Ambiguity Handling in Mobile-capable Social Networks

Size: px
Start display at page:

Download "Ambiguity Handling in Mobile-capable Social Networks"

Transcription

1 Ambiguity Handling in Mobile-capable Social Networks Péter Ekler Department of Automation and Applied Informatics Budapest University of Technology and Economics Abstract. Today we experience the proliferation of social networking applications. However mobile devices are only scarcely involved as individual members in such networks. In this paper we investigate how mobile phones can participate in social networks. The phonebook of the mobile devices represents basically a small social network which belongs to the owner of the device. The paper introduces mobile-capable social networks which enables users to synchronize their phonebooks to the social network. However this solution raises problems that are not experienced by general-purpose social networks. It is possible that after the synchronization there will be duplicated profiles in the network. In the paper we discuss this ambiguity handling problem and introduce our algorithm for detecting and resolving similarities. Keywords: Social network; Mobile device; Phonebook; Ambiguity handling 1 Introduction Social networks are becoming more and more popular. A social network is a social structure consisting of nodes, which generally correspond to individuals or organizations. Nodes are connected by one or more specific types of dependency. A few years ago nobody expected that social networks would be so popular, and it may seem surprising that very often even older people use social networking applications for different reasons. Social networks have an important role to play in everyday life; we use them to find other people, send messages to each other, manage our personal site, share photos and videos, etc. From another point of view, a social network is an environment that is created by the people who are using it. There are various kinds of social networks with different functionality but the general principles are the same. The most popular social networks include Myspace, Facebook, iwiw (in Hungary). These systems have several millions of users and it is also quite common that users have accounts for different social networks; this way these are somehow interconnected by their users as well. Another common characteristic of these systems is that they have a web-based interface and users can reach them from any web browser. Mobile phones and mobile applications are another hot topic nowadays. More and more people are using different types of mobile devices. Both hard- 1

2 ware and software capabilities of mobile phones have been evolving in the last decades. Most of the devices are able to create images and videos, play music and other multimedia content. In addition, we can even run complex software on them. As the functionality of mobile phones is expanding, people spend more time using their devices. There are several approaches to using mobile phones in social networks but these are mainly limited to adding extra functionality to support mobile devices. These typically include photo and video upload capabilities and enabling mobile phones to reach web-based social networking functionality from the mobile side. However, if we consider the contact list in our mobile device, we realize that basically it is a small social network because every contact in our phonebook has some kind of relationship to us. Given an implementation that allows us to upload as well as download our contacts to and from the social networking application, we can completely keep our contacts synchronized so that we can also see all our contacts on the mobile phone as well as on the web interface. However this approach raises problems that are not experienced by generalpurpose social networks. Consider the case that we have a contact called John Doe in our phonebook and we have him also in the existing social networking application. Let us suppose we synchronize our contacts. How does the system realize that these contacts are the same? What happens if we have two or more matching contacts in the system? How should the system react to this kind of similarity? In the discussion that follows, we will reference to this problem as ambiguity handling. To answer these questions, we use an experimental implementation of a social networking application which supports mobile phones in the aforementioned manner. This application is not currently open to the public but still it has about three hundred users who have altogether more than twenty thousand contacts in their mobile phones and they use this system to keep their social relationships synchronized. Social networks that handle mobile devices have several interesting research implications. For instance, they can offer not only searching according to usual social network query criteria (e.g. name or workplace) but also location-based functionality such as automatic recommendation of a contact person who is close to us. In this paper, we investigate the previously described ambiguity handling and we show a method which can be used to detect and handle ambiguities in a comfortable way from the point of view of usability. The rest of paper is organized as follows. Section 2 describes related work in the area of social networks and mobile-based solutions. Section 3 gives dentitions and problem context, which is necessary to understand the proposed ambiguity handling solution. Section 4 introduces our algorithm for detecting and handling similarities. Section 5 concludes the paper and proposes future research directions. 2

3 2 Related work Nowadays, the number of social network users is increasing, thus the efficient implementation of these networks is an important research area. Newman et al. [1] describe some novel uniquely solvable models of the structure of social networks based on random graphs with arbitrary degree distributions. They give models both for simple unipartite networks such as acquaintance networks and bipartite networks such as affiliation networks. They compare the predictions of their models to data from a number of real-world social networks and find that in some cases, the models are in remarkable agreement with the data, whereas in others the agreement is not so good, perhaps indicating the presence of additional social structure in the network that is not captured by the random graph. There are several existing international web-based social networking solutions that people use every day. MySpace [2] is one of the most popular social networking websites offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music and videos for teenagers and adults internationally. Facebook [3] is a social utility that connects people with friends and others who work, study and live around them. People use Facebook to keep up with friends, upload an unlimited number of photos, share links and videos and learn more about the people they meet. Bakos et al. [4] have investigated that search engines generally lack the trust and personalization dimension needed for recommendation systems to answer questions like: I need a reliable plumber close to my house. In order to achieve personalization, social relevance and a decent amount of privacy, the search database itself needs to be personalized. One possible dimension of personalization is the social neighborhood of the searcher. In particular, the phonebook links represent a readily available infrastructure to create a peer-to-peer social network for socially relevant search. They have demonstrated their concept via a novel search engine algorithm for phonebook entry-based social networks on S60 mobile platform over GSM using short message exchange. Searching for a good professional in a given area can be as simple as entering an appropriate combination of keywords in Google [5] or Yahoo [6] e.g. plumber New York. The results will be more or less reliable and related to the plumber profession in the area of New York. Both Google and Yahoo offer an additional yellow pages service that makes the search easier. However, if we now turn to other jobs or hobbies like fisher, there will be a huge difference. It turns out that there are a large number of persons called Fisher. The system does not differentiate very well between names and professions: the introduction of the word fisher in the yellow pages will result in many Fishers, having various professions. We investigated in a previous paper [7] how mobile devices can connect to a web-based social network. In that paper we outlined an architecture where mobile devices were able to connect to a social network via web services. We have also demonstrated this solution with a web-based social network whose 3

