Inn530 ass2 7.6
Upcoming SlideShare
Loading in...5
×
 

Inn530 ass2 7.6

on

  • 625 views

 

Statistics

Views

Total Views
625
Views on SlideShare
625
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Context: Rationale: Web 2.0 applications are used in variety of services at QUT (BB, Virtual, Blogs, Mobile application ...) it’s useful for new students to know what’s technology is used in conducting those services.Audience: first-year international business students in Faculty of Business at QUT Aims: to introduce basic concepts, applications of Web 2.0 as well as its major types of risks Outcomes: students get to know what web 2.0 is for further adoption in their study and work + understand the hidden risks to be secure in the Web 2.0 environment
  • Give examples of some popular blogs (in education, in business)
  • Example: Wikipedia / Wiki in different context: workplace, academic institutions
  • Add vodcast
  • Examples of RSS readers
  • Examples of
  • Give examples
  • To avoid risk  need to have deep understanding of used applications, their strengths and weaknesses.

Inn530 ass2 7.6 Inn530 ass2 7.6 Presentation Transcript

  • Nguyen, Song Huyen Chau, n7665288 Tran, Thi Ngoc Nhung, n7704119Image from http://nh121996.edublogs.org/files/2012/06/web20-2eas71n.jpg
  • Definitions Characteristics Key applications Major risksImage from http://4.bp.blogspot.com/-QE6FSEhJBeY/T1gaIKMjLDI/AAAAAAAAD3g/iV9UJbhVkfw/s1600/web2.jpg
  • “Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: build applications that harness network effects to get better the more people use them.” (O‟Reilly, 2006)Image from http://askatechteacher.files.wordpress.com/2011/12/web2postbubblebubbleboom.gif
  • Web 2.0 is defined as “a space that allowsanyone to create and share informationonline - a space forcollaboration, conversation, andinteraction; a space that is highlydynamic, flexible, and adaptable”. (Coombs , 2007) Image from http://pgrschoolofeducation.files.wordpress.com/2011/10/web2marketing.jpg
  • Image from http://yarikson.files.wordpress.com/2008/04/web-20-scheme.png
  • Image from http://simpleprocesses.files.wordpress.com/2009/09/web-1-0-and-web-2-02.jpg
  • Image from http://wemtech.wikispaces.com/file/view/web1vsweb2.png/101172389/web1vsweb2.png
  • Three basic characteristics:  the freeing and innovative use of data  the building of virtual applications by drawing from the present applications and data  the participatory role of the user in whatever format the user wants to work or share. (Miller, 2006)Image from http://cf.ltkcdn.net/web-design/images/std/37992-400x300-Web20.jpg
  • A user-centred characteristic classification: Information sharing (e.g. documents and video) Grassroots mobilization (e.g. spreading news and opinions) Community building (e.g. meeting new friends, creating new services) (Kool & van Wamelen, 2008, cited in Chua, 2010) Image from http://www.jonathannicholas.com/wp-content/uploads/2008/09/social-networking.jpg
  • Seven categories of Web 2.0 applications Publishing Platforms Social Networking Sites Democratized Content Networks Virtual Networking Platforms Information Aggregators Edited Social News Platforms Content Distribution Sites (Kami Huyse, cited in McDermott, 2007) Image from http://www.connectioncafe.com/assets/blog-images/social-media-logos.jpg
  • The most popular tool-application areas associated with Web 2.0 include:blogs, wikis, RSS, podcasts and videocasts, mashups, social sharingservices, communication tools, social networks, folksomonies and tagging, andvirtual worlds. (Kelly, 2008) Image from http://pixelcoblog.com/wp-content/uploads/2009/02/icontexto-drink-web20.png
