Exploiting The Social Aspects Of Web 2.0 In HE Institutions Brian Kelly, UKOLN, University of Bath, Bath, UK IWR Informati...
Contents <ul><li>Introduction </li></ul><ul><ul><li>About the speaker </li></ul></ul><ul><li>Amplified Events  </li></ul><...
About The Speaker <ul><li>Brian Kelly: </li></ul><ul><ul><li>UK Web Focus: a national Web advisory post  </li></ul></ul><u...
Another View of Me <ul><li>My life in recent times </li></ul>Introduction Jan-Apr 2008 35 talks from  Jan-Dec 2007 http://...
And My Blog OpenDOAR mentioned
Introduction RSS feed available: for syndication or adding on your device (PC, PDA, phone, ..)
Amplified Events <ul><li>WiFi networks + increasing ownership of laptops + consumer products (MP3 recorders, digital camer...
Photography Is An Issue <ul><li>We’re taking photos at events & sharing them on Flickr, Facebook, …: </li></ul><ul><ul><li...
Possibly A Big Issue <ul><li>A recent item published on BBC News Web site (17 April 2008) </li></ul>http://news.bbc.co.uk/...
Possibly A Big Issue <ul><li>A recent item published on BBC News Web site (17 April 2008) </li></ul><ul><li>Is photography...
What I Do <ul><li>My approach (note IANAL): </li></ul><ul><ul><li>Be open </li></ul></ul><ul><ul><li>Clarify what I mean b...
When I’m An Organiser <ul><li>Approaches taken at recent “amplified events”: </li></ul><ul><ul><li>IWMW 3-day events since...
When I’m In The Audience <ul><li>Participant at Oxford  Beyond Digital Natives  conf, April: </li></ul><ul><ul><li>Asked s...
What If Things Go Wrong? <ul><li>Speaker doesn’t want to be recorded? </li></ul><ul><li>Things go wrong in live presentati...
What If Things Go Wrong? <ul><li>Speaker doesn’t want to be recorded? </li></ul><ul><ul><li>That’s fine (and avoid pressur...
What More Can Be Done  <ul><li>More can be done to enhance Amplified Events: </li></ul><ul><ul><li>Photos will be uploaded...
Jumping The Shark <ul><li>Some questions: </li></ul><ul><ul><li>Which Web applications are depicted? </li></ul></ul><ul><u...
Jumping The Shark? <ul><li>Some responses: </li></ul><ul><ul><li>Web server software (data from Netcraft) </li></ul></ul><...
The Web 2.0 Picture <ul><li>Gartner hyper curve </li></ul>Rising expectations Trough  of despair Enterprise software Large...
Challenges of Web 2.0 <ul><li>What Is Web 2.0? </li></ul><ul><li>Marketing term (derived from observing 'patterns') rather...
Sustainability Problems <ul><li>Web 2.0 </li></ul><ul><ul><li>It’s another bubble </li></ul></ul><ul><ul><li>The companies...
Sustainability Problems <ul><li>Web 2.0 </li></ul><ul><ul><li>It’s another bubble </li></ul></ul><ul><ul><li>The companies...
Slideshare Example <ul><li>I use Slideshare to (a) maximise exposure to my ideas (b) solicit feedback (c) allow content to...
Slideshare Example (2) <ul><li>What happens if Slideshare goes down – and it has happened! </li></ul><ul><li>Does this dem...
Slideshare Example (2) <ul><li>What happens if Slideshare goes down – and it has happened! </li></ul><ul><li>Does this dem...
Slideshare Example (2) <ul><li>What happens if Slideshare goes down – and it has happened! </li></ul><ul><li>Does this dem...
Performance Problems <ul><li>It’s not just Slideshare & the OU: downtime, DOS attacks, … can happen to all services </li><...
Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft s...
Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft s...
Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft s...
Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft s...
It’s The Way We Use Services <ul><li>What do the following have in common? </li></ul><ul><ul><li>Paper • PDF </li></ul></u...
It’s The Way We Use Services <ul><li>What do the following have in common? </li></ul><ul><ul><li>Paper • PDF </li></ul></u...
Accessibility and Web 2.0 <ul><li>Common response “It’s AJAX; it’s inaccessible” </li></ul><ul><li>But: </li></ul><ul><ul>...
Avoiding Walled Gardens <ul><li>The dichotomy: </li></ul><ul><ul><li>Don’t use Facebook, it’s a walled-garden </li></ul></...
Slideshare Example <ul><li>I use Slideshare to (a) maximise exposure to my ideas (b) solicit feedback (c) allow content to...
Inappropriate User Content <ul><li>Potential problems: </li></ul><ul><ul><li>Spam: comment spam, link spam, twitter follow...
Uploading Dodgy Content <ul><li>Twitterers noticed: </li></ul><ul><ul><li>Porn videos posted to Educause blog on Sun 20 Ap...
Why Social Networks? <ul><li>In the old days (eLib): </li></ul><ul><ul><li>Focus on standards & technical architectures </...
What Can SNs Provide? <ul><li>Potential benefits of social software: </li></ul><ul><ul><li>Maximising impact  </li></ul></...
Yes, Even Twitter! <ul><li>What can micro-blogging applications like Twitter provide? (surely waste of time?): </li></ul><...
Information Overload <ul><li>What if we’re too open, sharing everything? </li></ul><ul><li>What if we’re too trusting, thi...