4 functions were available via web services and a mobile client which was able to reach all of the functions of the social network. The key difference between our current work and previous research is that these social networking solutions do not allow mobile phones to become an integrated member of the social network. They do not fully utilize that the phonebook in these devices is in itself nothing else but a small yet very important social network. 3 Definitions and problem statements Before we introduce our ambiguity handling solution we have to clarify some definitions and terms. The first definition describes what we exactly mean by a social network which handles mobile devices Figure 1. Definition 1. Mobile-capable social networks are special social networks which are extended with the phonebook entries of each user who has a mobile device. It is able to keep the acquaintances and the phonebook contacts of the users synchronized. Figure 1: Mobile-capable social network In a general social network, the users are basically the persons who are registered in the system. Most commonly, users are able to set their profile after their registration including phone numbers, addresses, hobbies, job titles, topic of interests, etc. In our case, we had a simplification we could turn to our advantage. We decided to store the same information in the social network about persons as present in the phonebook of the mobile device. This is not a real limitation as a general phonebook entry can already store several pieces of information about a contact such as first name, last name, nickname, job title, company, birthday, address, phone number, and web address. An important aspect is the case of multiple entries: we can store multiple addresses, phone numbers, s and web addresses of a person just as in the mobile device phonebook. From the previous definition it follows that this type of social network has to handle two different types of users: general members and private contacts. Next, we define these two types of users. 4

5 Definition 2. A member is a user who has registered to the system on its website. Basically, members are similar to users of other general social networks. They can log into the system, find and add acquaintances, upload and share information about themselves, write forum or blog entries, etc. Furthermore, they can synchronize their mobile phones to the social network. Definition 3. A private contact is transferred into the system when a member synchronizes his or her phonebook with the social network. Essentially, a private contact corresponds to a phonebook entry of a member. Each member may have multiple private contacts. However, these private contacts are not shared between members. With the help of these definitions we can clarify what we exactly mean by ambiguity handling. When a member synchronizes his or her phonebook, the contacts of the phonebook will be added to the social network. Ambiguity means that a private contact represents the same person as one of the acquaintances of the member. In this case, a member would have a duplicated entry for the same person, one for the member and the other for the private contact Figure 2. Figure 2: Handling ambiguity during synchronization There are several solutions not related to social networks that try to detect and handle duplicated contacts but they have several limitations and constraints. One of these is when users synchronize their contacts between the popular Outlook application and their Nokia phones via the Nokia PC-Suite application. However, this solution detects ambiguities only if persons have the same first and last name. Otherwise, the synchronization results in duplicating the contact. For example, if two contacts in the data sources represent the same person (e.g. they have the same phone number and address) but on the phonebook the last name field was not filled, the contact will be copied from one source to the other and vice versa. Another application called DupeDeDupe [8] for Windows Mobile-based devices searches for duplicate contacts from the address book and removes one of the duplicated results. DupeDeDupe compares fields as well as home, work, and mobile phone numbers of each contact. If all of those fields match, the application considers the contact to be a duplicate. 5

6 These solutions are based on exact field matching and therefore often lead to false matches: for example, they detect several persons to be identical based on the phone number even if these phone numbers represent a central work phone number. Another issue is that they do not detect similar names like Joe and Joseph. The last definition in this section describes a vector which can be used to measure how a person is similar to a social network. Definition 4. The similarity vector belongs to the contact entry of a person and the dimension of the vector depends on how many attributes of the contact is filled. The values of the vector represent that how many similarities were found in the social networks related to that attribute. For instance if the following contact structure represent a person: (first name: John; last name: Doe; phone number: ) and the similarity vector to this person is (10,2,0) then it means that there are ten persons in the social network with the first name of John and two with the last name of Doe and there are nobody who has the phone number of In the next section we will use this definition to determine the upper bound of how many similarities can an ambiguity detecting algorithm found and we will prove that our algorithm is bellow this value. 4 Ambiguity detecting and handling 4.1 Algorithm description Most of the contact similarity detecting algorithms are based on comparing somehow the attributes of the contacts. As we have mentioned earlier in a mobile-capable social network we had the advantage that we could determine what kind of attributes we store in a profile. Based on these attributes we can define which attribute match terms do we consider as relevant for the similarity detecting. We have also defined a weight value to each of the terms which represents how relevant is that match. Table 1 introduces match terms and their weights. Table 1: Relevant match terms Match term Weight Similar first and last name 30 Similar private phone number 10 Similar public phone number and first name 10 Similar address 15 Different birthday -40 6

