or whether enti-
ties must be ontologically more primary than pro-
Ontology cesses).
Ontologies are often equated with taxonomic hi- Restrictions: formally stated descriptions of what
erarchies of classes, class definitions, and the sub- must be true in order for some assertion to be
sumption relation, but ontologies need not be lim- acceptedas input
ited to these forms. Ontologies are also not limited
to conservative definitions – that is, definitions in Rules: statements in the form of an if-then (anteced-
the traditional logic sense that only introduce ter- ent-consequent) sentence that describe the logical
minology and do not add any knowledge about the inferences that can be drawn from an assertion in a
world. To specify a conceptualization, one needs to particular form
state axioms that do constrain the possible inter-
pretations for the defined terms. Axioms: assertions (including rules) in a logical form
that together comprise the overall theory that the
In the early years of the 21st century, the interdisci- ontology describes in its domain of application.
plinary project of cognitive science has been bring- This definition differs from that of “axioms” in gener-
ing the two circles of scholars closer together. For ative grammar and formal logic. In these disciplines,
example, there is talk of a “computational turn in axioms include only statements asserted as a priori
philosophy” that includes philosophers analyzing knowledge. As used here, “axioms” also include the
the formal ontologies of computer science (some- theory derived from axiomatic statements.
times even working directly with the software),
while researchers in computer science have been Events: the changing of attributes or relations
making more references to those philosophers who
work on ontology (sometimes with direct conse- Lets now move on to Folksonomy ......
quences for their methods). Still, many scholars in
both fields are uninvolved in this trend of cogni- Folksonomy
tive science, and continue to work independently
of one another, pursuing separately their different Folksonomy (also known as collaborative tagging,
concerns. social classification, social indexing, and social tag-
ging) is the practice and method of collaboratively
Ontology components creating and managing tags to annotate and cat-
egorize content. Folksonomy describes the bottom-
Contemporary ontologies share many structural up classification systems that emerge from social
similarities, regardless of the language in which tagging. In contrast to traditional subject indexing,
they are expressed. As mentioned above, most on- metadata is generated not only by experts but also
tologies describe individuals (instances), classes by creators and consumers of the content. Usually,
(concepts), attributes, and relations. In this section freely chosen keywords are used instead of a con-
each of these components is discussed in turn. trolled vocabulary. Folksonomy (from folk + taxono-
my) is a user-generated taxonomy.
Common components of ontologies include:
Folksonomies became popular on the Web around
Individuals: instances or objects (the basic or 2004 as part of social software applications including
“ground level” objects) social bookmarking and annotating photographs.
Tagging, which is characteristic of Web 2.0 services,
Classes: sets, collections, concepts, types of objects, allows non-expert users to collectively classify and
or kinds of things. find information. Some websites include tag clouds
as a way to visualize tags in a folksonomy.
Attributes: aspects, properties, features, character-
istics, or parameters that objects (and classes) can Typically, folksonomies are Internet-based,
have
although they are also used in other contexts. Ag- Classification systems have several problems: they
gregating the tags of many users creates a folkson- can be slow to change, they reflect (and reinforce) a
omy.[1] Aggregation is the pulling together of all of particular worldview, they are rooted in the culture
the tags in an automated way. Folksonomic tagging and era that created them, and they can be absurd
is intended to make a body of information increas- at times.I diosyncratic folksonomic classification
ingly easy to search, discover, and navigate over within a clique can especially reinforce pre-existing
time. A well-developed folksonomy is ideally acces- viewpoints. Folksonomies are routinely generated
sible as a shared vocabulary that is both originated by people who have spent a great deal of time in-
by, and familiar to, its primary users. Two widely cit- teracting with the content they tag, and may not
ed examples of websites using folksonomic tagging properly identify the content’s relationship to exter-
are Flickr and Delicious, although Flickr may not be nal items.
a good example of folksonomy.
For example, items tagged as “Web 2.0” represent
As folksonomies develop in Internet-mediated so- seemingly inconsistent and contradictory resourc-
cial environments, users can discover who used a es. The lack of a hierarchical or systematic structure
given tag and see the other tags that this person for the tagging system makes the terms relevant
has used. In this way, folksonomy users can discover to what they are describing, but often fails to show
the tag sets of another user who tends to interpret their relevancy or relationship to other objects of
and tag content in a way that makes sense to them. the same or similar type.
The result can be a rewarding gain in the user’s ca-
pacity to find related content (a practice known as Origin
“pivot browsing”). Part of the appeal of folksonomy
is its inherent subversiveness: when faced with The term folksonomy is generally attributed to Thom-
the choice of the search tools that Web sites pro- as Vander Wal.[6][7] It is a portmanteau of the words
vide, folksonomies can be seen as a rejection of the folk (or folks) and taxonomy that specifically refers
search engine status quo in favor of tools that are to subject indexing systems created within Internet
created by the community. communities. Folksonomy has little to do with taxon-
omy—the latter refers to an ontological, hierarchical
Folksonomy creation and searching tools are not way of categorizing, while folksonomy establishes
part of the underlying World Wide Web protocols. categories (each tag is a category) that are theoreti-
Folksonomies arise in Web-based communities cally “equal” to each other (i.e., there is no hierarchy,
where provisions are made at the site level for cre- or parent-child relation between different tags).
ating and using tags. These communities are es-
tablished to enable Web users to label and share Early attempts and experiments include the World
user-generated content, such as photographs, or to Wide Web Consortium’s Annotea project with user-
collaboratively label existing content, such as Web generated tags in 2002.[8] According to Vander Wal,
sites, books, works in the scientific and scholarly lit- a folksonomy is “tagging that works”.
eratures, and blog entries.