Key Questions (1) <ul><li>Big question for future isn’t  whether  we provide blogs, wikis, etc but  how  they are provided...
Key Questions (2) <ul><li>On social software: </li></ul><ul><ul><li>Does it have to be for everyone? </li></ul></ul><ul><u...
Questions <ul><li>Any questions </li></ul>Note further slides available addressing some of these issues
A Blended Approach <ul><li>We need: </li></ul><ul><ul><li>Mixed approach of in-house & external services </li></ul></ul><u...
The Challenges <ul><li>Areas of concern: </li></ul><ul><ul><li>Institutional inertia, vested interests, power struggles, …...
Addressing The Concerns <ul><li>Some approaches to addressing these concerns: </li></ul><ul><ul><li>Risk assessment </li><...
Risk Assessment (1) See “ Risk Assessment For Use Of Third Party Web 2.0 Services ” QA Focus briefing document User educat...
Risk Assessment (2)
University of Oxford
Risks Revisited <ul><li>Are these risks scary?  </li></ul><ul><li>Remember to include: </li></ul><ul><ul><li>Risks of doin...
Transforming IT Services <ul><li>IT Services: </li></ul><ul><ul><li>They won’t let us innovate </li></ul></ul><ul><ul><li>...
IT Services 2.0 <ul><li>IT Services 2.0: </li></ul><ul><ul><li>Term coined by Mark Sammons, Edinburgh Univ </li></ul></ul>...
Embracing 3 rd  Party Services <ul><li>What will happen when student leave (as they do)? </li></ul><ul><li>Casey Leaver ha...
When Things Go Wrong <ul><li>What would happen if a 3 rd  party service was taken over by a porn company? </li></ul><ul><l...
The Incident (1) <ul><li>The Incident </li></ul><ul><ul><li>Email message received saying news page for workshop contained...
The Incident (2) <ul><li>What We Had Already Done </li></ul><ul><ul><li>A Risk Assessment page had already been created, d...
Risk Assessment <ul><li>Risk assessment summaries provided for events which embed 3 rd  party services </li></ul><ul><li>A...
Data Migration <ul><li>When useful information is stored on a 3 rd  party wiki the data is copied to a managed environment...
Transforming Ourselves <ul><li>It’s not just about institutional inertia & IT Services </li></ul><ul><li>What about: </li>...
Personal Audit <ul><li>Personal audit: </li></ul><ul><ul><li>There’s a need for responsible Web 2.0 enthusiasts to carry o...
Vision For The Future <ul><li>Where are we now? </li></ul><ul><ul><li>People are using externally-hosted Web 2.0 services ...
Revisiting The IE (nee DNER) <ul><li>We had early visions for the JISC DNER  </li></ul><ul><li>I subsequently developed my...
Web 2.0 As A DNER Development <ul><li>The DNER got a lot right: </li></ul><ul><ul><li>Networked services </li></ul></ul><u...
Why HE? Why Now? <ul><li>World is changing: </li></ul><ul><ul><li>Web 2.0, ubiquitous networks, mobile devices, declining ...
Conclusions  <ul><li>To conclude: </li></ul><ul><ul><li>E-Learning 2.0 and Web 2.0 are here and won’t go away </li></ul></...
Upcoming SlideShare
Loading in...5
×

Exploiting The Social Aspects Of Web 2.0 In HE Institutions

3,651

Published on

Slides for talk on "Exploiting The Social Aspects Of Web 2.0 In HE Institutions".
See http://www.ukoln.ac.uk/web-focus/events/seminars/nottingham-2008-04/

Published in: Technology, Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,651
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
16
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Exploiting The Social Aspects Of Web 2.0 In HE Institutions

  1. 1. Exploiting The Social Aspects Of Web 2.0 In HE Institutions Brian Kelly, UKOLN, University of Bath, Bath, UK IWR Information Professional of the Year Resources bookmarked using the ‘ nottingham-2008-04 ' tag UKOLN is supported by: http://www.ukoln.ac.uk/web-focus/events/seminars/nottingham-2008-04/ This work is licensed under a Attribution-NonCommercial-ShareAlike 2.0 licence (but note caveat) About This Talk How should the institution respond to the opportunities and challenges posed by Web 2.0? Web 2.0 has been described as a ‘disruptive technology’ which challenges previous assumptions. The notion of the ‘network as a platform’ and the excitement over social networks requires institutions to think deeply about how to respond. by-nc-sa
  2. 2. Contents <ul><li>Introduction </li></ul><ul><ul><li>About the speaker </li></ul></ul><ul><li>Amplified Events </li></ul><ul><ul><li>Personal case study </li></ul></ul><ul><li>Web 2.0 </li></ul><ul><ul><li>The network as platform </li></ul></ul><ul><ul><li>Openness and trust </li></ul></ul><ul><ul><li>Social aspects </li></ul></ul><ul><li>What’s To Be Done? </li></ul><ul><ul><li>Reconceptualising the purposes </li></ul></ul><ul><ul><li>Understanding risks and benefits </li></ul></ul><ul><ul><li>Risk assessment & management </li></ul></ul><ul><ul><li>Sharing and learning </li></ul></ul><ul><li>Conclusions </li></ul>To be covered Additional topics
  3. 3. About The Speaker <ul><li>Brian Kelly: </li></ul><ul><ul><li>UK Web Focus: a national Web advisory post </li></ul></ul><ul><ul><li>Works at UKOLN – a national centre of expertise in digital information management, located at the University of Bath, UK </li></ul></ul><ul><ul><li>Funded by JISC and MLA to support UK’s higher and further education & cultural heritage sectors </li></ul></ul><ul><ul><li>Involved in the Web since January 1993 </li></ul></ul><ul><ul><li>Active in promoting best practices for Web 2.0 </li></ul></ul>Introduction
  4. 4. Another View of Me <ul><li>My life in recent times </li></ul>Introduction Jan-Apr 2008 35 talks from Jan-Dec 2007 http://www.ukoln.ac.uk/web-focus/presentations This remote app comes for free
  5. 5. And My Blog OpenDOAR mentioned
  6. 6. Introduction RSS feed available: for syndication or adding on your device (PC, PDA, phone, ..)