7 In Table 1 the private phone number means mobile phone number, home phone number, pager number, etc., while public phone number means fax number, workplace number, etc. During the synchronization, when the algorithm has to decide whether the new private contact is similar to a member, it calculates a similarity-weight value. It checks the previously introduced match terms and if one of the match terms turns out to be true then the weight value of it will be added to the similarity-weight value. This way after the algorithm compared a private contact and a member, the result will be the calculated similarity-weight value and if it is more than a specific value (currently in our case it is 10) then this case will be considered as possible similarity. Algorithm 1 describes how we can check the private contacts and acquaintances of the user who is doing the synchronization. The main similaritycheck function will call checkmatchterm function several times to check a specific match term. Algorithm 1 Ambiguity detecting for a user 1: function checkmatchterm(matchterm, matchtermweight, 2: PC, &possiblesimilarmembers) 3: tempsimilarmembers = array() 4: 5: for all acquaintances (AC) of the user do 6: if matchterm(pc,ac) then 7: addtoarray(tempsimilarmembers,struct(ac,matchtermweight)) 8: 9: if size(tempsimilarmembers)<maxmatchlimit then 10: // merge the arrays, and if a member is already in the possiblesimilarmembers 11: // array then also calculate the new weight to it 12: mergearrays(similarmembers,tempsimilarmembers) 13: 14: 15: function similaritycheck(user) 16: for all private contact (PC) of the user do 17: possiblesimilarmembers = array() 18: 19: checkmatchterm(matchnames,30,pc,possiblesimilarmembers) 20: checkmatchterm(matchprivatephones,10,pc,possiblesimilarmembers) 21: checkmatchterm(matchprivatephones,10,pc,possiblesimilarmembers) 22: checkmatchterm(match s,-40,pc,possiblesimilarmembers) 23: 24: for all possiblesimilarmembers (SM) do 25: if SM.weight>minSimilarityWeight then 26: storesimilarity(pc,sm.member,sm.weight) 7

8 We can see on Table 1 that the "Different birthday" term has a negative value. It means that if two persons have different birthdays then the algorithm decreases the similarity-weight value because it is a relevant difference. Another interesting part of our algorithm in function checkmatchterm states that if a match term check results too many possible similar members then the algorithm ignores this term for this private contact because it means that it is not relevant. It can happen if the phone number of a private contact is central phone number of a company and many other people have entered this phone number in their profiles. These weight values are based on measurements in an experimental implementation of a mobile-capable social network which was mentioned in the Introduction section, however with these values the rate of the detected false similarities is bellow ten percent. The weight values of the current algorithm are fixed however we are planning to implement a learning algorithm which will calculate this weight values based on the decisions of the users whether they have resolved or ignored a detected similarity. 4.2 Handling similar names The algorithm is able to detect similar names like Joe and Joseph which improve the probability to detect similarities even if people have entered names different way. We have implemented the similar name handling by using a similarnames table Table 2. When people use the system and resolve similarities then at each resolve the system checks whether the currently resolved persons have the same first name. If not then the system stores in the similarnames table that these first names are similar because they were resolved by the users manually. Table 2: Similar names name1 name2 count Joe Joseph 10 Katharine Kate 7 Samantha Sam 2 The system also counts how many times these similar but different first names were resolved and if it reaches a specific number then the ambiguity detecting algorithm will use this first name similarity in the first name match term. 4.3 Resolving similarities When we speak about ambiguity handling, we have to realize that there is no perfect algorithm to detect and handle these kinds of similarities. There is a chance that a contact is falsely identified as a duplicate (which is unavoidable for a common name like John Smith) and it would be a serious mistake to delete 8

9 the contact in this case. This example proves that the ambiguity handling algorithm needs a step where users can resolve the ambiguity interactively. In this disambiguation step the user has to decide whether this similarity is a real similarity or a false one. Figure 3 introduces the resolve similarity form in our implementation. Figure 3: Resolve similarity 4.4 Multiple similarities Another issue is when the ambiguity detecting algorithm finds two or more members similar to a private contact during the synchronization process. This situation occurs more frequently than we would think because people usually enter minimal information about a private contact into the phonebook. Phonebook entries are restricted mainly to a name and a phone number and users do not even define whether the phone number is a private, work or home phone number. To handle multiple similarities (Figure 4) we have to involve users as well to decide which of the detected similar persons is the real one. Figure 4: Multiple similarities 9

10 In order to allow users to handle multiple similarities in an efficient way, we can use the previously introduced similarity-weight value. While the upper bound of this value is not determined because people can have unlimited phone numbers, addresses, etc.; we have to calculate a possibility percent from this value. The possibility percent represents how a person is similar to another one. For example if two persons have the same name then the percent should be large enough but if persons have several similar attributes then the percent should not increase as a straight line. In our current experimental implementation we have used the arcos tangent function because of its characteristic to calculate the possibility percent: percent(weight) = { 50 + weight ( ) 80 + arctan weight π if weight 50 otherwise The possibility percent can be used to order the possible similarities and the most possibly similar person will be the first in the list. By using this possibility percent value we can show the list of possible similar persons easily on the user interface of the website (Figure 5). Figure 5: Multiple similarities on the user interface 4.5 Efficiency of the algorithm It is hard to determine the exact efficiency of an ambiguity detecting algorithm because the behavior of the users is not deterministic. For instance they often leave important attributes empty in profiles and phonebook entries and it is not also rare that they enter attributes to wrong fields. The efficiency of ambiguity detecting algorithms can be measured by how many similarities they detect. We can use the definition of the similarity vector to estimate an upper bound for the detected similarities. The simplest ambiguity detecting algorithm compares the attributes of the person one by one and if one of the attributes matches then it marks the persons similar. We can see that the sum of the elements of the similarity vector represents exactly this upper 10