Folksonomy is unrelated to folk taxonomy, a cultural
Practical evaluation practice that has been widely documented in anthro-
pological and folkloristic work. Folk taxonomies are
Folksonomy is criticized because its lack of termino- culturally supplied, intergenerationally transmitted,
logical control causes it to be more likely to produce and relatively stable classification systems that peo-
unreliable and inconsistent results. If tags are freely ple in a given culture use to make sense of the entire
chosen (instead of taken from a given vocabulary), world around them (not just the Internet).
synonyms (multiple tags for the same concept), hom-
onymy (same tag used with different meaning), and Folksonomy and the Semantic Web
polysemy (same tag with multiple related meanings)
are likely to arise, lowering the efficiency of content Folksonomy may hold the key to developing a Se-
indexing and searching.[4] Other reasons for meta mantic Web, in which every Web page contains ma-
noise are the lack of stemming (normalization of chinereadable metadata that describes its content.[10]
word inflections) and the heterogeneity of users and Such metadata would dramatically improve the preci-
contexts. sion (the percentage of relevant documents) in search
engine retrieval lists. However, it is difficult to see
how the large and varied community of Web page
authors could be persuaded to add metadata to
their pages in a consistent, reliable way; web au-
thors who wish to do so experience high entry costs
because metadata systems are time-consuming to
learn and use.[12] For this reason, few Web authors
make use of the simple Dublin Core metadata stan-
dard, even though the use of Dublin Core meta-tags
could increase their pages’ prominence in search
engine retrieval lists.[13] In contrast to more formal- FOAF Logo
ized, top-down classifications using controlled vo-
cabularies, folksonomy is a distributed classification the first Social Semantic Web application, in that it
system with low entry costs. combines
Main problems of folksonomy tagging RDF technology with ‘Social Web’ concerns. Tim
Berners-Lee in a recent essay[1] (http://dig.csail.mit.
Four main problems of folksonomy tagging are plu- edu/breadcrumbs/node/215) redefined the Seman-
rals, polysemy, synonymy, and depth (specificity) of tic web concept into something he calls the Giant
tagging. Folksonomy-based systems can employ Global Graph, where relationships transcend net-
optional authority control of subject keywords, works/documents. He considers the GGG to be on
place, personal, or corporate names and resource equal grounds with Internet and World Wide Web,
titles, by connecting the system to established au- stating that “I express my network in a FOAF file, and
thority control files or controlled vocabularies using that is a start of the revolution.”
new techniques. A folksonomy-based system needs
a controlled vocabulary and a suggestion-based
system.
FOAF
>>
FOAF (an acronym of Friend of a Friend) is a ma-
chine-readable ontology describing persons, their
activities and their relations to other people and
objects. Anyone can use FOAF to describe him or
herself. FOAF allows groups of people to describe
social networks without the need for a centralised
database.
y how user
affects tech
Digital Culture That is why I studied it and then focused on the so-
cial aspects of this digitized world to extract some
In the western world (and also the developing na- knowledge about what makes things click in this
tions now) and increasingly everywhere we are be- rapidly changing area of online communication,
coming more and more digitized. This is true of pro- online presence and social networking. I found
cesses, activities and communication. Many of us some very interesting things which I’ll be sharing as
find ourselves spending a fair share of our lives on we move apace. I’ll be looking at services like IRC
the computer, and that computers are also moving , Yahoo messenger and Orkut and study the social
out of the gray boxes and into our everyday lives in implications that they brought about and how the
the form of PDA’s, mobile technology and wireless users affect these technology based services.
networks. Some aspects of our lives are becoming
virtualized. Clearly this is an area which is inherently But first we should look at what are these services in
multidisciplinary as it involves so many different greater detail so we will be reading about social net-
things. working services , instant messengers , social net-
working aggregators , etc and when we reach each
First of all it is a good idea to identify some of the of the examples a little history on them too.
salient aspects of digital culture. My personal list
would probably include cyberspace , spatial de- Social Networking Services
sign, virtual reality , online communication, virtual
communities, online environments , social aspects A social network service focuses on building online
of online life, embodiment , socialization, identity , communities of people who share interests and
reputation, immersion, interfaces , hypertext, narra- activities, or who are interested in exploring the in-
tives , blogs , digital art , computer games. terests and activities of others. Most social network
services are web based and provide a variety of
This is a long list which at first might look a bit clut- ways for users to interact, such as e-mail and instant
tered , but it does help us approach the field. Look- messaging services.
ing at this we can only imagine the huge amounts
of data each individual who is a part of this digital Social networking has created new ways to com-
culture is creating both with and without his knowl- municate and share information. Social networking
edge. Now it is up to us whether we decide to use websites are being used regularly by millions of
this goldmine of data to our advantage or look the people, and it now seems that social networking
other way and continue the traditional methods of will be an enduring part of everyday life. The main
knowing our consumers. types of social networking services are those which
contain directories of some categories (such as
Especially the people who are engaged in the de- former classmates), means to connect with friends
sign of online services and things which are or (usually with self-description pages), and recom-
would be a part of the digital culture have to look at mender systems linked to trust. Popular methods
these new methods to design or produce new ideas now combine many of these, with MySpace and Fa-
and services which create a whole new area for rev- cebook being the most widely used in North Amer-
enue generation. ica; Nexopia (mostly in Canada); Bebo, Facebook,
Hi5, MySpace, Tagged, Xing; and Skyrock in parts of
This is where I thought of expanding the normal Europe; Orkut and Hi5 in South America and Central
ethnographic methods of learning more about your America; and Friendster, Orkut, Xiaonei and Cyworld
consumer by studying his online life and the partici- in Asia and the Pacific Islands.
patory methods in this digital culture. So first I went
about trying to find out what are we doing current- There have been some attempts to standardize
ly to mine this data, and then I stumbled upon this these services to avoid the need to duplicate entries
absolutely brilliant platform of “The Semantic Web” of friends and interests (see the FOAF standard and
which had me more or less out of business because the Open Source Initiative), but this has led to some
it already had proposed a platform for the very concerns about privacy.
things I wanted to do , that too automatically and
was already put into practice in secluded packets,
enjoying success.