  7. 7. Amplified Events <ul><li>WiFi networks + increasing ownership of laptops + consumer products (MP3 recorders, digital cameras, video cameras, iPhones & Nokia N95s, …) + easy-to-use applications = </li></ul><ul><ul><li>productivity gains </li></ul></ul><ul><ul><li>richer & deeper leaning </li></ul></ul><ul><ul><li>new opportunities </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><li>Or: </li></ul><ul><ul><li>confusion </li></ul></ul><ul><ul><li>information overload </li></ul></ul><ul><ul><li>unsustainable fads </li></ul></ul><ul><ul><li>Wasted time and effort </li></ul></ul><ul><li>Which? </li></ul>Amplified Events
  8. 8. Photography Is An Issue <ul><li>We’re taking photos at events & sharing them on Flickr, Facebook, …: </li></ul><ul><ul><li>Builds community </li></ul></ul><ul><ul><li>Shared experiences </li></ul></ul><ul><ul><li>Shared memories </li></ul></ul><ul><ul><li>It’s fun </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><li>But what about: </li></ul><ul><ul><li>Data protection </li></ul></ul><ul><ul><li>Privacy </li></ul></ul><ul><ul><li>Embarrassment </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><li>How should we respond? </li></ul>http://efoundations.typepad.com/ efoundations/2007/11/jisc-cetis-conf.html Amplified Events
  9. 9. Possibly A Big Issue <ul><li>A recent item published on BBC News Web site (17 April 2008) </li></ul>http://news.bbc.co.uk/1/hi/magazine/7351252.stm Amplified Events
  10. 10. Possibly A Big Issue <ul><li>A recent item published on BBC News Web site (17 April 2008) </li></ul><ul><li>Is photography not only an issue for our sector in our context, but have legal implications? </li></ul><ul><li>Do we need: </li></ul><ul><ul><li>Formal agreements </li></ul></ul><ul><ul><li>Model T&Cs </li></ul></ul><ul><ul><li>… </li></ul></ul>Amplified Events
  11. 11. What I Do <ul><li>My approach (note IANAL): </li></ul><ul><ul><li>Be open </li></ul></ul><ul><ul><li>Clarify what I mean by this: </li></ul></ul><ul><ul><ul><li>CC licence on materials (title slides, handouts, on Slideshare, …) </li></ul></ul></ul><ul><ul><ul><li>CC licence on talk </li></ul></ul></ul><ul><ul><ul><li>Permission to video / record / video </li></ul></ul></ul><ul><ul><ul><li>Warning that licence may be rescinded if disasters happen! </li></ul></ul></ul><ul><ul><li>Invitation to others to take a similar approach </li></ul></ul>Approach described at Stargazing conf, Edinburgh Univ, Nov 2006. “Legal issues are important” said Charlotte Waelde “and Brian’s demonstrated lightweight ways of addressing such issues”  Amplified Events
  12. 12. When I’m An Organiser <ul><li>Approaches taken at recent “amplified events”: </li></ul><ul><ul><li>IWMW 3-day events since 2006 </li></ul></ul><ul><ul><li>Exploiting Potential of Wikis and Exploiting Potential of Blogs & SNs 1-day workshops </li></ul></ul><ul><li>We: </li></ul><ul><ul><li>Notified speakers that event would be videoed & broadcast & sought permission </li></ul></ul><ul><ul><li>Provided guidelines for session chairs: informing audience of remote audience, repeating permissions from speakers </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><li>Being open about issues has proved fine (so far) </li></ul>Amplified Events
  13. 13. When I’m In The Audience <ul><li>Participant at Oxford Beyond Digital Natives conf, April: </li></ul><ul><ul><li>Asked speaker for permission to record: </li></ul></ul><ul><ul><ul><li>OKish, but reconfirm after talk. Subsequent request not to publish – no problem </li></ul></ul></ul><ul><ul><li>Asked fellow debates for permission – fine </li></ul></ul><ul><ul><li>Student panel. No opportunity to seek prior permission so videoed 10 mins & then told them: </li></ul></ul><ul><ul><ul><li>Students were happy </li></ul></ul></ul><ul><ul><ul><li>Two students were 6 th formers </li></ul></ul></ul><ul><ul><ul><li>Sought them (all) out & gave card and asked for agreement (they need to opt in) </li></ul></ul></ul><ul><ul><ul><li>Organiser & participant asked me not to publish / told me it was illegal; head’s permission needed; … </li></ul></ul></ul><ul><ul><ul><li>No email received, so video not published </li></ul></ul></ul>What should be done? Are there lightweight approaches? Amplified Events
  14. 14. What If Things Go Wrong? <ul><li>Speaker doesn’t want to be recorded? </li></ul><ul><li>Things go wrong in live presentation? </li></ul><ul><li>Speaker changes mind afterwards? </li></ul><ul><li>Father Jack is in the audience? </li></ul><ul><li>Gun-toting member of audience goes beserk? </li></ul>Amplified Events