11 bound. The following lemma summarizes that our algorithm is below the upper bound. Lemma 5. The size of the provided result set of the introduced ambiguity detecting algorithm is bellow the sum of the elements of the similarity vector. Proof. During the algorithm we examine five match term. The first one checks the first and the last names together this way if value a belongs to the first name and value b belongs to the last name in the similarity vector then it can result maximum the value of min(a, b). The second match term checks private phone numbers which can result maximum c values. The third term checks public phone number and first name together. If the similarity vector contains d at value public phone number then this term results maximum the value of min(a, d). The forth term checks addresses which can result maximum e values. The last term checks whether the birthdays are different and because it can only decrease the result of possible matches then we do not have to count with it in this proof. If we add this values we can see that min(a, b) + c + min(a, d) + e < a + b + c + d + e. The value of this lemma is that we could measure the efficiency of our ambiguity detecting algorithm. 5 Conclusions and Future Work In this paper we have introduced a new type of social network which we called mobile-capable social network. Mobile-capable social networks are extended with the phonebook entries of each user who has a mobile device. The network is also able to keep the acquaintances and the phonebook contacts of the users synchronized. To emphasize the advantages of mobile-capable social networks let us assume that if somebody changes his or her phone number in the system and others synchronize their mobile phones to the social network, then their phonebook will be automatically updated with this updated phone number. We have also implemented an experimental version of a mobile-capable social network which has three hundred users with more than twenty thousand private contact. This way we could analyze the problems and interesting research areas which are related to mobile-capable social networks. Mobile-capable social networks raise several interesting issues. In this paper we have focused on the ambiguity handling and resolving. This means that the system has to detect how to handle the situation if a person is duplicated in the social network. We have introduced our algorithm and other connected areas like ambiguity resolving, multiple similarities and handling similar names. With the help of the definition of the similarity vector we have calculated the upper bound value which can be the result of a very simple ambiguity detecting 11

12 algorithm and we have proved that the result of our algorithm is bellow this number. Also our current measurements in our mobile-capable social network shows that the rate of the detected false similarities is bellow ten percent by using the introduced algorithm. Future work will be to improve the current algorithm with learning models, which can control the weight values of the match terms. Currently the implementation logs the decision of the users if they ignore or resolve an ambiguity. While our current implementation is closed for public and has only internal users from the Nokia Siemens Networks, we can also use the log files and behaviors of the users to improve the algorithm. We are also planning to develop the similarity vector definition further because it currently represents only basic field matches and it does not count social network related attributes like similar names, and it also does not make difference between attributes if they are not filled or if they are different. Additional future work will be to examine mobile-capable social networks further and give efficient algorithms for search and recommendation functions. Acknowledgments The authors would like to express their thanks to Zoltán Ivánfi, Tihamér Levendovszky and Hassan Charaf for their support as a scientific advisor. This work has been supported by the Nokia Siemens Networks. References [1] M. E. J. Newman, D. J. Watts, and S. H. Strogatz, Random graph models of social networks, in Proceedings of the National Academy of Sciences, [2] Myspace social networking application. May [3] Facebook social networking application. May [4] B. Bakos, L. Farkas, and J. K. Nurminen, Phonebook search engine for mobile p2p social networks, in Databases and Applications, pp , [5] Google phonebook. May [6] Yahoo! people search. May [7] P. Ekler and H. Charaf, Investigating the role of mobile devices in social networks, in Microcad International Conference, Marc [8] Duplicate contact remover application. delete-duplicate-contacts-with-dupededupe, May

Learning Methods for Similarity Handling in Phonebook-centric Social Networks

Learning Methods for Similarity Handling in Phonebook-centric Social Networks agyar Kutatók 10. Nemzetközi Szimpóziuma 10 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Learning ethods for Similarity Handling in Phonebook-centric

More information

Analysis and Performance Evaluation of Mobile Related Social Networks Main Results of the Ph.D. Thesis

Analysis and Performance Evaluation of Mobile Related Social Networks Main Results of the Ph.D. Thesis Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Automation and Applied Informatics Analysis and Performance Evaluation of obile Related Social

More information

Building Motion and Noise Detector Networks from Mobile Phones

Building Motion and Noise Detector Networks from Mobile Phones Magyar Kutatók 9. Nemzetközi Szimpóziuma 9 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Building Motion and Noise Detector Networks from Mobile Phones

More information

Chapter 3: Google Penguin, Panda, & Hummingbird

Chapter 3: Google Penguin, Panda, & Hummingbird Chapter 3: Google Penguin, Panda, & Hummingbird Search engine algorithms are based on a simple premise: searchers want an answer to their queries. For any search, there are hundreds or thousands of sites

More information

Getting Started with Social Media

Getting Started with Social Media Getting Started with Social Media Step 1: Go to www.facebook.com Step 2: Fill out the Sign Up form located on the homepage, including full name, e-mail address, a password and birthday, to start a free

More information

How To Construct A Keyword Strategy?

How To Construct A Keyword Strategy? Introduction The moment you think about marketing these days the first thing that pops up in your mind is to go online. Why is there a heck about marketing your business online? Why is it so drastically

More information

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc. March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According

More information

THE USAGE OF VS.

THE USAGE OF  VS. THE USAGE OF EMAIL VS. THE USAGE OF SOCIAL MEDIA TABLE OF CONTENTS: Definition of email and social media:. 1 History of email and social media:..... 2-3 The position of email and social media in the middle

More information

HOW TO INCREASE RANKINGS IN GOOGLE AND YAHOO SERP S WHITE PAPER

HOW TO INCREASE RANKINGS IN GOOGLE AND YAHOO SERP S WHITE PAPER HOW TO INCREASE RANKINGS IN GOOGLE AND YAHOO SERP S WHITE PAPER CONTENTS Positioning Statement... 3 Introduction... 3 Commonly Used SEO Tools And Techniques... 4 1. Reciprocal Linking:... 4 2. Buying Links:...

