{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T13:33:09Z","timestamp":1701955989249},"reference-count":39,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>Features of online social networks are being introduced in various applications and environments, including tools supporting virtual teams and online collaboration in general. In fact, social networking has a large potential for easing collaboration, also across organizational boundaries. However, effective e-collaboration through social networks requires the development of open and interoperable systems, allowing people belonging to different organizations to create ties, reflecting real connections existing in daily activities. Attention has to be paid to identity management, for allowing users to develop their reputation consistently, and to privacy and confidentiality, for creating a more trustful environment and protecting freedom of expression. In this article, the authors propose a novel peer-to-peer system, named Blogracy, leveraging the large BitTorrent network. Its main distinguishing features are: (i) protection of users' identity and privacy, (ii) absence of central control over published content; (iii) interoperability with other systems; and (iv) low costs and scalability of the infrastructure.<\/p>","DOI":"10.4018\/jec.2013070104","type":"journal-article","created":{"date-parts":[[2013,8,26]],"date-time":"2013-08-26T12:28:32Z","timestamp":1377520112000},"page":"50-68","source":"Crossref","is-referenced-by-count":33,"title":["Open Social Networking for Online Collaboration"],"prefix":"10.4018","volume":"9","author":[{"given":"Enrico","family":"Franchi","sequence":"first","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]},{"given":"Agostino","family":"Poggi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]},{"given":"Michele","family":"Tomaiuolo","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]}],"member":"2432","reference":[{"key":"jec.2013070104-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.12.006"},{"key":"jec.2013070104-1","doi-asserted-by":"crossref","unstructured":"Alshehri, S., Radziszowski, S. P., & Raj, R. K. (2012). Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption. In Proceedings of the 28th International Conference on Data Engineering Workshops, ICDEW (pp. 143-146). IEEE Computer Society.","DOI":"10.1109\/ICDEW.2012.68"},{"key":"jec.2013070104-2","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505275"},{"key":"jec.2013070104-3","first-page":"24","author":"P.Anklam","year":"2004","journal-title":"KM and the social network"},{"key":"jec.2013070104-4","unstructured":"at&t (2008). The business impacts of social networking. Retrieved October 20, 2012, from http:\/\/www.business.att.com\/content\/whitepaper\/WP-soc_17172_v3_11-10-08.pdf"},{"key":"jec.2013070104-5","doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starin, D. (2009). Persona: An online social network with user-defined privacy. In Proceedings of the ACM Conference on Data Communication, SIGCOMM '09 (pp. 135-146). Barcellona, Spain: ACM.","DOI":"10.1145\/1594977.1592585"},{"key":"jec.2013070104-6","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy (pp. 321-334). IEEE Computer Society.","DOI":"10.1109\/SP.2007.11"},{"key":"jec.2013070104-7","unstructured":"Brickley, D., & Miller, L. (2005). FOAF vocabulary specification. Retrieved October 20, 2012, from http:\/\/xmlns.com\/foaf\/0.1\/"},{"key":"jec.2013070104-8","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L., & Datta, A. (2009). PeerSoN: P2P social networking: Early experiences and insights. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (pp. 46-52). Nuremberg, Germany: ACM.","DOI":"10.1145\/1578002.1578010"},{"key":"jec.2013070104-9","doi-asserted-by":"crossref","DOI":"10.4159\/9780674029095","author":"R. S.Burt","year":"1992","journal-title":"Structural holes: The social structure of competition"},{"key":"jec.2013070104-10","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"jec.2013070104-11","article-title":"Six ways to make Web 2.0 work.","author":"M.Chui","year":"2009","journal-title":"The McKinsey Quarterly"},{"key":"jec.2013070104-12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_4"},{"key":"jec.2013070104-13","unstructured":"Cohen, B. (2003). Incentives build robustness in BitTorrent. In Proceedings of Workshop on Economics of Peer-to-Peer systems (pp. 68-72), Berkley, CA."},{"key":"jec.2013070104-14","first-page":"324","article-title":"Using multi-theoretical multilevel models to study adversarial networks","author":"N. S.Contractor","year":"2003","journal-title":"Dynamic social network modeling and analysis: Workshop summary and papers"},{"key":"jec.2013070104-15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"jec.2013070104-16","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2006070104"},{"key":"jec.2013070104-17","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium (SSYM\u201904) (pp. 303-320). San Diego, CA: USENIX Association.","DOI":"10.21236\/ADA465464"},{"key":"jec.2013070104-18","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2011010104"},{"key":"jec.2013070104-19","doi-asserted-by":"crossref","unstructured":"Falkner, J., Piatek, M., John, J. P., Krishnamurthy, A., & Anderson, T. (2007). Profiling a million user DHT. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC '07) (pp. 129-134).","DOI":"10.1145\/1298306.1298325"},{"key":"jec.2013070104-20","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2008100101"},{"key":"jec.2013070104-21","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2011100104"},{"key":"jec.2013070104-22","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"jec.2013070104-23","doi-asserted-by":"crossref","unstructured":"Graffi, K., Gro\u00df, C., Mukherjee, P., Kovacevic, A., & Steinmetz, R. (2010). LifeSocial.KOM: A P2P-based platform for secure online social networks. In Proceedings of the 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P\u201910) (pp. 554-558). IEEE Computer Society.","DOI":"10.1109\/P2P.2010.5569977"},{"key":"jec.2013070104-24","doi-asserted-by":"crossref","unstructured":"Halpin, H., Robu, V., & Shepherd, H. (2007). The complex dynamics of collaborative tagging. In Proceedings of the 16th International Conference on World Wide Web (WWW \u201907) (pp. 211-220). New York, NY, USA.","DOI":"10.1145\/1242572.1242602"},{"key":"jec.2013070104-25","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2005070102"},{"key":"jec.2013070104-26","unstructured":"IBM Institute for Business Value. (2011). From social media to social CRM. Retrieved October 20, 2012, from http:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/en\/gbe03391usen\/GBE03391USEN.PDF"},{"key":"jec.2013070104-27","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2005040103"},{"key":"jec.2013070104-28","unstructured":"Li, N. (2000). Local names in SPKI\/SDSI. In Proceedings of the 13th IEEE workshop on Computer Security Foundations (CSFW '00) (pp. 2-15). Cambridge, UK: IEEE Computer Society."},{"key":"jec.2013070104-29","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2009040102"},{"key":"jec.2013070104-30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"jec.2013070104-31","doi-asserted-by":"crossref","unstructured":"Mika, P. (2007). Ontologies are us: A unified model of social networks and semantics. In Web Semantics: Science, Services and Agents on the World Wide Web, 5(1): 5-15.","DOI":"10.1016\/j.websem.2006.11.002"},{"key":"jec.2013070104-32","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2012070104"},{"key":"jec.2013070104-33","doi-asserted-by":"crossref","unstructured":"Rzadca, K., Datta, A., & Buchegger, S. (2010). Replica placement in P2P storage: Complexity and game theoretic analyses. In Proceedings of the International Conference on Distributed Computing Systems (pp. 599-609). Genova, Italy: IEEE Computer Society.","DOI":"10.1109\/ICDCS.2010.67"},{"key":"jec.2013070104-34","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_13"},{"key":"jec.2013070104-35","doi-asserted-by":"crossref","unstructured":"Skeels, M., & Grudin, J. (2009). When social networks cross boundaries: A case study of workplace use of Facebook and Linked-In. In Proceedings of the ACM 2009 International Conference on Supporting Group Work (GROUP\u201909) (pp. 95-104). Sanibel Island, FL: ACM.","DOI":"10.1145\/1531674.1531689"},{"issue":"1","key":"jec.2013070104-36","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/25148667","article-title":"Why should I share? Examining social capital and knowledge contribution in electronic networks of practice.","volume":"29","author":"M.Wasko","year":"2005","journal-title":"Management Information Systems Quarterly"},{"key":"jec.2013070104-37","unstructured":"Young, J. (2009). Getting great results from virtual meetings. In Proceedings of the BAODN 2009, Berkeley, CA. Retrieved October, 20, 2012, from http:\/\/www.baodn.org\/assets\/documents\/Young_Getting%20Great%20Results%20from%20Virtual%20Meetings%20-%20Julia%20Young.pdf"},{"key":"jec.2013070104-38","unstructured":"Zzz & Schimmer. L. (2009). Peer profiling and selection in the I2P anonymous network. In Proceedings of PET-CON 2009 (pp. 1-12). Dresden, Germany."}],"container-title":["International Journal of e-Collaboration"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=82068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:25:53Z","timestamp":1654129553000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jec.2013070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jec.2013070104","relation":{},"ISSN":["1548-3673","1548-3681"],"issn-type":[{"value":"1548-3673","type":"print"},{"value":"1548-3681","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}