Last but not the least Blog: For Dragon Den Pitch

Acknowledgement: Really appreciate Connor McCabe, our group mentor, and our critical friend, Gemma Fitzsimmons. They contributed very good suggestions and references for our project. Without their help, it can’t be such excellent for our project. And also thanks everyone who responded our survey and leave comments on our blog.

Welcome to Webbers’ blog, in this Portfolio, our group collaborated developing a universal client for social network user, as it named ‘Uni4one’ (Universal all social networks for one client)

Uni4one can be simply summarised as a client has following features:

Features of Uni4one

Please refer to product design and analyse for more details, and we also presented some simple User Interface pictures on ShowCase Page.

In one word, we aimed to design Uni4one as a client which is able to smoothly send, update, search information across different social networks, that is the core features of our product.

The advantage of Uni4one

Please refer to our project proposal and StoryBoard to see what advantages and amazing features that a universal client has.

Profit Point analysis

We also did some market and profit research, please refer to our Market Evaluation part for more details

Architecture Diagram

Some technical Digram designed by our group member, to demonstrate how the client works.

Finally, we also have some research articles about privacy issues (Legal Research) and similar product analysis (Research Case). Hope you would spend some time on reading it.

Many thanks for your visiting.

No Comments

Power Users

Who are power users?

According to Webopedia power user is a sophisticated user of personal computers. A power user is typically someone who has considerable experience with computers and utilizes the most advanced features of applications [1].

According to Wikipedia a power user is a user of a personal computer who has the ability to use advanced features of programs which are beyond the abilities of “normal” users, but is not necessarily capable of programming and system administration [2].

Power users can be our initial target group that can be used as a vehicle to make our application widely known. Due to the fact that a small number of users can create a significantly large amount of content of the overall amount that is created by the other users. Specifically a study on twitter found that ā€œfifty per cent of all tweets read and shared on Twitter were generated by only 20,000 ā€˜eliteā€™ users, despite there being more than 100 million registered accounts on the serviceā€ [3]. Later on another study regarding facebook illustrated a similar behavioral pattern of the facebook power users [4]. More analytically the report states

On average 140 million tweets are sent a day, which is up nearly 100 million on the amount posted on a daily basis a year ago

Most people using the social network receive more interactions, such as ā€˜likesā€™ or being tagged in photos, than they give out on the site.

A new study entitled: ‘Why Most Facebook Users Get More Than They Giveā€™, from Pew Internet, an American not-for-profit research firm, found that people ā€˜likedā€™ other Facebook membersā€™ content an average of 14 times, while their own content was on average ‘liked’ 20 times.

Twelve per cent of Pewā€™s study participants, over the course of a month, tagged friends in photos, but then 35 per cent were themselves tagged in minimum of one photo. On average they sent nine personal messages and received 12. Forty per cent of them made a ‘friend request’, while 63 per cent received one in that time.

ā€œFirst, it turns out there are segments of Facebook power users who contribute much more content than the typical user,ā€ explained Professor Keith Hampton, the lead author of the report.

ā€œMost Facebook users are moderately active over a one month time period, so highly active power users skew the average. Second, these power users constitute about 20 per cent to 30 per cent of Facebook users, but the striking thing is that there are different power users depending on the activity in question. One group of power users dominates ā€˜friendingā€™ activity. Another dominates ā€˜likingā€™ activity. And yet another dominates photo tagging.ā€

References

  1. http://www.webopedia.com/TERM/P/power_user.html
  2. http://en.wikipedia.org/wiki/Power_user
  3. http://www.telegraph.co.uk/technology/twitter/8411930/Twitter-elite-send-most-tweets.html
  4. http://www.telegraph.co.uk/technology/facebook/9059576/Facebook-dominated-by-power-users.html

, , ,

No Comments

SWOT Analysis

We conducted a SWOT analysis in order to illustrate and evaluate the strengths, weaknesses, opportunities and threats involved in our project.

No Comments

Privacy in Social Network

Privacy is the most common legal concept that a social network would meet. In this article, it will briefly explain what is privacy and how could our project handle it.

The conception of privacy

Even though the term of privacy can date back to hundred years ago, as William Shakespeare stated in his work Troillus and Cressida [1], privacy was treated as a right is only in 100 years [2]. Privacy right is a product of modern technology developing. Since photography, telecommunication and large scale broadcast were invented from 19-century, it is possible to harass and even infract oneā€™s image and reputation. Under this circumstance, different countries begin to enact law (civil law countries) or set case (common law countries) in order to protect peopleā€™s right. However, until today, there is no universal conception of privacy accepted internationally, usually each country interpret privacy right under its context [3].