  15. 15. What If Things Go Wrong? <ul><li>Speaker doesn’t want to be recorded? </li></ul><ul><ul><li>That’s fine (and avoid pressuring speaker) </li></ul></ul><ul><li>Things go wrong in live presentation? </li></ul><ul><ul><li>Accept it: that’s life & audience normally supportive </li></ul></ul><ul><li>Speaker changes mind afterwards? </li></ul><ul><ul><li>That’s fine – use of lightweight approaches help </li></ul></ul><ul><li>Father Jack is in the audience? </li></ul><ul><ul><li>Don’t worry, it probably won’t happen. And accept it if it does. </li></ul></ul><ul><li>Gun-toting member of audience goes beserk? </li></ul><ul><ul><li>Don’t worry, it probably won’t happen. </li></ul></ul>Amplified Events
  16. 16. What More Can Be Done <ul><li>More can be done to enhance Amplified Events: </li></ul><ul><ul><li>Photos will be uploaded to closed area of Flickr for a week, before photos made public </li></ul></ul><ul><ul><li>Learning from experiences on live chat, back channels, etc. at events </li></ul></ul><ul><ul><li>Managing the physical space – noisy typists and geeks to left of lecture theatres (where power sockets are located) </li></ul></ul><ul><ul><li>Understanding our own personal preferences to avoid information overload: </li></ul></ul><ul><ul><li>Taking responsibilities: mastering applications; knowing how to disable sound on laptops; how to configure WiFi; … </li></ul></ul>Amplified Events
  17. 17. Jumping The Shark <ul><li>Some questions: </li></ul><ul><ul><li>Which Web applications are depicted? </li></ul></ul><ul><ul><li>What are the implications of blue’s decline </li></ul></ul><ul><ul><li>Will red be tomorrow’s winner? </li></ul></ul><ul><ul><li>What should we make of purple? </li></ul></ul><ul><ul><li>How should we respond to such consideration? </li></ul></ul>‘ Jumping the shark’ – the moment a popular TV series is passed its peak
  18. 18. Jumping The Shark? <ul><li>Some responses: </li></ul><ul><ul><li>Web server software (data from Netcraft) </li></ul></ul><ul><ul><li>Have you predicted Apache’s demise? </li></ul></ul><ul><ul><li>Does the future lie with Microsoft? </li></ul></ul><ul><ul><li>What should we make of Google’s emergence? </li></ul></ul>We need to be able to spot and prepare responses to trends. But let’s not use trends to reinforce prejudices?
  19. 19. The Web 2.0 Picture <ul><li>Gartner hyper curve </li></ul>Rising expectations Trough of despair Enterprise software Large budgets … Early adopters Service plateau <ul><li>Chasm </li></ul><ul><li>Failure to go beyond developers & early adopters (cf Gopher) </li></ul><ul><li>Need for: </li></ul><ul><ul><li>Advocacy </li></ul></ul><ul><ul><li>Listening to users </li></ul></ul><ul><ul><li>Learning from experiences </li></ul></ul><ul><ul><li>Addressing concerns </li></ul></ul><ul><ul><li>Deployment strategies </li></ul></ul><ul><ul><li>… </li></ul></ul>We need to look at ways of jumping the chasm, minimising inflated expectations & avoiding despair VLE CMS PLE Web 2 Web 2.0
  20. 20. Challenges of Web 2.0 <ul><li>What Is Web 2.0? </li></ul><ul><li>Marketing term (derived from observing 'patterns') rather than technical standards - “an attitude not a technology” </li></ul>Web2MemeMap, Tim O’Reilly, 2005 <ul><li>Characteristics Of Web 2.0 </li></ul><ul><ul><li>Network as platform </li></ul></ul><ul><ul><li>Always beta </li></ul></ul><ul><ul><li>Clean URIs </li></ul></ul><ul><ul><li>Remix and mash-ups </li></ul></ul><ul><ul><ul><li>Syndication (RSS) </li></ul></ul></ul><ul><ul><li>Architecture of participation </li></ul></ul><ul><ul><ul><li>Blogs & Wikis </li></ul></ul></ul><ul><ul><ul><li>Social networking </li></ul></ul></ul><ul><ul><ul><li>Social tagging (folksonomies) </li></ul></ul></ul><ul><ul><li>Trust and openness </li></ul></ul>Web 2.0
  21. 21. Sustainability Problems <ul><li>Web 2.0 </li></ul><ul><ul><li>It’s another bubble </li></ul></ul><ul><ul><li>The companies aren’t sustainable </li></ul></ul><ul><li>Initial Response </li></ul><ul><li>What’s the odd one out: </li></ul><ul><ul><li>UMIST • Lotus </li></ul></ul><ul><ul><li>WebCT • Yahoo! </li></ul></ul>Network as Platform
  22. 22. Sustainability Problems <ul><li>Web 2.0 </li></ul><ul><ul><li>It’s another bubble </li></ul></ul><ul><ul><li>The companies aren’t sustainable </li></ul></ul><ul><li>Initial Response </li></ul><ul><li>What’s the odd one out: </li></ul><ul><ul><li>UMIST • Lotus </li></ul></ul><ul><ul><li>WebCT • Yahoo! </li></ul></ul><ul><li>Answer: </li></ul><ul><ul><li>UMIST was taken over by Manchester University </li></ul></ul><ul><ul><li>Lotus was taken over by IBM </li></ul></ul><ul><ul><li>WebCT as taken over by Blackboard </li></ul></ul><ul><ul><li>Yahoo! hasn’t been taken over (yet) </li></ul></ul>Lesson: IT companies and public sector institutions may also not be sustainable. This is not a new issues Network as Platform
  23. 23. Slideshare Example <ul><li>I use Slideshare to (a) maximise exposure to my ideas (b) solicit feedback (c) allow content to be easily embedded elsewhere and (d) measure impact </li></ul>Network as Platform Note evidence which shows impact of presentation. This wouldn’t have happened otherwise