History of social networking services site in the world, not limited by particular geograph-
ic followings.
The notion that individual computers linked elec-
tronically could form the basis of computer mediat- Social networking began to flourish as a compo-
ed social interaction and networking was suggested nent of business internet strategy at around March
early on . There were many early efforts to support 2005 when Yahoo launched Yahoo! 360°. In July
social networks via computer-mediated communi- 2005 News Corporation bought MySpace, followed
cation, including Usenet, ARPANET, LISTSERV, bul- by ITV (UK) buying Friends Reunited in December
letin board services (BBS), and EIES: Murray Turoff’s 2005. Various social networking sites have sprung
server-based Electronic Information Exchange Ser- up catering to different languages and countries.
vice (Turoff and Hiltz, 1978, 1993). The Information It is estimated that combined there are now over
Routing Group developed a schema about how the 200 social networking sites using these existing
proto-Internet might support this. and emerging social networking models, without
counting the niche social networks (also referred to
Early social networking websites included Class- as vertical social networks) made possible by ser-
mates.com (1995), focusing on ties with former vices such as Ning and KickApps.
school mates, and SixDegrees.com (1997), focusing
on indirect ties. User profiles could be created, mes- Research on the social impact of social
sages sent to users held on a “friends list” and other networking software
members could be sought out who had similar in-
terests to yours in their profiles. Whilst these fea-
tures had existed in some form before SixDegrees. An increasing number of academic commenta-
com came about, this would be the first time these tors are becoming interested in studying Facebook
functions were available in one package. Despite and other social networking tools. Social science
these new developments (that would later catch on researchers have begun to investigate what the
and become immensely popular), the website sim- impact of this might be on society. Typical articles
ply wasn’t profitable and eventually shut down. It have investigated issues such as
was even described by the website’s owner as “sim-
ply ahead of its time.” Two different models of social Identity
networking that came about in 1999 were trust- Privacy
based, developed by Epinions.com, and friendship- E-learning
based, such as those developed by Jonathan Bishop Social capital
and used on some regional UK sites between 1999 Teenage use
and 2001.
A special issue of the Journal for Computer-Medi-
Innovations included not only showing who is ated Communications was dedicated to studies of
“friends” with whom, but giving users more control social network sites (http://jcmc.indiana.edu/vol13
over content and connectivity. Between 2002 and /issue1/) . Included in this issue is an introduction to
2004, three social networking sites emerged as the social network sites. A list of academic scholarship
most popular form of these sites in the world, caus- on these sites is also available. A 2008 book pub-
ing such sites to become part of mainstream users lished by Forrester Research, Inc. titled Groundswell
globally. First there was Friendster (which Google builds on a 2006 Forrester Report about social com-
tried to acquire in 2003), then, MySpace, and finally, puting and coins the term groundswell to mean
Bebo. By 2005, MySpace, emergent as the biggest “a spontaneous movement of people using online
of them all, was reportedly getting more page views tools to connect, take charge of their own experi-
than Google. 2004 saw the emergence of Facebook, ence, and get what they need-information, support,
a competitor, also rapidly growing in size. In 2006, ideas, products, and bargaining power--from each
Facebook opened up to the non US college commu- other.”
nity, and together with allowing externally-devel-
oped add-on applications, and some applications Business applications
enabled the graphing of a user’s own social network
- thus linking social networks and social network- Social networks connect people at low cost; this can
ing, became the largest and fastest growing be beneficial for entrepreneurs and small business
looking to expand their contact base. These net- audience with interested and passionate users. Users
works often act as a customer relationship man- benefit by interacting with a like minded communi-
agement tool for companies selling products and ty and finding a channel for their energy and giving.
services. Companies can also use social networks Examples include SixDegrees.org,TakingITGlobal
for advertising in the form of banners and text ads. and Network for Good. The charity badge is often
Since businesses operate globally, social networks used within the above context.
can make it easier to keep in touch with contacts
around the world. Pros of Social networking applications
One example of social networking being used for CMC can have a positive effect on student/teacher
business purposes is LinkedIn.com, which aims to communication which can lead to positive student
interconnect professionals. It claims to have more outcomes. The use of emoticons enables the rela-
than 20 million registered users from 150 different tionship between teachers and students to become
industries. more personal.
Professional networking sites function as online Business decision makers are now preferring com-
meeting places for business and industry profes- munication channels that are two-way dialogs,
sionals. Other sites are bringing this model for niche channels that resemble social networking applica-
business professional networking. tions. This is a great way for businesses to advertise
their product. It is also a way that has proved to be
Virtual communities for business allow individuals more effective than the previous “word of mouth”
to be accessible. People establish their real identity influence.
in a verifiable place. These individuals then interact
with each other or within groups that share com- Social networking allows us to identify and connect
mon business interests and goals. They can also with friends and strangers while on the go. Such
post their own user generated content in the form computer mediated communication also allows us
of blogs, pictures, slide shows and videos. Like a so- to reconnect with friends from the past whom we
cial network, the consumer essentially becomes the may have lost contact with.
publisher.
LinkdeIn is a sns (social networking site) particular-
A professional network is used for the business to ly used by jobseekers. It is a tool used to link users
business marketplace. These networks improve to people they may have worked with in the past
the ability for people to advance professionally, by through various jobs or institutions. Users also have
finding, connecting and networking with others. the opportunity to link to certain companies they
Business professionals can share experiences with aspire to work with.
others who have a need to learn from similar experi-
ences.
