scispace - formally typeset
Search or ask a question
JournalISSN: 1396-0458

First Monday 

University of Illinois at Chicago
About: First Monday is an academic journal published by University of Illinois at Chicago. The journal publishes majorly in the area(s): The Internet & Social media. It has an ISSN identifier of 1396-0458. Over the lifetime, 2114 publications have been published receiving 62380 citations. The journal is also known as: 1st Monday (Online).


Papers
More filters
Journal ArticleDOI
TL;DR: It is argued that free riding leads to degradation of the system performance and adds vulnerability to the system, and copyright issues might become moot compared to the possible collapse of such systems.
Abstract: An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. By sampling messages on the Gnutella network over a 24-hour period, we established that almost 70% of Gnutella users share no files, and nearly 50% of all responses are returned by the top 1% of sharing hosts. Furthermore, we found out that free riding is distributed evenly between domains, so that no one group contributes significantly more than others, and that peers that volunteer to share files are not necessarily those who have desirable ones. We argue that free riding leads to degradation of the system performance and adds vulnerability to the system. If this trend continues copyright issues might become moot compared to the possible collapse of such systems.

1,725 citations

Journal ArticleDOI
TL;DR: Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.
Abstract: Smart contracts combine protocols with user interfaces to formalize and secure relationships over computer networks. Objectives and principles for the design of these systems are derived from legal principles, economic theory, and theories of reliable and secure protocols. Similarities and differences between smart contracts and traditional business procedures based on written contracts, controls, and static forms are discussed. By using cryptographic and other security mechanisms, we can secure many algorithmically specifiable relationships from breach by principals, and from eavesdropping or malicious interference by third parties, up to considerations of time, user interface, and completeness of the algorithmic specification. This article discusses protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer.

1,495 citations

Journal ArticleDOI
TL;DR: It is suggested that people search for content in a myriad of ways and there is considerable difference in whether individuals are able to find various types of content on the Web and a large variance in how long it takes to complete online tasks.
Abstract: Much of the existing literature on the digital divide - the differences between the "haves" and "have nots" regarding access to the Internet - limits its scope to a binary classification of technology use by only considering whether someone does or does not use the Internet. To remedy this shortcoming, in this paper I look at the differences in people's online skills. In order to measure online ability, I assigned search tasks to a random sample of Internet users from a suburban county in the United States. My findings suggest that people search for content in a myriad of ways and there is considerable difference in whether individuals are able to find various types of content on the Web and a large variance in how long it takes to complete online tasks. Age is negatively associated with one's level of Internet skill, experience with the technology is positively related to online skill, and differences in gender do little to explain the variance in the ability of different people to find content online.

1,399 citations

Journal ArticleDOI
TL;DR: The uproar over privacy issues in social networks is discussed by describing a privacy paradox; private versus public space; and, social networking privacy issues.
Abstract: Teenagers will freely give up personal information to join social networks on the Internet. Afterwards, they are surprised when their parents read their journals. Communities are outraged by the personal information posted by young people online and colleges keep track of student activities on and off campus. The posting of personal information by teens and students has consequences. This article will discuss the uproar over privacy issues in social networks by describing a privacy paradox; private versus public space; and, social networking privacy issues. It will finally discuss proposed privacy solutions and steps that can be taken to help resolve the privacy paradox.

1,166 citations

Journal ArticleDOI
TL;DR: A study of social interactions within Twitter reveals that the driver of usage is a sparse and hidden network of connections underlying the "declared" set of friends and followers as mentioned in this paper, revealing that the linked structures of social networks do not reveal actual interactions among people.
Abstract: Scholars, advertisers and political activists see massive online social networks as a representation of social interactions that can be used to study the propagation of ideas, social bond dynamics and viral marketing, among others. But the linked structures of social networks do not reveal actual interactions among people. Scarcity of attention and the daily rythms of life and work makes people default to interacting with those few that matter and that reciprocate their attention. A study of social interactions within Twitter reveals that the driver of usage is a sparse and hidden network of connections underlying the “declared” set of friends and followers.

787 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202356
202298
202125
202069
201967
201877