  •  Blogs Wikis Tagging and social bookmarking Streaming media RSS (Really Simple Syndication) SNS (Social Networking Sites)(Adapted from Anderson, 2007; Harris, 2008) Image from http://www.prav-talks.com/wp-content/uploads/2011/11/web-2-sites.jpg
  • “The term web-log, or blog, refers to a simple webpage consistingof brief paragraphs of opinion, information, personal diaryentries, or links, called posts, arranged chronologically with themost recent first, in the style of an online journal (Doctorow etal., 2002). (Anderson, 2007, p.7) Image from http://kathybackus.files.wordpress.com/2011/08/blog-2.jpg
  • “A wiki is a webpage or set of webpages that can be easily edited byanyone who is allowed access” (Ebersbach et al., 2006, cited in Anderson, 2007, p.8) Image from http://uwstoutinnovations.wikispaces.com/file/view/wiki.gif/81914965/484x335/wiki.gif
  • “A tag is a keyword that is added to a digital object to describe it, butnot as part of a formal classification system.”Social bookmarking systems allow users tocreate lists of „bookmarks‟ or„favorites‟, to store these centrally on aremote service and to share them withother users of the system. (Anderson, 2007, p.9)Image from http://batya150.files.wordpress.com/2011/09/free-social-media-iconset-price-tag-style.jpg
  • “Podcasts are audio recordings, usually in MP3 format, oftalks, interviews and lectures, which can be played either on adesktop computer or on a wide range of handheld MP3 devices.” (Anderson, 2007, p.10) Image from http://www.indiana.edu/~icy/images/itunes_podcast_icon.jpg
  • RSS is a family of formats which allow users to find out about updates to the content of RSS-enabled websites, blogs or podcasts without actually having to go and visit the site.” (Anderson, 2007, p.10)Image from http://www.deviantart.com/download/51752520/Transparent_PNG_RSS_logo_by_TarnicDotCom.png
  • “Professional and social networkingsites that facilitate meetingpeople, finding like minds, sharingcontent—uses ideas fromharnessing the power of thecrowd, network effect andindividual production/usergenerated content.” (Anderson, 2007, p.13) Image from http://snowkiwi.com/wordpress/wp-content/uploads/2012/05/sns10_1.jpg
  •  Aggregation services  Data mash-ups„  Tracking and filtering content  Collaborating (Anderson, 2007)Image from http://img.scoop.it/6baiker4xkR_1_BwxKnp-Tl72eJkfbmt4t8yenImKBVaiQDB_Rd1H6kmuBWtceBJ
  • Aggregation services gatherinformation from diverse sourcesacross the Web and publish in oneplace (e.g. Google) (Anderson, 2007) Image from http://diversegy.com/img/aggregation_img.jpg
  • “Web services that pull together data from different sources to create anew service (i.e. aggregation and recombination). “ (Anderson, 2007) Image from http://www.lgeoresearch.com/img/MashupHandshake.jpg
  • “Services that keep track of, filter, analyse and allow search of the growing amounts of Web 2.0 content from blogs, multimedia sharing services etc.” (Anderson, 2007, p.13)Image from http://t2.gstatic.com/images?q=tbn:ANd9GcRc1ly-Ow6Jx0qoSee5gLp6Bkg59zGamz2lpcr-lDEbFDf1wxu- 6h9TmSjl
  •  Collaborative reference works (like Wikipedia) that are built using wiki-like software tools.  Uses ideas from harnessing the power of the crowd and architecture of participation.” (Anderson, 2007)Image from http://www1.imperial.ac.uk/resources/C3DBF366-7292-40EF-8D5E-63D292701E2F/global_collaboration.jpg