Cons of Social Networking Applications
The traditional way to interact is face-to-face. In-
On the contrary, all networking applications used
teractive technology makes it possible for people
in the professional environment are not beneficial
to network with their peers from anywhere, at any-
or successful. Some prospects experience trouble
time in an online environment. Professional net-
while trying to build their networks, thus they may
work services attract, aggregate and assemble large
produce ineffective work. Employees are now more
business-focused audiences by creating informative
likely than before to carry inappropriate conversa-
and interactive meeting places.
tions at work. Communicating with such technolo-
gies creates a relaxed feeling in a professional en-
Social networks for social good vironment. Some messages that should be relayed
in person are being sent through the computer; the
Several websites are beginning to tap into the pow- nature of the message and the audience should dic-
er of the social networking model for social good. tate the medium used to transmit the message. The
Such models may be highly successful for connect- ability to network with 100 people will not improve
ing otherwise fragmented industries and small or- our communication skills when in contact with
ganizations without the resources to reach a broad them.
Social networking has forced people to trade in Social status
fewer relationships with close family and friends
for distant and virtual ones that are much greater The social status of an individual is revealed on so-
quantitatively. cial networks. Sociologist, Erving Goffman refers to
the “Interaction Order” which he claims is the “part
Typical structure of a social networking of the social life where face-to-face and spoken in-
teractions occur” (Rhiengold: 2002, P171). He be-
service lieves that the way people represents themselves
provides other users information about them they
Basics want others to believe while concealing the rest.
Goffman beliefs that peole also give off “information
In general, social networking services allow users to leaking true but uncontrolled information along
create a profile for themselves, and can be broken with their more deliberate performances” (Rhein-
down into two broad categories: internal social net- gold: 2002, P171). Through social networks people
working (ISN) and external social networking (ESN) are now able to completely control the information
sites, such as Orkut,MySpace, Facebook and Bebo. provided about themselves through the photos
Both types can increase the feeling of community they include, the information provided, whether it
among people. An ISN is a closed/private com- be true or false and the friends they make. People
munity that consists of a group of people within a are therefore now able to control their personal in-
company, association, society, education provider formation and their desired social status.
and organization or even an “invite only” group cre-
ated by a user in an ESN. An ESN is open/public and Some social networks have additional features, such
available to all web users to communicate and are as the ability to create groups that share common
designed to attract advertisers. ESN’s can be small- interests or affiliations, upload or stream live videos,
er specialised communities (i.e. linked by a single and hold discussions in forums. Geosocial network-
common interest eg TheSocialGolfer, ACountryLife. ing co-opts internet mapping services to organize
Com, Great Cooks Community) or they can be large user participation around geographic features and
generic social networking sites (eg MySpace, Face- their attributes.
book etc).
There is also a trend for more interoperability be-
However, whether specialised or generic there is tween social networks led by technologies such
commonality across the general approach of so- as OpenID and OpenSocial. Lately, mobile social
cial networking sites. Users can upload a picture of networking has become popular. In most mobile
themselves, create their ‘profile’ and can often be communities, mobile phone users can now create
“friends” with other users. In most social network- their own profiles, make friends, participate in chat
ing services, both users must confirm that they are rooms, create chat rooms, hold private conversa-
friends before they are linked. For example, if Alice tions, share photos and videos, and share blogs by
lists Bob as a friend, then Bob would have to ap- using their mobile phone. Mobile phone users are
prove Alice’s friend request before they are listed basically open to every option that someone sitting
as friends. Some social networking sites have a “fa- on the computer has. Some companies provide
vorites” feature that does not need approval from wireless services which allow their customers to
the other user. Social networks usually have privacy build their own mobile community and brand it, but
controls that allows the user to choose who can one of the most popular wireless services for social
view their profile or contact them, etc. networking in North America is Facebook Mobile.
Other companies provide new innovative features
Several social networks in Asian markets such as In- which extend the social networking experience into
dia, China, Japan and Korea have reached not only the real world.
a high usage but also a high level of profitability.
Services such as QQ (China), Mixi (Japan), Cyworld
(Korea) or the mobile-focused service Mobile Game
Town by the company DeNA in Japan (which has
over 10 million users) are all profitable, setting them
apart from their western counterparts.
Business model of these sites to an individual, may be taken.
Few social networks currently charge money for Furthermore, there is an issue over the control of
membership. In part, this may be because social data - information having been altered or removed
networking is a relatively new service, and the value by the user may in fact be retained and/or passed to
of using them has not been firmly established in 3rd parties. This danger was highlighted when the
customers’ minds. Companies such as MySpace and controversial social networking site Quechup har-
Facebook sell online advertising on their site. Hence, vested e-mail addresses from users’ e-mail accounts
they are seeking large memberships, and charg- for use in a spamming operation.
ing for membership would be counter productive.
Some believe that the deeper information that the In medical and scientific research, asking subjects
sites have on each user will allow much better tar- for information about their behaviors is normally
geted advertising than any other site can currently strictly scrutinized by institutional review boards, for
provide. Sites are also seeking other ways to make example, to ensure that adolescents and their par-
money, such as by creating an online marketplace ents have informed consent. It is not clear whether
(Facebook’s Marketplace) or by selling professional the same rules apply to researchers who collect
information and social connections to businesses: data from social networking sites. These sites often
such as LinkedIn. contain a great deal of data that is hard to obtain via
traditional means. Even though the data are public,
Social networks operate under an autonomous republishing it in a research paper might be consid-
business model, in which a social network’s mem- ered invasion of privacy.