  24. 24. Slideshare Example (2) <ul><li>What happens if Slideshare goes down – and it has happened! </li></ul><ul><li>Does this demonstrate that you can’t trust externally-hosted services? </li></ul>
  25. 25. Slideshare Example (2) <ul><li>What happens if Slideshare goes down – and it has happened! </li></ul><ul><li>Does this demonstrate that you can’t trust externally-hosted services? </li></ul>But local services also go down – as this example from the Open University shows
  26. 26. Slideshare Example (2) <ul><li>What happens if Slideshare goes down – and it has happened! </li></ul><ul><li>Does this demonstrate that you can’t trust externally-hosted services? </li></ul>But local services also go down – as this example from the Open University shows And note prompt response from Slideshare
  27. 27. Performance Problems <ul><li>It’s not just Slideshare & the OU: downtime, DOS attacks, … can happen to all services </li></ul><ul><li>We need to understand reasons why: </li></ul><ul><ul><li>Skype unavailable (Microsoft OS upgrades) </li></ul></ul><ul><ul><li>BUCS air conditioning failure </li></ul></ul><ul><li>And explore ways of (a) identifying problems and (b) minimising risks </li></ul>Can we really think that problems will only happen ‘out there’ and that our servers will be available 24x7x365?
  28. 28. Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft server uptime statistics </li></ul></ul>
  29. 29. Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft server uptime statistics </li></ul></ul><ul><ul><li>whois++ service (partly available via Google – see Phil Bradley’s post) </li></ul></ul>Network as Platform
  30. 30. Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft server uptime statistics </li></ul></ul><ul><ul><li>whois++ service (partly available via Google – see Phil Bradley’s post) </li></ul></ul><ul><ul><li>Company profiles, statistics, etc. from Techcrunch, Wikipedia, etc </li></ul></ul>
  31. 31. Spotting Possible Problems <ul><li>Are there ways of spotting potentially flaky services? </li></ul><ul><ul><li>Netcraft server uptime statistics </li></ul></ul><ul><ul><li>whois++ service (partly available via Google – see Phil Bradley’s post) </li></ul></ul><ul><ul><li>Company profiles, statistics, etc. from Techcrunch, Wikipedia, etc </li></ul></ul>
  32. 32. It’s The Way We Use Services <ul><li>What do the following have in common? </li></ul><ul><ul><li>Paper • PDF </li></ul></ul><ul><ul><li>An iPhone (partly) • Facebook (partly) </li></ul></ul><ul><li>but not Twitter </li></ul>Network as Platform
  33. 33. It’s The Way We Use Services <ul><li>What do the following have in common? </li></ul><ul><ul><li>Paper • PDF </li></ul></ul><ul><ul><li>An iPhone (partly) • Facebook (partly) </li></ul></ul><ul><li>but not Twitter </li></ul><ul><li>Answers </li></ul><ul><li>They are all popular </li></ul><ul><li>We can regard them all as destinations rather than a part of a workflow </li></ul><ul><li>The data can: </li></ul><ul><ul><li>Be created there & not be usable elsewhere </li></ul></ul><ul><ul><li>Be created elsewhere and views there </li></ul></ul>Network as Platform
  34. 34. Accessibility and Web 2.0 <ul><li>Common response “It’s AJAX; it’s inaccessible” </li></ul><ul><li>But: </li></ul><ul><ul><li>Is this using accessibility as a way of stifling change? </li></ul></ul><ul><ul><li>Is assertion backed up by evidence? </li></ul></ul><ul><ul><li>Is it using WCAG 1.0 as ‘evidence’ of inaccessibility? </li></ul></ul><ul><li>Note: </li></ul><ul><ul><li>Acceptance of failures of WCAG 1.0 to response to innovation by WAI staff </li></ul></ul><ul><ul><li>WGAG 2.0 and ARIA </li></ul></ul><ul><li>W4A 2008 paper on “One Word, One Web .. But Great Diversity” </li></ul><ul><ul><li>Facebook as tool which users may choose (PLE) </li></ul></ul><ul><ul><li>Not providing podcasts may be the inaccessible option </li></ul></ul>Network as Platform
  35. 35. Avoiding Walled Gardens <ul><li>The dichotomy: </li></ul><ul><ul><li>Don’t use Facebook, it’s a walled-garden </li></ul></ul><ul><ul><li>Don’t use Slideshare, you might lose your data </li></ul></ul><ul><ul><li>Do use Facebook and Slideshare, it’s where the users are & they seem to like it </li></ul></ul><ul><li>A resolution: </li></ul><ul><ul><li>Have master copy in managed and reusable environment </li></ul></ul><ul><ul><li>Use remote service as an interface (possibly part of a user’s PLE or PRE) </li></ul></ul><ul><ul><li>Provide user education </li></ul></ul>Network as Platform
  36. 36. Slideshare Example <ul><li>I use Slideshare to (a) maximise exposure to my ideas (b) solicit feedback (c) allow content to be easily embedded elsewhere and (d) measure impact </li></ul>Network as Platform Note URI for master provided on slide & in the metadata And note accessibility benefits