More information

Digital Life Analysis: Undergrad Single

Digital Life Analysis: Undergrad Single Nathan Goulding November 21, 2006 CS 489 Digital Forensics Digital Life Analysis: Undergrad Single Executive Summary This paper analyzes the impact that people make in today's digital world. The use of

More information

Image Credit: Photo by Lukas from Pexels

Image Credit: Photo by Lukas from Pexels Are you underestimating the importance of Keywords Research In SEO? If yes, then really you are making huge mistakes and missing valuable search engine traffic. Today s SEO world talks about unique content

More information

One of the fundamental kinds of websites that SharePoint 2010 allows

One of the fundamental kinds of websites that SharePoint 2010 allows Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental

More information

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL Your Your Company Logo Logo GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP

More information

balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin

balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin balancer high-fidelity prototype dian hartono, grace jang, chris rovillos, catriona scott, brian yin Problem and Solution Overview A healthy work-life balance is vital for both employers and employees.

More information

6 WAYS Google s First Page

6 WAYS Google s First Page 6 WAYS TO Google s First Page FREE EBOOK 2 CONTENTS 03 Intro 06 Search Engine Optimization 08 Search Engine Marketing 10 Start a Business Blog 12 Get Listed on Google Maps 15 Create Online Directory Listing

More information

Refreshing Your Affiliate Website

Refreshing Your Affiliate Website Refreshing Your Affiliate Website Executive Director, Pennsylvania Affiliate Your website is the single most important marketing element for getting the word out about your affiliate. Many of our affiliate

More information

Domain Specific Search Engine for Students

Domain Specific Search Engine for Students Domain Specific Search Engine for Students Domain Specific Search Engine for Students Wai Yuen Tang The Department of Computer Science City University of Hong Kong, Hong Kong wytang@cs.cityu.edu.hk Lam

More information

Usability Report. Author: Stephen Varnado Version: 1.0 Date: November 24, 2014

Usability Report. Author: Stephen Varnado Version: 1.0 Date: November 24, 2014 Usability Report Author: Stephen Varnado Version: 1.0 Date: November 24, 2014 2 Table of Contents Executive summary... 3 Introduction... 3 Methodology... 3 Usability test results... 4 Effectiveness ratings

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams

More information

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP INSTRUCTIONS WITH

More information

Collaborating via Social Networks and Groupware

Collaborating via Social Networks and Groupware Collaborating via Social Networks and Groupware When all team members have access to the Internet, why not use the Internet to connect the members of the group to enable communication, file sharing, and

More information

The Tangled Web We Weave Managing the Social Identity Crisis on Mobile Devices

The Tangled Web We Weave Managing the Social Identity Crisis on Mobile Devices W3C Workshop on the Future of Social Networking January 15-16, 2009 Barcelona, Spain The Tangled Web We Weave Managing the Social Identity Crisis on Mobile Devices Greg Howard

More information

A guide to GOOGLE+LOCAL. for business. Published by. hypercube.co.nz

A guide to GOOGLE+LOCAL. for business. Published by. hypercube.co.nz A guide to GOOGLE+LOCAL for business Published by hypercube.co.nz An introduction You have probably noticed that since June 2012, changes have been taking place with the local search results appearing

More information

(Refer Slide Time 3:31)

(Refer Slide Time 3:31) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions

More information

Title Core TIs Optional TIs Core Labs Optional Labs. All None 1.1.6, 1.1.7, and Network Math All None None 1.2.5, 1.2.6, and 1.2.

Title Core TIs Optional TIs Core Labs Optional Labs. All None 1.1.6, 1.1.7, and Network Math All None None 1.2.5, 1.2.6, and 1.2. CCNA 1 Plan for Academy Student Success (PASS) CCNA 1 v3.1 Instructional Update # 2006-1 This Instructional Update has been issued to provide guidance on the flexibility that Academy instructors now have

More information

THE COMPUTER EXPERIMENT IN SCHOOL AS A METHODOLOGICAL TOOL IN SCIENCE EDUCATION

THE COMPUTER EXPERIMENT IN SCHOOL AS A METHODOLOGICAL TOOL IN SCIENCE EDUCATION THE COMPUTER EXPERIMENT IN SCHOOL AS A METHODOLOGICAL TOOL IN SCIENCE EDUCATION Grozdev S. 1, Ismailov Sh. 2 1 Mathematics and Informatics Institute BAN, Sofia, Republic of Bulgaria 2 Tashkent Region State

More information

Mobile Services Part 1

Mobile Services Part 1 Mobile Services Part 1 Pilot survey on location based services, mobile websites and applications Prof. Dr. Uwe Weithöner, Marc Buschler (Bachelor of Arts) Investing in the future by working together for

More information

Myths about Links, Links and More Links:

Myths about Links, Links and More Links: Myths about Links, Links and More Links: CedarValleyGroup.com Myth 1: You have to pay to be submitted to Google search engine. Well let me explode that one myth. When your website is first launched Google

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Make $400 Daily. With Only. 5 Minutes Of Work

Make $400 Daily. With Only. 5 Minutes Of Work Make $400 Daily With Only 5 Minutes Of Work Hello friends, I am not a professional copywriter, so you will find a lot of mistakes and lack of professional touch in this e-book. But I have not made this

More information

Social Networking Applied

Social Networking Applied Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday

More information

Ning Frequently Asked Questions

Ning Frequently Asked Questions Ning Frequently Asked Questions Ning is a Web tool that allows anyone to create a customizable social network, allowing users to share pictures and videos, maintain blogs, communicate in chat and discussion

More information

RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX

RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX Your success as a partner directly depends on the number of attracted clients and their trading activity. You can hardly influence clients trading activity,

More information

Guide to a Perfect Event Communication Plan - Professional event management

Guide to a Perfect Event Communication Plan  - Professional event management Guide to a Perfect Event Communication Plan www.lyyti.com - Professional event management re is usually a lot of talk about communication and how to make it more effective. Most companies think they are

More information

CS 147 Autumn 2017: Assignment 9 (Heuristic Evaluation Group Template) Instructor: James Landay. Fix: make web also block the desktop screen.