bers serve dual roles as both the suppliers and the
consumers of content. This is in contrast to a tra- Investigations
ditional business model, where the suppliers and
consumers are distinct agents. Revenue is typically Social network services are increasingly being used
gained in the autonomous business model via ad- in legal and criminal investigations. Information
vertisements, but subscription-based revenue is posted on sites such as MySpace and Facebook has
possible when membership and content levels are been used by police, probation, and university of-
sufficiently high. ficials to prosecute users of said sites. In some situ-
ations, content posted on MySpace has been used
Other business models such as including digital in court.
goods (personalization, avatars, background mu-
sic, skins, gifts, etc.), connection with casual games Facebook is increasingly being used by school ad-
(on QQ in China or Mobile Game Town in Japan), or ministrations and law enforcement agencies as a
link to mobile first made successful in Asia. QQ’s rev- source of evidence against student users. The site,
enues in 2007 were US$523 million and a US$225 the number one online destination for college stu-
million profit. dents, allows users to create profile pages with per-
sonal details. These pages can be viewed by other
Privacy registered users from the same school which often
include resident assistants and campus police who
On large social networking services, there have have signed-up for the service.
been growing concerns about users giving out too
much personal information and the threat of sexual Potential for misuse
predators. Users of these services need to be aware
of data theft or viruses. However, large services, The relative freedom afforded by social networking
such as MySpace, often work with law enforcement services has caused concern regarding the poten-
to try to prevent such incidents. tial of its misuse by individual patrons. In October
2006, a fake Myspace profile created in the name of
In addition, there is a perceived privacy threat in Josh Evans by Lori Janine Drew led to the suicide
relation to placing too much personal information of Megan Meier. The event incited global concern
in the hands of large corporations or governmental regarding the use of social networking services for
bodies, allowing a profile to be produced on an in- bullying purposes.
dividual’s behavior on which decisions, detrimental
In July 2008, a Briton, Grant Raphael, was ordered members to share their other social network activi-
to pay a total of GBP £22,000 (about USD $44,000) ties like Twitter, Youtube, Stumbleupon, Digg, and
for libel and breach of privacy. Raphael had posted other major platforms.
a fake page on Facebook purporting to be that of
a former schoolfriend Matthew Firsht, with whom One can also integrate their blog posts and com-
Raphael had fallen out in 2000. The page falsely ments in the aggregation platform. Everything
claimed that Firsht was homosexual and that he is shown in real time to other members who sub-
was dishonest. scribe to a particular community, which eliminates
the need to jump from one social media network to
At the same, genuine use of social networking ser- another, trying to keep an eye on one’s interests. [5]
vices has been treated with suspicion on the ground The aggregation is done by an API application. For
of the services’ misuse. In September 2008, the the API to be able to access a users actions from
profile of Australian Facebook user Elmo Keep was another platform, the user will have to give permis-
banned by the site’s administrators on the grounds sion to the social aggregation platform, by specify-
that it violated the site’s terms of use. Keep is one of ing user id and password of the social media to be
several users of Facebook who were banned from syndicated. This concept is similar to open id.
the site on the presumption that their names aren’t
real, as they bear resemblance the names of char- Distributed social networking
acters like Sesame Street’s Elmo. The misuse of so-
cial networking services has led many to cast doubt In March 2008, The Economist reported that social
over whether any information on these services can network services are only beginning the move away
in fact be regarded as true. from “walled gardens” to more open architectures.
Some sites are working together on a “data porta-
bility workgroup”, while others are focussing on a
Social Networking Aggregation single sign-on system called OpenID to allow users
to log on across multiple sites. Historically the trend
Social network aggregation is the process of col- from private services to more open ones can be
lecting content from multiple social network ser- seen across many internet services from email and
vices, such as MySpace or Facebook. The task is instant messaging to the move that early online ser-
often performed by a social network aggregator, vice providers made to become websites..
which pulls together information into a single loca-
tion[1], or helps a user consolidate multiple social The OpenSocial initiative aims to bridge the mem-
networking profiles into one profile. Various aggre- ber overlap between various online social network
gation services provide tools or widgets to allow us- services.
ers to consolidate messages, track friends, combine
bookmarks, search across multiple social network- Overlap between multiple social network
ing sites, read rss feeds for multiple social networks,
see when their name is mentioned on various sites,
services
access their profiles from a single interface, provide
Many users have accounts on several different social
“lifestreams”, etc
networking sites. In November 2007, Alex Patriquin
of Compete.com reported on the member overlap
Social network aggregation services attempt to or-
between various online social network services:
ganize or simplify a user’s social networking expe-
rience although the idea has been satirized by the
Members of Bebo
concept of a “social network aggregator aggrega-
65% are MySpace members.
tor.”
25% are Facebook members.
3% are Hi5 members.
Social Networking Aggregators 2% are Friendster members.
1% are LinkedIn members.
FriendFeed, Gathera, Youmeo, Spokeo and Second- 1% are Ning members.
brain are examples of social network aggregators. 0% are Orkut members.
Social network aggregation platforms like Myblo- 0% are Plaxo members.
glog, a Yahoo property, Plaxo, Jaiku or others, allow
Members of Facebook Members of Ning
64% are MySpace members. 44% are MySpace members.
9% are Plaxo members. 35% are Facebook members.
4% are Bebo members. 19% are LinkedIn members.
2% are Friendster members. 6% are Bebo members.
2% are Hi5 members. 6% are Friendster members.
2% are LinkedIn members. 2% are Orkut members.
1% are Ning members. 2% are Plaxo members.
1% are Orkut members. 1% are Hi5 members.
Members of LinkedIn
42% are Facebook members.
32% are MySpace members.
8% are Friendster members.
8% are Ning members. Instant messaging · Internet
4% are Bebo members.
3% are Orkut members.
3% are Plaxo members. Instant messaging (IM) is a form of real-time com-
2% are Hi5 members. munication between two or more people based on
typed text. The text is conveyed via devices con-
Members of MySpace nected over a network such as the Internet.