  37. 37. Inappropriate User Content <ul><li>Potential problems: </li></ul><ul><ul><li>Spam: comment spam, link spam, twitter follower spam, tag spam, … </li></ul></ul><ul><ul><li>Flame wars </li></ul></ul><ul><ul><li>Illegal comments </li></ul></ul><ul><ul><li>Rude words </li></ul></ul><ul><ul><li>Uploading of pornography, etc </li></ul></ul>Openness and Trust Spam Akismet has protected your site from 195,127 spam comments. My blog: initially lots of spam comment - but most stopped by Akismet spam filter. And now only handful posted overnight
  38. 38. Uploading Dodgy Content <ul><li>Twitterers noticed: </li></ul><ul><ul><li>Porn videos posted to Educause blog on Sun 20 April  </li></ul></ul><ul><ul><li>Deleted a few hours later  </li></ul></ul><ul><li>Thoughts: </li></ul><ul><ul><li>Would email be allowed if released today? (most email is spam). </li></ul></ul><ul><ul><li>Need for rapid response to problems </li></ul></ul>Openness and Trust http://connect.educause.edu/blog
  39. 39. Why Social Networks? <ul><li>In the old days (eLib): </li></ul><ul><ul><li>Focus on standards & technical architectures </li></ul></ul><ul><ul><li>We new users would use our services (TINA) </li></ul></ul><ul><ul><li>Trust focussed on JISC, libraries & institutions </li></ul></ul><ul><li>We missed: </li></ul><ul><ul><li>Multiple providers of services, new business models, … </li></ul></ul><ul><ul><li>People as social beings </li></ul></ul><ul><ul><li>Trusting our users </li></ul></ul>Openness and Trust
  40. 40. What Can SNs Provide? <ul><li>Potential benefits of social software: </li></ul><ul><ul><li>Maximising impact </li></ul></ul><ul><ul><li>Engaging outside the institution/country </li></ul></ul><ul><ul><li>Maximising dialogue & feedback </li></ul></ul><ul><ul><li>Monitoring impact </li></ul></ul><ul><ul><li>No new software to learn: I use Flickr for family photos; why shouldn’t I use it for work/study? </li></ul></ul><ul><ul><li>Facebook is where I ‘hang out’. Can’t I get my reading lists there too? </li></ul></ul><ul><ul><li>When my colleagues bookmark a resource; tag a new resource; … I’ll be able to see it too </li></ul></ul><ul><ul><li>… </li></ul></ul>Social networks
  41. 41. Yes, Even Twitter! <ul><li>What can micro-blogging applications like Twitter provide? (surely waste of time?): </li></ul><ul><ul><li>The shared water-cooler moment </li></ul></ul><ul><ul><li>Team working </li></ul></ul><ul><ul><li>Instant help </li></ul></ul><ul><ul><li>Break from mundane work </li></ul></ul><ul><ul><li>Moan about trains </li></ul></ul><ul><ul><li>Share excitement about stuff that works </li></ul></ul><ul><ul><li>… </li></ul></ul>Social Networks But note it doesn’t have to be for everyone!
  42. 42. Information Overload <ul><li>What if we’re too open, sharing everything? </li></ul><ul><li>What if we’re too trusting, thinking every tweet is valuable? </li></ul><ul><li>Need for: </li></ul><ul><ul><li>Better understanding of role of tools, managing them, etc. </li></ul></ul><ul><ul><li>Confidence to ‘throw things away’ </li></ul></ul><ul><li>Surely this is nothing new? </li></ul>Openness and Trust
  43. 43. Key Questions (1) <ul><li>Big question for future isn’t whether we provide blogs, wikis, etc but how they are provided. </li></ul><ul><li>Do we: </li></ul><ul><ul><li>Build alternatives to Slideshare, YouTube, etc, in-house. We can be more responsive, we care about our users and we’re more reliable! </li></ul></ul><ul><ul><li>Just use the remote services – they’re better, more functional; and Web 2.0 sceptics are typically just looking after their own jobs! </li></ul></ul><ul><li>What do you think? </li></ul><ul><li>Which view are you more closely aligned with? </li></ul>Network as Platform
  44. 44. Key Questions (2) <ul><li>On social software: </li></ul><ul><ul><li>Does it have to be for everyone? </li></ul></ul><ul><ul><li>Who makes the decisions? </li></ul></ul><ul><ul><li>Who is responsible if things go wrong? </li></ul></ul><ul><ul><li>What’s the role of the institution in this: </li></ul></ul><ul><ul><ul><li>Provider of stable, reliable services to its members? </li></ul></ul></ul><ul><ul><ul><li>Temporary home for most, who will arrive with services (email address, photos, etc.) and will want to continue to use them at Uni and afterwards? </li></ul></ul></ul>
  45. 45. Questions <ul><li>Any questions </li></ul>Note further slides available addressing some of these issues
  46. 46. A Blended Approach <ul><li>We need: </li></ul><ul><ul><li>Mixed approach of in-house & external services </li></ul></ul><ul><ul><li>Information literacy (new media literacy, transliteracy) </li></ul></ul><ul><ul><li>Clearer understanding of our purposes </li></ul></ul><ul><ul><li>Sharing of experiences – successes & failures </li></ul></ul><ul><ul><li>Risk assessment and risk management strategies </li></ul></ul><ul><ul><li>Application of risk approaches to in-house services </li></ul></ul><ul><ul><li>… </li></ul></ul>Network as Platform