Generally say, European Union has the most strict privacy protection standard all over the globe. Compared with Common law countries, which prefer a sectoral approach to protect privacy in different situations. In another word, most common countries prefer a free information flow than strict information protection. Conversely, due to the identity related genocide during the World Second War in European continent, there is a universal call to strictly protect personal information in post-war period. As a result, European Union regulated a strict regulation to help citizen protect their privacy right.

EU Data Protection Directive

For European country, a valuable reference of privacy protection could be Data Protection Directive (Directive 95/46/EC) [4], which required to be implemented by each countryā€™s law in EU. According to the Directive, a personal data refers to information that could be identifiable to a real person. Among personal data [5], some data was called as sensitive personal data that is able to reveal the racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, and the processing of data concerning to health and sex life [6], and any organization which keep such data would hold a proper liability to secure those data to a third party organization unless certain exception applied [7].

As an implementation of EU DPD in UK, Data Protection Act [8] provides equivalent level protection to personal data. Though privacy is not a clear and independent notion which were stated in UK legislation, DPA defined eight key principle of data protection restricted the privacy protection in IT industry.

In short words, a company holds following liabilities for personal data providers:

  1. Data should be processed in a fairly and lawfully way, and should not processed to third party unless exceptions (Required by authority, national security etc.)
  2. Data should be acquired by specific and lawfully purposes, and should not be use exceeded the given purpose or related purpose (For instance, a hospital cannot use patientā€™s health record for medical insurance investigation, but it would be fair to pass those data to another hospital if patient transformed)
  3. Data should be kept in accurate and up to data.
  4. Data provider holds the right to modify and remove according to their concern.
  5. Company should adopt adequate technical and regulation to keep oneā€™s data is confidential, integrated and available from unlawful processing.
  6. Data should not be transformed to a country outside European Economic Area without adequate level protection as EEA does.

For our project related issues

As an intermediary of social network, Uin4one itself did not hold or store any user data from other social networks. Most date would be stored as local cache or present by APIs (where the data source is social network than our application). Even though oneā€™s username and password of social network would relate to this application, it will be encrypted into a token which only readable for relevant social networks.

The only information our application would keep is a pair of E-mail address and a user-defined password. That information was used to identify user and let them log in to access their social network information. Basically say, an E-mail address itself could not be treated as a identifiable information, since anyone can sign up a e-mail address without any other information provided. However, when user login to our system, it should use security transmission such as HTTPS or SSL since a leak of E-mail address and password could cause userā€™s social network information leaked too. So that should be the part we need to pay attention to.

[1] ULYSSES: ā€œBut ‘gainst your privacy, The reasons are more potent and heroical: ‘Tis known, Achilles, that you are in love With one of Priam’s daughters.ā€by William Shakespeare, in Troillus and Cressida (1609)

[2] There are several origins of privacy (civil law believes it is a part of essential civil right, though few constitution clearly use the term ā€˜privacyā€™). Here it just refer to the U.S article which first stated privacy as a right in U.S, as the article by Samuel Warren and Louis Brandeis, The Right to Privacy, 4 Harvard L.R. 193 (1890)

[3] Some countries stated that privacy is individual right and should be protected as universal concept. Others may tend to protect privacy in different circumstances, like U.S.

[4] See http://ec.europa.eu/justice/data-protection/index_en.htm and http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML On 25 January 2012, the European Commission unveiled a draft European Data Protection Regulation that will supersede the Data Protection Directive.

[5] See Article 2 (a)

[6] See Article 8 (1)

[7] See Article 8 (2)

[8] See http://www.legislation.gov.uk/ukpga/1998/29/contents, DPA were adapted in 1998 in order to meet EU DPDā€™s requirement

,

No Comments

StoryBoard and Demonstration

scenario 1: Login

Lenny is a graduate student who usually use Facebook and Twitter. One day Lenny saw the advertisement of Uni4one from one of his friend’s signature, Lenny began to feel interesting about Uni4one and he downloaded Uni4one.

First, Lenny saw the login&register page of Uni4one. Lenny used his E-mail address and personal password registered a account for Uni4one.

Scenario 2: Setting

Since Uni4one itself is not a social network, Lenny needs to set his favourite social network accounts on Uni4one and give Uni4one relevant authorities to access and update information to his social networks. Lenny first set his Facebook account with Uni4one.