20% are Facebook members.
3% are Bebo members.
1% are Friendster members.
Overview
1% are Hi5 members.
Instant messaging (IM) and chat are technologies
0% are LinkedIn members.
that create the possibility of real-time text-based
0% are Ning members.
communication between two or more participants
0% are Orkut members.
over the internet or some form of internal network/
0% are Plaxo members.
intranet. It is important to understand that what
separates chat and instant messaging from technol-
ogies such as e-mail is the perceived synchronicity
of the communication by the user - Chat happens in
real-time before your eyes.
Some systems allow the sending of messages to
people not currently logged on (offline messages),
thus removing much of the difference between In-
stant Messaging and e-mail.
IM allows effective and efficient communication, In early instant messaging programs each
featuring immediate receipt of acknowledgment character appeared when it was typed.
or reply. In certain cases Instant Messaging involves The UNIX “talk”command shown in these
additional features, which make it even more pop- screenshots was popular inthe
ular, i.e. to see the other party, e.g. by using web- 1980s and early 1990s.
cams, or to talk directly for free over the Internet.
It is possible to save a conversation for later refer- While the Quantum Link service ran on a Commo-
ence. Instant messages are typically logged in a dore 64, using only the Commodore’s PETSCII text-
local message history which closes the gap to the graphics, the screen was visually divided up into
persistent nature of e-mails and facilitates quick ex- sections and OLMs would appear as a yellow bar
change of information like URLs or document snip- saying “Message From:” and the name of the sender
pets (which can be unwieldy when communicated along with the message across the top of whatever
via telephone). the user was already doing, and presented a list of
options for responding. As such, it could be consid-
History ered a sort of GUI, albeit much more primitive than
the later Unix, Windows and Macintosh based GUI
Instant messaging actually predates the Internet, IM programs. OLMs were what Q-Link called “Plus
first appearing on multi-user operating systems like Services” meaning they charged an extra per-min-
CTSS and Multics[1] in the mid-1960s. Initially, many ute fee on top of the monthly Q-Link access costs.
of these systems, such as CTSS’.SAVED, were used Modern, Internet-wide, GUI-based messaging cli-
as notification systems for services like printing, ents, as they are known today, began to take off in
but quickly were used to facilitate communication the mid 1990s with ICQ (1996) being the first, fol-
with other users logged in to the same machine. As lowed by AOL Instant Messenger (AOL Instant Mes-
networks developed, the protocols spread with the senger, 1997).
networks. Some of these used a peer-to-peer proto-
col (eg talk, ntalk and ytalk), while others required AOL later acquired Mirabilis, the creators of ICQ.
peers to connect to a server (see talker and IRC). A few years later ICQ (by now owned by AOL) was
During the Bulletin board system (BBS) phenom- awarded two patents for instant messaging by the
enon that peaked during the 1980s, some systems U.S. patent office. Meanwhile, other companies
incorporated chat features which were similar to developed their own applications (Excite, MSN,
instant messaging; Freelancin’ Roundtable was one Ubique, and Yahoo), each with its own proprietary
prime example. protocol and client; users therefore had to run mul-
tiple client applications if they wished to use more
In the last half of the 1980s and into the early 1990s, than one of these networks. In 1998 IBM released
the Quantum Link online service for Commodore 64 IBM Lotus Sametime, a product based on technolo-
computers offered user-to-user messages between gy acquired when IBM bought Haifa-based Ubique
currently connected customers which they called and Lexington-based Databeam.
“On-Line Messages” (or OLM for short). Quantum
Link’s better known later incarnation, America On- In 2000, an open source application and open stan-
line, offers a similar product under the name “AOL dards-based protocol called Jabber was launched.
Instant Messenger” (AIM). Jabber servers could act as gateways to other
IM protocols, reducing the need to run multiple cli- IM providers (AOL, Yahoo! and Microsoft) have
ents. Multi-protocol clients can use any of the pop- failed and each continues to use its own proprietary
ular IM protocols by using additional local libraries protocol.
for each protocol. IBM Lotus Sametime’s November
2007 release added IBM Lotus Sametime Gateway However, while discussions at IETF were stalled,
support for XMPP. Reuters head of collaboration services, David Gurle
(the founder of Microsoft’s Real Time Communica-
Recently, many instant messaging services have be- tion and Collaboration business), signed the first
gun to offer video conferencing features, Voice Over inter-service provider connectivity agreement on
IP (VoIP) and web conferencing services. Web con- September 2003. This agreement enabled AIM, ICQ
ferencing services integrate both video conferenc- and MSN Messenger users to talk with Reuters Mes-
ing and instant messaging capabilities. Some newer saging counterparts and vice-versa against an ac-
instant messaging companies are offering desktop cess fee. Following this, Microsoft, Yahoo! and AOL
sharing, IP radio, and IPTv to voice and video fea- came to a deal where Microsoft’s Live Communica-
tures. tion Server 2005 users would also have the possi-
bility to talk to public instant messaging users. This
The term “instant messenger” is a service mark of deal established SIP/SIMPLE as a standard for proto-
Time Warner and may not be used in software not col interoperability and established a connectivity
affiliated with AOL in the United States. For this rea- fee for accessing public instant messaging clouds.
son, the instant messaging client formerly known Separately, on October 13, 2005 Microsoft and Ya-
as Gaim or gaim announced in April 2007 that they hoo! announced that by (the Northern Hemisphere)
would be renamed “Pidgin” summer of 2006 they would interoperate using SIP/
SIMPLE which is followed on December 2005 by the
AOL and Google strategic partnership deal where
Cooperation Google Talk users would be able to talk with AIM and
ICQ users provided they have an identity at AOL.