  47. 47. The Challenges <ul><li>Areas of concern: </li></ul><ul><ul><li>Institutional inertia, vested interests, power struggles, … </li></ul></ul><ul><ul><ul><li>Applicable for any significant change </li></ul></ul></ul><ul><ul><li>Sustainability, reliability, interoperability </li></ul></ul><ul><ul><ul><li>The technical challenges </li></ul></ul></ul><ul><ul><li>Privacy, copyright, … </li></ul></ul><ul><ul><ul><li>The ethical challenges </li></ul></ul></ul><ul><ul><li>Finding time, finding resources, expertise, … </li></ul></ul><ul><ul><ul><li>The deployment challenges </li></ul></ul></ul>See “ Web 2.0: Addressing the Barriers to Implementation in a Library Context ” for example of barriers in a Library context Deployment Challenges
  48. 48. Addressing The Concerns <ul><li>Some approaches to addressing these concerns: </li></ul><ul><ul><li>Risk assessment </li></ul></ul><ul><ul><li>Data migration </li></ul></ul><ul><ul><li>Being user-focussed </li></ul></ul><ul><ul><li>Institutional transformation </li></ul></ul><ul><ul><li>Working collaboratively </li></ul></ul><ul><ul><li>Guidelines for use of social networking services (e.g. Facebook) </li></ul></ul>Deployment Challenges
  49. 49. Risk Assessment (1) See “ Risk Assessment For Use Of Third Party Web 2.0 Services ” QA Focus briefing document User education User education Lack of interoperability … Automated monitoring Performance problems or unreliable service Non-critical use; testing of export, .... Likelihood of data loss. lack of export capabilities Data loss Use for non-critical services; have alternatives available ... Implications of sudden or gradual loss of service Loss of service (e.g. company bankrupt, closed down, ...) Management Assessment Risk
  50. 50. Risk Assessment (2)
  51. 51. University of Oxford
  52. 52. Risks Revisited <ul><li>Are these risks scary? </li></ul><ul><li>Remember to include: </li></ul><ul><ul><li>Risks of doing nothing </li></ul></ul><ul><ul><li>Risks associated with using existing services </li></ul></ul>Case Study Open Source Software can also fail to be sustainable. The ROADS software was developed in UK to support academic subject gateways – but is now no longer supported.
  53. 53. Transforming IT Services <ul><li>IT Services: </li></ul><ul><ul><li>They won’t let us innovate </li></ul></ul><ul><ul><li>They get in the way </li></ul></ul><ul><ul><li>They don’t understand learning </li></ul></ul><ul><li>Does this ring bells? </li></ul><ul><li>Tradition role of IT Services: </li></ul><ul><ul><li>Focus on managing in-house services </li></ul></ul><ul><ul><li>Prioritising scarce resources </li></ul></ul><ul><ul><li>Minimising variability in order to maximise benefits of support (“support software”) </li></ul></ul>Deployment Challenges
  54. 54. IT Services 2.0 <ul><li>IT Services 2.0: </li></ul><ul><ul><li>Term coined by Mark Sammons, Edinburgh Univ </li></ul></ul><ul><ul><li>Idea revisited in plenary talk at UCISA 2008 Management Conference (myself & Andy Powell) </li></ul></ul><ul><ul><li>Feedback from blogging IT Service managers </li></ul></ul><ul><li>IT Services 2.0 – ongoing definitions </li></ul><ul><ul><li>Happy with use of in-house & 3 rd party services </li></ul></ul><ul><ul><li>Encourages peer-support </li></ul></ul><ul><ul><li>Provides new media literacy </li></ul></ul><ul><ul><li>Has a risk management approach </li></ul></ul><ul><ul><li>Provides support in a era of richness of service </li></ul></ul>Overwhelming vote at UCISA 2008 not to ban social networking services. IT Services are transforming themselves – but what about academics? Deployment Challenges
  55. 55. Embracing 3 rd Party Services <ul><li>What will happen when student leave (as they do)? </li></ul><ul><li>Casey Leaver has documented experiences in migrating her blog from Warwick: </li></ul><ul><ul><li>The blog has been delete </li></ul></ul><ul><ul><li>Not all data could be migrated (pictures & comments are also lost) </li></ul></ul>Thoughts: institutional blogs aimed at staff; support provided for students using 3 rd party blogs
  56. 56. When Things Go Wrong <ul><li>What would happen if a 3 rd party service was taken over by a porn company? </li></ul><ul><li>It has happened to me! </li></ul>This embedded code (which converted RSS feed to HTML) changed to a porn Web cam! Deployment Challenges
  57. 57. The Incident (1) <ul><li>The Incident </li></ul><ul><ul><li>Email message received saying news page for workshop contained embedded Web cam </li></ul></ul><ul><li>What We Did </li></ul><ul><ul><li>Removed embedded code </li></ul></ul><ul><ul><li>Contacted company </li></ul></ul><ul><li>What We Found </li></ul><ul><ul><li>Company had failed to renew domain name (credit card had expired & administrator was on holiday) </li></ul></ul><ul><ul><li>Domain name grabbed by porn company – but retrieved within 24 hours </li></ul></ul>Deployment Challenges