Thus, now Lenny finished the setting of social network and he can browse all the information from multiple social (For Lenny, he can view information from his Facebook and Twitter Account ) platform by Uni4One.

Scenario 3: Post new information to social network

After tried Uni4one, Lenny feels those functions are really cool and prefect, so he wants to share a post with his friends to show Uni4one. So he input a new status and tweet as “Uni4one is super cool application, love it” in the bottom message box and update it to social networks.

Scenario 4ļ¼šSearch Post and Tweet

After Lenny updated his status and tweet, a lot of his friends replied his message on social network expressed they also want to try such client. However, due to too many friends, Lenny failed to find the posts and tweet of his girlfriend (he want to show her first). So Lenny searched her posts and tweet based on her name and twitter account. Soon, all tweets and post related to his girlfriend are presented to him.

Scenario 5ļ¼šMatching Friends

When posting information to his girlfriend, Lenny found a dialog jumped out and asked him ‘Is that Kristen (From Facebook) and @Kristen (From Twitter) are same user?’ Lenny clicked ‘Yes’ and from now all tweet and post from Kristen will be integrated into the name ‘Kristen’ including search information.

Episode

We keenly hope everyone can enjoy the benefits of Uni4one, a universal social network client for all your networks. Just click once, all post, updates, tweet and information will be presented to you freshly. Embrace the wave of Internet, Embrace all your friends from Uni4one.

Uni4One, a new experience for social networking!

No Comments

Use Case and Activity Diagrams

This is the Use Case diagram:

According to the Use Case Diagram, the Activity Diagram are drawnĀ  as below:

Accounts Setting and Register:

Setting preferred social network accounts and register on Uni4One at first time, otherwise users can modify the accounts.

View Social Information:

Select different frame to browse different information on multiple social platforms.

Compose New Post:

Send a new post to a particular social web or multiple ones.

Friends Connection:

Connect same friends automatically and/or manually.

Key Words Searching:

Type key words to get search results.

No Comments

Technics and Architecture

According to our idea, the Uni4One is not a quite complex system. The key point of development is to understanding the APIs of recently popular social networks. Developers should focus on how to get data from Facebook and Twitter, or send information to them.

Normally, data stream flow between Uni4One and SNS (Facebook, Twitter, etc.) by JSON format. After request to SNS, the Uni4One server transfers the JSON array to readable information and sends them to frontend and display on web. The server is a PHP + MySQL platform.

The architecture diagram is demonstrated below:

A following screen shot illustrates the using of Facebook API:

No Comments

Final Design Description and Analysis

Since we decided to work on a universal client for multiple social webs, the group have done some research on recently exist similar apps. One of a typical app is TweetDeck which has been introduced by previous blogs. Although it integrates Twitter and Facebook, there are some defects of the app. Ā Therefore, the aim of our design is to make better user experience.

TweetDeck is developed by Twitter, so the most functions of it are focus on Twitter unless News Feed. Ā Our app will be a web based service for most popular social networks.

Figure1 General Design

Add Account

On the first step, setting up your frequently used social network account to the service. Choose one of them as your default account for login.

Read and Write Post

Users can synchronous check all the post (tweets, news feed, etc.) from multiple social platforms (you can choose one, multiple or all of them), as well as compose new post.

Additionally, Users can comment on the post.

Searching

This function is for searching friends, relevant post from you, and your friends or all over the social platforms by keywords (Searching area can be set). This is different from TweetDeck which only search on Twitter.

Friends Connection

The service combines usersā€™ friends from the multiple social webs automatically by their names. In addition, users can manual aggregate their particular friend with different nick name in different social networks.

Accessory Functions

Additional functions include:

Mentions ā€“ List of who mentioned you (@) and what is for;

Messages ā€“ Messages between users and their friends;

Events ā€“ List of what events a user have in multiple social networks.

Accessory Functions

Customize UI

No Comments

Final Week Marching!! We have done so much and just a little more work to do now!

It have been two month, since we five knew each other and work as a team.
We have done a lot of thing inĀ cooperation, and now it is only one week before weĀ submitted our final project.

ThisĀ Gantt Chart witnessed our effort and our progress in this project.

We’ll keep our passion on the last week and make thisĀ universal client become a perfect work!

Gantt Chart for Webbers

Our Working Plan, Defined on early of March

,

1 Comment

User Interface Design: How to get human visual attention by Gemma Fitzsimmons

Introduction

This post will describe a number of basic effects in relation to human vision and attention, focusing on how those effects can be relevant to the design of web site displays.