Standard free instant messaging applications offer
functions like file transfer, contact lists, the ability There are two ways to combine the many disparate
to have simultaneous conversations etc These may protocols:
be all the functions that a small business needs but
larger organisations will require more sophisticated 1. One way is to combine the many disparate proto-
applications that can work together. The solution cols inside 1. the IM client application.
to finding applications capable of this is to use en-
terprise versions of instant messaging applications. 2. The other way is to combine the many disparate
These include titles like Jabber, Lotus Sametime, Mi- protocols inside the IM server application. This ap-
crosoft Office Communicator, etc., which are often proach moves the task of communicating to the
integrated with other enterprise applications such other services to the server. Clients need not know
as workflow systems. These enterprise applications, or care about other IM protocols.
or Enterprise Application Integration (EAI), are built
to certain constraints, namely storing data in a com- For example, LCS 2005 Public IM Connectivity. This
mon format. approach is popular in Jabber/XMPP servers how-
ever the so-called transport projects suffer the same
There have been several attempts to create a unified reverse engineering difficulties as any other project
standard for instant messaging: IETF’s SIP (Session involved with closed protocols or formats.
Initiation Protocol) and SIMPLE (SIP for Instant Mes-
saging and Presence Leveraging Extensions), APEX Some approaches allow organizations to create
(Application Exchange), Prim (Presence and Instant their own private instant messaging network by en-
Messaging Protocol), the open XML-based XMPP abling them tolimit access to the server (often with
(Extensible Messaging and Presence Protocol), more the IM network entirely behind their firewall) and
commonly known as Jabber and OMA’s (Open Mo- administer user permissions. Other corporate mes-
bile Alliance) IMPS (Instant Messaging and Presence saging systems allow registered users to also con-
Service) created specifically for mobile devices. Most nect from outside the corporation LAN, by using a
attempts at creating a unified standard for the major secure firewall-friendly HTTPS based protocol.
Typically, a dedicated corporate IM server has sev- keystrokes. The language has become universal,
eral advantages such as pre-populated contact lists, with well known expressions such as ‘lol’ translated
integrated authentication, and better security and over to face to face language. Emotions are often
privacy. expressed in shorthand, such as the abbreviation
LOL. Some, however, attempt to be more accurate
Some networks have made changes to prevent with emotional expression over IM. Real time reac-
them from being utilized by such multi-network IM tions such as (chortle) (snort) (guffaw) or (eye-roll)
clients. For example, Trillian had to release several are becoming more popular. Also there are certain
revisions and patches to allow its users to access standards that are being introduced into main-
the MSN, AOL, and Yahoo! networks, after changes stream conversations including, ‘#’ indicates the use
were made to these networks. The major IM provid- of sarcasm in a statement and ‘*’ which indicates a
ers typically cite the need for formal agreements spelling mistake and/or grammatical error in the
as well as security concerns as reasons for making previous message, followed by a correction.
these changes.
Operators have adopted their own code of eti- Internet Relay Chat (IRC) is a form of real-time Inter-
quette regarding /kills. It is the general rule that an net chat or synchronous conferencing. It is mainly
operator issuing such a command should let other designed for group communication in discussion
operators, and the victim, know the reason for his forums called channels, but also allows one-to-one
or her action by adding a comment to the ‘/kill mes- communication via private message, as well as chat
sage’ that fellow operators will receive: and data transfers via Direct Client-to-Client.
*** Notice -- Received KILL message for I4982784 IRC was created by Jarkko Oikarinen in late August
from MaryD (Obscene Dumps!!!) 1988 to replace a program called MUT (MultiUser
*** Notice -- Received KILL message for mic from talk) on a BBS called OuluBox in Finland. Oikarinen
mgp (massive abusive channel dumping involv- found inspiration in a chat system known as Bitnet
ing lots of ctrl-gs and gaybashing, amongst other Relay, which operated on the BITNET.
almost as obnoxious stuff )
*** Notice -- Received KILL message for JP from IRC was used to report on the Soviet coup attempt
Cyberman ((repeatedely ignorning warnings to of 1991 throughout a media blackout.[1] It was pre-
stop nickname abuse))(68) viously used in a similar fashion during the Iraqi in-
vasion. Logs of these events, and other events, are
There is no technical reason why such comments kept in the ibiblio archive.[2]
or excuses should be given - they are purely a ‘cour-
tesy’. Those in authority on IRC have self-imposed IRC client software is available for virtually every
codes of behaviour which supposedly serve to en- computer operating system.Let us look further into
sure that operator privileges are not abused. the structure of irc.
Let us now look at 3 examples of such services
namely irc, orkut and yahoo messenger and what Commands and replies
are the reasons that they are enjoying success or
having a hard time surviving in the ever changing IRC is based on a line-based structure with the client
web. sending single-line messages to the server, receiv-
ing replies to those messages and receiving copies
of some messages sent by other clients. In most cli-
ents users can enter
commands by prefixing them with /. Depending on
the command, these may either be handled entirely
by the
client, or - generally for commands the client does
not recognize - passed directly to the server, pos-
sibly with
some modification.
Due to the nature of the protocol, it is impossible for
automated systems to pair a sent command with its
reply.
Channels
The basic means of communication in an estab-
lished IRC session is a channel. Channels in a server
can be
displayed using the command /list [#string] [-min #]
[-max #] that lists all currently available channels,
optionally filtering for parameters (#string for the Workarounds for this are possible on both the client
entire or part of the name, with wildcards, and #min and server side but none are widely implemented.
/ #max for number of users in the channel).