  58. 58. The Incident (2) <ul><li>What We Had Already Done </li></ul><ul><ul><li>A Risk Assessment page had already been created, documenting use of 3 rd party services </li></ul></ul><ul><li>What We Learnt </li></ul><ul><ul><li>This was a records management issue </li></ul></ul><ul><ul><li>It’s not new – Microsoft failed to renew HotMail domain some time ago (also Australian Univ) </li></ul></ul><ul><ul><li>It could happen with our hosted domains (e.g. EU-funded projects) </li></ul></ul><ul><li>What We Concluded </li></ul><ul><ul><li>We need to share such experiences </li></ul></ul><ul><ul><li>We need to be able to switch off services quickly if problems occur </li></ul></ul><ul><ul><li>We need to manage our domain name subscriptions </li></ul></ul>Deployment Challenges
  59. 59. Risk Assessment <ul><li>Risk assessment summaries provided for events which embed 3 rd party services </li></ul><ul><li>Audit kept of incidents (1 to date) </li></ul>
  60. 60. Data Migration <ul><li>When useful information is stored on a 3 rd party wiki the data is copied to a managed environment </li></ul>
  61. 61. Transforming Ourselves <ul><li>It’s not just about institutional inertia & IT Services </li></ul><ul><li>What about: </li></ul><ul><ul><li>The academics who don’t care for change </li></ul></ul><ul><ul><li>The academics who jump on every new bandwagon </li></ul></ul><ul><ul><li>Those in between these extremes </li></ul></ul><ul><li>There’s a need: </li></ul><ul><ul><li>To ensure enthusiasts reflect on mistakes & lessons learnt </li></ul></ul><ul><ul><li>To recognise that e-learning (2.0) may not be for everyone </li></ul></ul>Deployment Challenges
  62. 62. Personal Audit <ul><li>Personal audit: </li></ul><ul><ul><li>There’s a need for responsible Web 2.0 enthusiasts to carry out their own risk audit </li></ul></ul><ul><li>Departmental audit: </li></ul><ul><ul><li>There’s a need for own risk audits for services used by others (cf. my events) </li></ul></ul><ul><li>Institutional audit: </li></ul><ul><ul><li>Should institutions (& funders) require self-assessment audits to protect their investment? </li></ul></ul>Deployment Challenges
  63. 63. Vision For The Future <ul><li>Where are we now? </li></ul><ul><ul><li>People are using externally-hosted Web 2.0 services </li></ul></ul><ul><ul><li>But some are unhappy with this </li></ul></ul><ul><li>Should we: </li></ul><ul><ul><li>Welcome the potential of Web 2.0 </li></ul></ul><ul><ul><li>Grudgingly accept that they will be used – but expect this to last for a short term </li></ul></ul><ul><ul><li>Attempt to ban or dissuade such usage </li></ul></ul>Deployment Challenges
  64. 64. Revisiting The IE (nee DNER) <ul><li>We had early visions for the JISC DNER </li></ul><ul><li>I subsequently developed my view for how the DNER might develop: </li></ul><ul><ul><li>Applications on the Web e.g. bookmarking (del.icio.us!) and word processing tools (Writely!) </li></ul></ul>
  65. 65. Web 2.0 As A DNER Development <ul><li>The DNER got a lot right: </li></ul><ul><ul><li>Networked services </li></ul></ul><ul><ul><li>Lightweight standards </li></ul></ul><ul><ul><li>Importance of RSS </li></ul></ul><ul><ul><li>Trust (in the funded institutions) </li></ul></ul><ul><li>What we missed, which Web 2.0 is providing: </li></ul><ul><ul><li>Commercial providers of services </li></ul></ul><ul><ul><li>New business models (we were Old Labour) </li></ul></ul><ul><ul><li>Lightweight development </li></ul></ul><ul><ul><li>User-generated content (we thought it would be the professionals) </li></ul></ul><ul><ul><li>Trust – in the individuals </li></ul></ul><ul><ul><li>The power of the network – services which get better as more people use them </li></ul></ul>Deployment Challenges
  66. 66. Why HE? Why Now? <ul><li>World is changing: </li></ul><ul><ul><li>Web 2.0, ubiquitous networks, mobile devices, declining prices, increasing functionality </li></ul></ul><ul><li>How should society respond to maximise potential? </li></ul><ul><ul><li>At school : starting point, but this will be protected a environment </li></ul></ul><ul><ul><li>At work : too late & employers will expect new media literate graduates </li></ul></ul><ul><ul><li>At university : ideal place for students to develop skills & ethical values for the digital citizen </li></ul></ul>Staff & students will use 3 rd party services in their social lives. They need their own risk assessment / management skills. Providing a 100% safe institutional environment will hinder this Deployment Challenges
  67. 67. Conclusions <ul><li>To conclude: </li></ul><ul><ul><li>E-Learning 2.0 and Web 2.0 are here and won’t go away </li></ul></ul><ul><ul><li>Institutions need to engage with Web 2.0 </li></ul></ul><ul><ul><li>There are many issues which need to be addressed </li></ul></ul><ul><ul><li>Solutions are available </li></ul></ul><ul><ul><li>Probably the most important is collaborative working with one’s peers </li></ul></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×