CS 147 Autumn 2017: Assignment 9 (Heuristic Evaluation Group Template) Instructor: James Landay. Fix: make web also block the desktop screen. Fix: make web also block the desktop screen. 5. H10 Help and documentation / Severity: 2 / Found by: A On the web calendar, there aren t any detailed instructions on how to engage in self-care activities,

More information

My Page sub-tabs section

My Page sub-tabs section My Profile Page 1 An important first step in participating in the Community is to share some basic information about yourself. The way you do that is through creating your profile on My Page. When you

More information

Memory Addressing, Binary, and Hexadecimal Review

Memory Addressing, Binary, and Hexadecimal Review C++ By A EXAMPLE Memory Addressing, Binary, and Hexadecimal Review You do not have to understand the concepts in this appendix to become well-versed in C++. You can master C++, however, only if you spend

More information

THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES

THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES 5 THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES THIS E-BOOK IS DIVIDED INTO 5 PARTS: 1. WHY YOU NEED TO KNOW YOUR READER 2. A USER MANUAL OR A USER GUIDE WHAT S THE DIFFERENCE?

More information

What is Facebook? By

What is Facebook? By What is Facebook? By www.digitalunite.com Facebook is probably the best known of the social networking sites. Created in 2004 by Mark Zuckerberg and his friends, originally as a way for students at Harvard

More information

Community portal User Guide OACIS

Community portal User Guide OACIS Community portal User Guide OACIS Septembre 2015 Table des matières TELUS Health Community Portal... 3 Registering... 4 First time login... 5 If you forget your password... 5 Set up your community profile...

More information

Generating and Using Results

Generating and Using Results Background Generating and Using Results from Usability Evaluations Kasper Hornbæk University of Copenhagen www.kasperhornbaek.dk Associate professor in the Human computer Interaction group at Copenhagen

More information

A World Wide Web-based HCI-library Designed for Interaction Studies

A World Wide Web-based HCI-library Designed for Interaction Studies A World Wide Web-based HCI-library Designed for Interaction Studies Ketil Perstrup, Erik Frøkjær, Maria Konstantinovitz, Thorbjørn Konstantinovitz, Flemming S. Sørensen, Jytte Varming Department of Computing,

More information

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY Peer to Peer Networking BitTorrent, a popular peer to peer networking software, can be downloaded for free from the BitTorrent website. Once the user has installed the program on their computer, they can

More information

Functionality, Challenges and Architecture of Social Networks

Functionality, Challenges and Architecture of Social Networks Functionality, Challenges and Architecture of Social Networks INF 5370 Outline Social Network Services Functionality Business Model Current Architecture and Scalability Challenges Conclusion 1 Social Network

More information

eservices Multitenancy and Load Balancing Guide eservices 8.1.4

eservices Multitenancy and Load Balancing Guide eservices 8.1.4 eservices Multitenancy and Load Balancing Guide eservices 8.1.4 5/4/2018 Table of Contents eservices Multi-tenancy and Load Balancing Guide 3 Multi-Tenancy 4 Configuration 5 Limitations 7 Load Balancing

More information

Making Privacy a Fundamental Component of Web Resources

Making Privacy a Fundamental Component of Web Resources Making Privacy a Fundamental Component of Web Resources Thomas Duebendorfer (Google Switzerland GmbH), Christoph Renner (Google Switzerland GmbH/ETH Zurich), Tyrone Grandison (IBM), Michael Maximilien

More information

5 Choosing keywords Initially choosing keywords Frequent and rare keywords Evaluating the competition rates of search

5 Choosing keywords Initially choosing keywords Frequent and rare keywords Evaluating the competition rates of search Seo tutorial Seo tutorial Introduction to seo... 4 1. General seo information... 5 1.1 History of search engines... 5 1.2 Common search engine principles... 6 2. Internal ranking factors... 8 2.1 Web page

More information

Column Generation Method for an Agent Scheduling Problem

Column Generation Method for an Agent Scheduling Problem Column Generation Method for an Agent Scheduling Problem Balázs Dezső Alpár Jüttner Péter Kovács Dept. of Algorithms and Their Applications, and Dept. of Operations Research Eötvös Loránd University, Budapest,

More information

VoIP/SIP: Economy and Mobility

VoIP/SIP: Economy and Mobility Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.