  •  Security risks Social risks Image from http://www.tina-george.com/wp-content/uploads/2011/12/risks.jpg
  •  Media, marketing and the lack of control Web 2.0 = More content, Less control, More uncertainly  Data privacy Web 2.0 = a Personal Data Explosion (Bartkiewicz, 2008, p.17 & 23) Image fromhttp://www.artistsvalley.com/images/icons/Network%20Security%20Icons%20Var/Hyperlink%20Security%20Risk/256x25 6/Hyperlink%20Security%20Risk.jpg
  • “Many of the Web 2.0 applications contain no provision for monitoring content or traffic to ensure that sensitive information is not being transmitted inappropriately.” (Cunningham, 2009)Image from http://t0.gstatic.com/images?q=tbn:ANd9GcSwJR2DsolE-IaQbj0iGqeEw8j42fYYKX1aDsceJU7k61VASNN80Q
  •  SOCIAL FREELOADERS SOCIAL “A” LISTERS SOCIAL NON-TRANSPARENCY SOCIAL GOSSIP SOCIAL DEVIANCY (Bogatin, 2006) Image from http://k02.kn3.net/6F91E571B.jpg
  •  Loss of information  Release of confidential information  Disreputable behaviour  Public negative comments  Accessibility  Lack of engagement (Briggs, 2008)Image from http://www.dunwebcarts.com/images/OSC/risk-icon.jpg
  • Image from http://www.wiikno.com/wp/wp-content/uploads/2009/05/people-jumping-web.gif
  • Image from http://3.bp.blogspot.com/-9UXgxLiQ27w/T32vuRN4jCI/AAAAAAAAATk/10jhQWOMDbU/s1600/thank-
  •  Anderson, P. (2007) What is web 2.0? ideas, technologies and implications for education. JISC Technology and Standards Watch. Retrieved from http://www.jisc.ac.uk/media/documents/techwatch/tsw0701b.pdf Bartkiewicz, 2008. http://assets.en.oreilly.com/1/event/16/The%20Emerging%20Business%20Risks%20of%20 Web%202_0%20Models%20Presentation.pdf Bogatin, D. (2006). Web 2.0: Top five social risks list. Retrieved from http://www.zdnet.com/blog/micro-markets/web-20-top-five-social-risks-list/288 Briggs, D. (2008). The risks and opportunities of web 2.0. Retrieved from http://www.slideshare.net/davebriggs/risk-opportunities-of-web-20 Chua, A.Y.K. (2010). A study of Web 2.0 applications in library websites. Library & information science research, 32 (3), 203.
  •  Coombs, K.A. (2007). Building a library web site on the pillars of Web 2.0. Computers in Libraries, 27 (1), 16-19. Cunningham, P. (2009). Web 2.0: Issues & risks. Information Management Journal, 43(1), 28. Retrieved from http://web.ebscohost.com.ezp01.library.qut.edu.au/ehost/pdfviewer/pdfviewer?sid=6 98fd342-3627-44a0-92d5-dd0426b36b5d%40sessionmgr114&vid=2&hid=113 Doctorow, C., Dornfest, F., Johnson, J. Scott, Powers, S. (2002). Essential Blogging. O‟Reilly. Ebersbach, A., Glaser, M., Heigl, R. 2006. Wiki: Web Collaboration. Springer-Verlag: Germany. Harris, C. (2008). WEB 2.0. Canadian Underwriter, 75(2), 10. Retrieved from http://search.proquest.com.ezp01.library.qut.edu.au/docview/224940145/fulltextPDF ?accountid=13380 Laningham, S (ed.) 2006. Tim Berners-Lee. Podcast, developerWorks Interviews, 22nd August, IBM website. Available online at: http://www- 128.ibm.com/developerworks/podcast/ [last accessed 17/01/07].
  •  Lawton, G. (2007). Web 2.0 creates security challenges. Computer, 40(10), 13-16. doi:10.1109/MC.2007.367 McDermott, I. E. (2007). All A-Twitter about Web 2.0: What does it offer libraries?. Searcher, 15(9), 34−39. O ‟Reilly, T. (2006). Web 2.0 Compact Definition: Trying Again. Retrieved from http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html O ‟Reilly, T. (2007). What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communication & Strategies 65(1), 17-37. Retrieved from http://mpra.ub.uni-muenchen.de/4578/