Open Social Networking for Online Collaboration

Features of online social networks are being introduced in various applications and environments, including tools supporting virtual teams and online collaboration in general. In fact, social networking has a large potential for easing collaboration, also across organizational boundaries. However, effective e-collaboration through social networks requires the development of open and interoperable systems, allowing people belonging to different organizations to create ties, reflecting real connections existing in daily activities. Attention has to be paid to identity management, for allowing users to develop their reputation consistently, and to privacy and confidentiality, for creating a more trustful environment and protecting freedom of expression. In this article, the authors propose a novel peer-to-peer system, named Blogracy, leveraging the large BitTorrent network. Its main distinguishing features are: i protection of users' identity and privacy, ii absence of central control over published content; iii interoperability with other systems; and iv low costs and scalability of the infrastructure.

[1]  Paul Dwyer,et al.  Measuring Collective Cognition in Online Collaboration Venues , 2011, Int. J. e Collab..

[2]  Giancarlo Ruffo,et al.  LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..

[3]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[4]  Ralf Steinmetz,et al.  LifeSocial.KOM: A P2P-Based Platform for Secure Online Social Networks , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[5]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[6]  Krzysztof Rzadca,et al.  Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[7]  Teresa Porębska-Miąc,et al.  From Social Media to Social CRM (SCRM) , 2012 .

[8]  Ninghui Li,et al.  Local names in SPKI/SDSI , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[9]  Steven B. Andrews,et al.  Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.

[10]  Shelly R. Roy Digital Mastery: The Skills Needed for Effective Virtual Leadership , 2012, Int. J. e Collab..

[11]  Stephen C. Hayne,et al.  The Relationship Between e-Collaboration and Cognition , 2005, Int. J. e Collab..

[12]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[13]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[14]  Rajendra K. Raj,et al.  Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.

[15]  Peter Mika Ontologies Are Us: A Unified Model of Social Networks and Semantics , 2005, International Semantic Web Conference.

[16]  Dan Brickley,et al.  FOAF Vocabulary Specification , 2004 .

[17]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[18]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[19]  Jonathan Grudin,et al.  When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.

[20]  Susan Gasson,et al.  Adaptations that Virtual Teams Make so that Complex Tasks Can Be Performed Using Simple E-Collaboration Technologies , 2006, Int. J. e Collab..

[21]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[22]  Peter Druschel,et al.  FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification , 2005, IPTPS.

[23]  Dorine Andrews,et al.  Audience-specific online community design , 2002, CACM.

[24]  Jennifer Forgie Working Effectively in a Matrix: Building and Sustaining Cooperation , 2011, Int. J. e Collab..

[25]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[26]  Ned Kock,et al.  Compensatory Adaptation to Media Obstacles: An Experimental Study of Process Redesign Dyads , 2005, Inf. Resour. Manag. J..

[27]  Maria Madlberger,et al.  What Drives Firms to Engage in Interorganizational Information Sharing in Supply Chain Management? , 2009, Int. J. e Collab..

[28]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[29]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[30]  Jane Fedorowicz,et al.  Creativity, Innovation, and E-Collaboration , 2008, Int. J. e Collab..

[31]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[32]  Valentin Robu,et al.  The complex dynamics of collaborative tagging , 2007, WWW '07.

[33]  Diana Gosálvez Prados,et al.  Six ways to make Web 2.0 work , 2009 .

[34]  Thomas E. Anderson,et al.  Profiling a million user dht , 2007, IMC '07.

[35]  Sumeja Softic The Business Impacts of Social Networking , 2013 .