Many IRCd programmers have added extra modes
Users can join to a channel using the command / or modified the behavior of modes in the above list
join #channelname and send messages to it, which so it is strongly advisable to check the documenta-
are relayed to all other users on the same channel. tion of the IRC network or IRCd (though note that
Channels that are available across an entire IRC net- the network may have patched the IRCd) for more
work are prepended with a ‘ # ‘, while those local to detailed information on what the modes do on a
a server use ‘&’. Other non-standard and less com- particular server or network.
mon channel types include ‘+’ channels — ‘mode-
less’ channels without operators, and ‘!’ channels, IRC operators
a form of timestamped channel on normally non-
timestamped networks. There are also users who maintain elevated rights
on their local server, or the entire network; these
Modes are called IRC Operators, sometimes shortened to
IRCops. On some IRC implementations, IRC opera-
Users and channels may have modes, which are rep- tors are also given channel operator status in every
resented by single case-sensitive letters and are set channel, although many people believe that admin-
using the mode command. User modes and channel istration of channels and administration of the net-
modes are separate and can use the same letter to work should be kept separate, and that IRC opera-
mean different things (e.g. usermode “i” is invisible tor status does not confer the right to interfere with
mode whilst channelmode “i” is invite only). Modes a particular channel’s operation. However in most
are usually set and unset using the mode command networks, IRC operators usually do not interfere
which takes a target (user or channel), a set of modes with channel administrations unless they violate
to set (+) or unset (-) and any parameters the modes the network’s terms of services.
need. Some but not all channel modes take param-
eters and some channel modes apply to a user on a Challenges
channel or add or remove a mask (e.g. a ban mask)
from a list associated with the channel rather than Issues in the original design of IRC were the amount
applying to the channel as a whole. Modes that ap- of shared state data[6] being a limitation on its scal-
ply to users on a channel have an associated sym- ability,[7] the absence of unique user identifications
bol which is used to represent the mode in names leading to the nickname collision problem,[8] lack
replies (sent to clients on first joining a channel and
of protection from netsplits by means of cyclic rout-
use of the names command) and in most clients to ing,[9][10] the trade-off in scalability for the sake of
represent it in this list of users in the channel. real-time user presence information,[11] protocol
weaknesses providing a platform for abuse,[12] no
In order to correctly parse incoming mode messages transparent and optimizable message passing,[13]
and track channel state the client must know which no encryption.[14] Some of these issues have been
mode is of which type and for the modes that ap- addressed in Modern IRC.
ply to a user on a channel which symbol goes with
which letter. In early implementations of IRC this
had to be hard-coded in the client but there is now
Attacks
a de-facto standard extension to the protocol which
Because IRC connections are usually unencrypted
sends this information to the client at connect time.
and typically span long time periods, they are an
There is a small design fault in IRC regarding modes
attractive target for malicious crackers. Because of
that apply to users on channels, the names message
this, careful security policy is necessary to ensure
used to establish initial channel state can only send
that an IRC network is not susceptible to an attack
one such mode per user on the channel, but mul-
such as an IRC takeover war. IRC networks may also
tiple such modes can be set on a single user. For ex-
k-line or g-line users or networks that have a harm-
ample, if a user holds both operator status (+o) and
ing effect.
voice status (+v) on a channel, a new client will be
unable to know the less precedented mode (voice).
A small number of IRC servers support SSL
connections for security purposes. This helps stop The idea behind this was that even if a netsplit oc-
the use of packet sniffer programs to obtain the curred, it was useless to an abuser because they
passwords of IRC users, but has little use beyond could not take the nickname or gain operator status
this scope due to the public nature of IRC channels. on a channel, and thus no collision of a nickname or
SSL connections require both client and server sup- ‘merging’ of a channel could occur. To some extent,
port (which may require the user to install SSL bina- this inconvenienced legitimate users, who might be
ries and IRC client specific patches or modules on forced to briefly use a different name (appending an
their computers). underscore was popular) after rejoining.
Features
A user first creates a “Profile”, in which the user pro-
vides “Social”, “Professional” and “Personal” details.
Users can upload photos into their Orkut profile
with a caption. Users can also add videos to their
profile from either YouTube or Google Video with
the additional option of creating either restricted or
unrestricted polls for polling
Compatible software
Digsby
Adium
BitlBee
Centericq
Fire
imeem
IMVU
Gyachi
MECA Messenger
meebo
Meetro
Miranda IM
Paltalk
Pidgin (formerly Gaim)
Proteus
Qnext
SIM
Trillian
Trillian Pro
Trillian Astra
Windows Live Messenger
Kopete
References &
Bibliography
1. Design Research : Methods and Perspectives ( Edited by Breda Laurel)
2. Wikipedia (www.wikipedia.org/en)
3. Qualitative Research (book)
4. Irc Homepage and Academic Section.
5. Reid, E. Electropolis: Communication and Community on Internet Relay Chat.
Honours Dissertation, University of Melbourne, 1991.
(http://www.irchelp.org/irchelp/communication-research/academic/academic/acade)
6. Google Indexes
7. Contextual Inquiries(book)
8. UK Design Council Desk Report
9. Vanderwaal : The term folksonomy
( http://www.vanderwal.net/folksonomy.html)
Thanks To:
Mrs. Sheetal Natu for her guidance on the topic. All my classmates who helped me during the data col-
lection and surveys that i undertook . To the HOD, Mr Anand , the server admin and the administrative
staff to give me unrestricted access for unbriddled research work time, and anyone and evryone i have
failed to mention here.
This work is a project under Design Process and Methodology Module of the Symbiosis Institute of
Design. All rights belong to Apurv Ray and the owner of the original source. The matter here may not be
published or re printed or copied in any form digital or analog without the prior permission from Apurv
Ray or the Director, Symbiosis Institute of Design AND the original source author.
You are free to use this matter for educational purposes and uncommercial purpose under the creative
commons agreement 8.1
Apurv Ray
CD 07050221017
Symbiosis Institute Of Design
5th Dec 2008, Pune