One thought I do want to bring up is about control. There are social software stacks that must address the needs of both “walled garden” and “open” environments.

For example, think of how a federal agency requiring top secret clearance handles a social software stack. I am aware of the need to leverage these kinds of solutions to increase timely communication, but there is likely some kind of hierarchical control mechanism.

So, how does the social software stack play out in “walled garden” and “open” environments?

Perhaps I’m just wishing that you inject the idea of “control” for both objects and identities.