More information

(Refer Slide Time 6:48)

(Refer Slide Time 6:48) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 8 Karnaugh Map Minimization using Maxterms We have been taking about

More information

Facebook Tutorial. An Introduction to Today s Most Popular Online Community

Facebook Tutorial. An Introduction to Today s Most Popular Online Community Facebook Tutorial An Introduction to Today s Most Popular Online Community Introduction to Facebook Facebook is the most popular social network, in the U.S. and internationally. In October 2011, more than

More information

CSC105, Introduction to Computer Science I. Introduction and Background. search service Web directories search engines Web Directories database

CSC105, Introduction to Computer Science I. Introduction and Background. search service Web directories search engines Web Directories database CSC105, Introduction to Computer Science Lab02: Web Searching and Search Services I. Introduction and Background. The World Wide Web is often likened to a global electronic library of information. Such

More information

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Example 1: An algorithmic view of the small world phenomenon

Example 1: An algorithmic view of the small world phenomenon Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story

More information

Compliments of. Women in Ecommerce Helping Women Do Business on the WEB since 2001

Compliments of. Women in Ecommerce   Helping Women Do Business on the WEB since 2001 Google+ Step-by-Step Compliments of Women in Ecommerce www.wecai.org Helping Women Do Business on the WEB since 2001 1 Table of Contents Introduction...3 What Is Google Plus?...3 1. Google Hangouts...4

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #6: Mining Data Streams Seoul National University 1 Outline Overview Sampling From Data Stream Queries Over Sliding Window 2 Data Streams In many data mining situations,

More information

USES OF THE INTERNET RORY DUTHIE

USES OF THE INTERNET RORY DUTHIE USES OF THE INTERNET RORY DUTHIE OBJECTIVES Learn about the uses of the internet Learn uses related to computing Learn who uses the different parts of the internet Learn figures related to internet use

More information

Reciprocal Access Direct for Online Social Networks: Model and Mechanisms

Reciprocal Access Direct for Online Social Networks: Model and Mechanisms Reciprocal Access Direct for Online Social Networks: Model and Mechanisms RAVULA VENKATESH M. Tech scholar, Department of CSE Vijay Rural Engineering College, Jntuh Email-id: Venky.5b8@Gmail.Com N.SWAPNA

More information

Contractors Guide to Search Engine Optimization

Contractors Guide to Search Engine Optimization Contractors Guide to Search Engine Optimization CONTENTS What is Search Engine Optimization (SEO)? Why Do Businesses Need SEO (If They Want To Generate Business Online)? Which Search Engines Should You

More information

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Perfect Timing Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Problem & Solution College students do their best to plan out their daily tasks, but

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT A Project Report Presented to The faculty of Department of Computer Science San Jose State University In Partial fulfillment of the Requirements for the

More information

PCPs and Succinct Arguments

PCPs and Succinct Arguments COSC 544 Probabilistic Proof Systems 10/19/17 Lecturer: Justin Thaler PCPs and Succinct Arguments 1 PCPs: Definitions and Relationship to MIPs In an MIP, if a prover is asked multiple questions by the

More information

A short introduction to. designing user-friendly interfaces

A short introduction to. designing user-friendly interfaces A short introduction to designing user-friendly interfaces Usability is often ignored until it becomes a problem Introduction This booklet is about Usability and User Experience design. It is aimed at

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Chamberlin and Boyce - SEQUEL: A Structured English Query Language

Chamberlin and Boyce - SEQUEL: A Structured English Query Language Programming Languages (CS302 2007S) Chamberlin and Boyce - SEQUEL: A Structured English Query Language Comments on: Chamberlin, D. D. and Boyce, R. F. (1974). SEQUEL: A Structured English Query Language.

More information

Lecture 1: January 22

Lecture 1: January 22 CMPSCI 677 Distributed and Operating Systems Spring 2018 Lecture 1: January 22 Lecturer: Prashant Shenoy Scribe: Bin Wang 1.1 Introduction to the course The lecture started by outlining the administrative

More information

Distributed Consensus Protocols

Distributed Consensus Protocols Distributed Consensus Protocols ABSTRACT In this paper, I compare Paxos, the most popular and influential of distributed consensus protocols, and Raft, a fairly new protocol that is considered to be a

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 07 Tutorial 2 Part 1 Facebook API Hi everyone, welcome to the

More information

Introduction to Databases and SQL

Introduction to Databases and SQL Introduction to Databases and SQL Files vs Databases In the last chapter you learned how your PHP scripts can use external files to store and retrieve data. Although files do a great job in many circumstances,

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/

More information

(Refer Slide Time: 00:01:30)

(Refer Slide Time: 00:01:30) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology, Madras Lecture - 32 Design using Programmable Logic Devices (Refer Slide Time: 00:01:30)

More information

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS Social media platforms have become one of the most visible and fastestgrowing technologies in the last

More information

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).

More information

Guarantee of existence for online information as a precondition for hyperlinked e-portfolios

Guarantee of existence for online information as a precondition for hyperlinked e-portfolios Guarantee of existence for online information as a precondition for hyperlinked e-portfolios Meinl, Paul; paul.meinl@factline.com Harnoncourt, Max; max.harnoncourt@factline.com Krisper-Ullyett, Lotte;

More information

What the is SEO? And how you can kick booty in the interwebs game

What the is SEO? And how you can kick booty in the interwebs game What the F^@& is SEO? And how you can kick booty in the interwebs game 1 WHAT THE F^$& is SEO?? SEO (SEARCH ENGINE OPTIMIZATION) is the process of improving your website so that it attracts more visitors

More information

So, you re child wants to sign up for Myspace...