Saliency

Saliency is all about how much something stands out. If an object is salient, then it is more likely to attract your attention.

However, if everything is salient, it is difficult to figure out what is important and the display could be confusing. You may have already noticed this with web pages that have too much clutter, making it hard to find what you are looking for [1].

Therefore, when designing the interface to a web-based application, the items which are the most salient need to be those that are the most important to the users (e.g., buttons which are used regularly or have useful information, such as notifications).

Grouping

When a number of similar objects are close to one another, they can be visually ā€˜groupedā€™ by the user. This is particularly easy when the objects are the same colour. When ā€˜groupedā€™, they are treated as a single unit, rather than lots of single units. This makes it easier to either ignore them, or pay attention to them when necessary [2].

In the case of our project we may wish to allow the user to group feeds from different social networks together. One way to achieve this would be to colour the items according to their source (e.g., colour the backgrounds to Facebook items one colour, Twitter items a different colour and so on). This will enable the users to easily distinguish the origin of the information.

Preattentive Processing

Attention has various components. Some of these are under conscious control; others are automatic. One automatic component of attentional processing is preattentive processing. This was first described in Treismanā€™s Feature Integration Theory [3]. Objects will ā€˜pop outā€™ when an item in the display is salient compared to the rest of the items in the display. Examples of the many different ways an item can pop out and be detected preattentively are listed below in the image. These features can attract the users attention just because they pop out compared to the rest of the display.

Image from Healey and Enns

A example about features that catch user's attention

Attentional Capture

Attentional capture occurs when a salient visual event occurs. Our attention is immediately drawn to the salient event [5]. Banner advertisements often try to take advantage of this phenomenon by having bright-coloured images and motion within them, which can capture the attention of the users.
However, attentional capture can also be distracting, so for our design, it may be best to avoid having too many sudden, salient events. Any salient events (such as notifications) should be kept to a minimum and should not be obtrusive to the users.
Inattentional/Change Blindness

Sometimes users can completely fail to perceive visually salient objects. This is because we cannot take in all the information on the screen at once. Though this is not obvious to us, as we believe that we can take in everything around us, in fact that is not the case.
A famous example of this can be seen in the Simons and Chabrisā€™ video where something unexpected happens during the video and a majority of participants fail to notice this happening [6].
[INSERT YOUTUBE VIDEO (http://www.youtube.com/watch?v=vJG698U2Mvo)]

In relation to our current project we may want to fight against or encourage inattentional/change blindness. We may want the users to notice when new items are added to their stream, or we may wish for the users to not get their attention captured by the new items if they are reading older items. Regardless of which route we go down, we want to be careful to make sure that we donā€™t have a display where many changes are occurring all the time, or else users will be unlikely to notice those changes, or become overwhelmed and frustrated by the flood of information.
References

[1] L. Itti, C. Koch and E. Niebur. “A model of saliency-based visual attention for rapid scene analysis ,” Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.20, no.11, pp.1254-1259, 1998.
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=730558&isnumber=15773
[2] E.Goldstein, Sensation and Perception, 8th Edition. CA, USA: Wadsworth, 2009.
[3] A. Treisman and G. Gelade, ā€œA feature-integration theory of attention,ā€ Cognitive Psychology, vol. 12, pp. 97ā€“136, 1980.
URL: http://www.distancelearningcentre.com/access/materials/cog_psych/Treisman_Gelade_1980_Feature_Integration_Theory.pdf
[4] C. G. Healey and J. T. Enns, ā€œAttention and Visual Memory in Visualization and Computer Graphics,ā€ IEEE Transactions on Visualization and Computer Graphics, 2011.
URL – http://www2.psych.ubc.ca/~ennslab/Vision_Lab/Publications_files/140_Healey%26Enns_TCVGinpress.pdf
[5] J. Jonides and S. Yantis, ā€œUniqueness of abrupt onset in capturing attention,ā€ Perception Psychophysics, vol. 43, pp.346ā€“354, 1988.
URL – http://step.psy.cmu.edu/articles/Jonides.pdf
[6] D. J. Simons and C. F. Chabris, ā€œGorillas in our midst: Sustained inattentional blindness for dynamic events,ā€ Perception, vol. 28, no. 9, pp. 1059ā€“1074, 1999.
URL – http://www.cnbc.cmu.edu/~behrmann/dlpapers/Simons_Chabris.pdf

,

1 Comment