So, you re child wants to sign up for Myspace... So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users

More information

Table of Contents. Introduction. Audience, Intent & Authority. Depth, Unique Value & User Experience. The Nuts & Bolts of SEO. Enhancing Your Content

Table of Contents. Introduction. Audience, Intent & Authority. Depth, Unique Value & User Experience. The Nuts & Bolts of SEO. Enhancing Your Content Table of Contents Introduction Audience, Intent & Authority Depth, Unique Value & User Experience The Nuts & Bolts of SEO Enhancing Your Content Editing & Final Touches Summary Introduction The Importance

More information

Lecture #3: PageRank Algorithm The Mathematics of Google Search

Lecture #3: PageRank Algorithm The Mathematics of Google Search Lecture #3: PageRank Algorithm The Mathematics of Google Search We live in a computer era. Internet is part of our everyday lives and information is only a click away. Just open your favorite search engine,

More information

X-AFFILIATE module for X-Cart 4.0.x

X-AFFILIATE module for X-Cart 4.0.x X-AFFILIATE module for X-Cart 4.0.x Partner Interface Reference Manual Revision Date: 2004-11-22 Copyright 2001-2004 Ruslan R. Fazliev. All rights reserved. TABLE OF CONTENTS GENERAL INFORMATION...3 REGISTRATION...4

More information

Lead Magnet Cheat Sheet

Lead Magnet Cheat Sheet Lead Magnet Cheat Sheet Your lead offer/lead magnet needs to be a great incentive to get people to Opt-In to your email list and start to develop rapport, credibility, and trust from you or your brand.

More information

The ebuilders Guide to selecting a Web Designer

The ebuilders Guide to selecting a Web Designer The ebuilders Guide to selecting a Web Designer With the following short guide we hope to give you and your business a better grasp of how to select a web designer. We also include a short explanation

More information

Building a Web-based Health Promotion Database

Building a Web-based Health Promotion Database 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Building a Web-based Health Promotion Database Ádám Rutkovszky University of Debrecen, Faculty of Economics Department

More information

and the Forensic Science CC Spring 2007 Prof. Nehru

and the Forensic Science CC Spring 2007 Prof. Nehru and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.

More information

A Simple Case Study of a Grid Performance System

A Simple Case Study of a Grid Performance System A Simple Case Study of a Grid Performance System Ruth Aydt, Dan Gunter, Darcy Quesnel, Warren Smith, Valerie Taylor aydt@uiuc.edu, dkgunter@lbl.gov, quesnel@mcs.anl.gov, wwsmith@nas.nasa.gov, taylor@ece.nwu.edu

More information

Introducing IBM Lotus Sametime 7.5 software.

Introducing IBM Lotus Sametime 7.5 software. Real-time collaboration solutions March 2006 Introducing IBM Lotus Sametime 7.5 software. Adam Gartenberg Offering Manager, Real-time and Team Collaboration Page 2 Contents 2 Introduction 3 Enhanced instant

More information

Internet Basics for Business

Internet Basics for Business Internet Basics for Business Introduction The Internet, web 2.0 and the Tourism Industry Initial assessment of my website Top 10 tips for your website Website 101, Mobile website or Mobile application

More information

Module 1: Internet Basics for Web Development (II)

Module 1: Internet Basics for Web Development (II) INTERNET & WEB APPLICATION DEVELOPMENT SWE 444 Fall Semester 2008-2009 (081) Module 1: Internet Basics for Web Development (II) Dr. El-Sayed El-Alfy Computer Science Department King Fahd University of

More information

4.1 Review - the DPLL procedure

4.1 Review - the DPLL procedure Applied Logic Lecture 4: Efficient SAT solving CS 4860 Spring 2009 Thursday, January 29, 2009 The main purpose of these notes is to help me organize the material that I used to teach today s lecture. They

More information

Chapter 002 The Internet, the Web, and Electronic Commerce

Chapter 002 The Internet, the Web, and Electronic Commerce Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially

More information

Key questions to ask before commissioning any web designer to build your website.

Key questions to ask before commissioning any web designer to build your website. Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,

More information

Common Mistakes. Wedding Professionals Are Making On Their Websites. Created by BRENDA CADMAN

Common Mistakes. Wedding Professionals Are Making On Their Websites. Created by BRENDA CADMAN 10 Common Mistakes Wedding Professionals Are Making On Their Websites Created by BRENDA CADMAN 10 Common Mistakes Wedding Professionals Are Making On Their Websites INTRODUCTION Your website is one of

More information

Search Engine Marketing Guide 5 Ways to Optimize Your Business Online

Search Engine Marketing Guide 5 Ways to Optimize Your Business Online Search Engine Marketing Guide 5 Ways to Optimize Your Business Online Table of Contents Introduction....................................................... 3 Quiz: How Does Your Website Rank?.............................4

More information

High Quality Inbound Links For Your Website Success

High Quality Inbound Links For Your Website Success Axandra How To Get ö Benefit from tested linking strategies and get more targeted visitors. High Quality Inbound Links For Your Website Success How to: ü Ü Build high quality inbound links from related

More information

A "Ritual" Bonus Offer from Brian G. Johnson

A Ritual Bonus Offer from Brian G. Johnson A "Ritual" Bonus Offer from Brian G. Johnson Creator of Commission Ritual Introducing... The 3-Hour Profit Plan How to Leverage Your Time & Make More Online Building an Empire of Profitable Mini Sites

More information

The Paperless Classroom with Google Docs by - Eric Curts

The Paperless Classroom with Google Docs by - Eric Curts The Paperless Classroom with Google Docs by - Eric Curts Table of Contents Overview How to name documents and folders How to choose sharing options: Edit, Comment, and View How to share a document with

More information

DIGITAL IDENTITY MANAGEMENT Temple Community Platform

DIGITAL IDENTITY MANAGEMENT Temple Community Platform DIGITAL IDENTITY MANAGEMENT Temple Community Platform Digital identity is what uniquely describes a person and their relationships online. Most of us today are experts in social identity management (e.g.,

More information