Context: Rationale: Web 2.0 applications are used in variety of services at QUT (BB, Virtual, Blogs, Mobile application ...) it’s useful for new students to know what’s technology is used in conducting those services.Audience: first-year international business students in Faculty of Business at QUT Aims: to introduce basic concepts, applications of Web 2.0 as well as its major types of risks Outcomes: students get to know what web 2.0 is for further adoption in their study and work + understand the hidden risks to be secure in the Web 2.0 environment
Give examples of some popular blogs (in education, in business)
Example: Wikipedia / Wiki in different context: workplace, academic institutions
Examples of RSS readers
To avoid risk need to have deep understanding of used applications, their strengths and weaknesses.
Transcript of "Inn530 ass2 7.6"
Nguyen, Song Huyen Chau, n7665288 Tran, Thi Ngoc Nhung, n7704119Image from http://nh121996.edublogs.org/files/2012/06/web20-2eas71n.jpg
Definitions Characteristics Key applications Major risksImage from http://4.bp.blogspot.com/-QE6FSEhJBeY/T1gaIKMjLDI/AAAAAAAAD3g/iV9UJbhVkfw/s1600/web2.jpg
“Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: build applications that harness network effects to get better the more people use them.” (O‟Reilly, 2006)Image from http://askatechteacher.files.wordpress.com/2011/12/web2postbubblebubbleboom.gif
Web 2.0 is defined as “a space that allowsanyone to create and share informationonline - a space forcollaboration, conversation, andinteraction; a space that is highlydynamic, flexible, and adaptable”. (Coombs , 2007) Image from http://pgrschoolofeducation.files.wordpress.com/2011/10/web2marketing.jpg
Image from http://yarikson.files.wordpress.com/2008/04/web-20-scheme.png
Image from http://simpleprocesses.files.wordpress.com/2009/09/web-1-0-and-web-2-02.jpg
Image from http://wemtech.wikispaces.com/file/view/web1vsweb2.png/101172389/web1vsweb2.png
Three basic characteristics: the freeing and innovative use of data the building of virtual applications by drawing from the present applications and data the participatory role of the user in whatever format the user wants to work or share. (Miller, 2006)Image from http://cf.ltkcdn.net/web-design/images/std/37992-400x300-Web20.jpg
A user-centred characteristic classification: Information sharing (e.g. documents and video) Grassroots mobilization (e.g. spreading news and opinions) Community building (e.g. meeting new friends, creating new services) (Kool & van Wamelen, 2008, cited in Chua, 2010) Image from http://www.jonathannicholas.com/wp-content/uploads/2008/09/social-networking.jpg
Seven categories of Web 2.0 applications Publishing Platforms Social Networking Sites Democratized Content Networks Virtual Networking Platforms Information Aggregators Edited Social News Platforms Content Distribution Sites (Kami Huyse, cited in McDermott, 2007) Image from http://www.connectioncafe.com/assets/blog-images/social-media-logos.jpg
The most popular tool-application areas associated with Web 2.0 include:blogs, wikis, RSS, podcasts and videocasts, mashups, social sharingservices, communication tools, social networks, folksomonies and tagging, andvirtual worlds. (Kelly, 2008) Image from http://pixelcoblog.com/wp-content/uploads/2009/02/icontexto-drink-web20.png
Blogs Wikis Tagging and social bookmarking Streaming media RSS (Really Simple Syndication) SNS (Social Networking Sites)(Adapted from Anderson, 2007; Harris, 2008) Image from http://www.prav-talks.com/wp-content/uploads/2011/11/web-2-sites.jpg
“The term web-log, or blog, refers to a simple webpage consistingof brief paragraphs of opinion, information, personal diaryentries, or links, called posts, arranged chronologically with themost recent first, in the style of an online journal (Doctorow etal., 2002). (Anderson, 2007, p.7) Image from http://kathybackus.files.wordpress.com/2011/08/blog-2.jpg
“A wiki is a webpage or set of webpages that can be easily edited byanyone who is allowed access” (Ebersbach et al., 2006, cited in Anderson, 2007, p.8) Image from http://uwstoutinnovations.wikispaces.com/file/view/wiki.gif/81914965/484x335/wiki.gif
“A tag is a keyword that is added to a digital object to describe it, butnot as part of a formal classification system.”Social bookmarking systems allow users tocreate lists of „bookmarks‟ or„favorites‟, to store these centrally on aremote service and to share them withother users of the system. (Anderson, 2007, p.9)Image from http://batya150.files.wordpress.com/2011/09/free-social-media-iconset-price-tag-style.jpg
“Podcasts are audio recordings, usually in MP3 format, oftalks, interviews and lectures, which can be played either on adesktop computer or on a wide range of handheld MP3 devices.” (Anderson, 2007, p.10) Image from http://www.indiana.edu/~icy/images/itunes_podcast_icon.jpg
RSS is a family of formats which allow users to find out about updates to the content of RSS-enabled websites, blogs or podcasts without actually having to go and visit the site.” (Anderson, 2007, p.10)Image from http://www.deviantart.com/download/51752520/Transparent_PNG_RSS_logo_by_TarnicDotCom.png
“Professional and social networkingsites that facilitate meetingpeople, finding like minds, sharingcontent—uses ideas fromharnessing the power of thecrowd, network effect andindividual production/usergenerated content.” (Anderson, 2007, p.13) Image from http://snowkiwi.com/wordpress/wp-content/uploads/2012/05/sns10_1.jpg
Aggregation services Data mash-ups„ Tracking and filtering content Collaborating (Anderson, 2007)Image from http://img.scoop.it/6baiker4xkR_1_BwxKnp-Tl72eJkfbmt4t8yenImKBVaiQDB_Rd1H6kmuBWtceBJ
Aggregation services gatherinformation from diverse sourcesacross the Web and publish in oneplace (e.g. Google) (Anderson, 2007) Image from http://diversegy.com/img/aggregation_img.jpg
“Web services that pull together data from different sources to create anew service (i.e. aggregation and recombination). “ (Anderson, 2007) Image from http://www.lgeoresearch.com/img/MashupHandshake.jpg
“Services that keep track of, filter, analyse and allow search of the growing amounts of Web 2.0 content from blogs, multimedia sharing services etc.” (Anderson, 2007, p.13)Image from http://t2.gstatic.com/images?q=tbn:ANd9GcRc1ly-Ow6Jx0qoSee5gLp6Bkg59zGamz2lpcr-lDEbFDf1wxu- 6h9TmSjl
Collaborative reference works (like Wikipedia) that are built using wiki-like software tools. Uses ideas from harnessing the power of the crowd and architecture of participation.” (Anderson, 2007)Image from http://www1.imperial.ac.uk/resources/C3DBF366-7292-40EF-8D5E-63D292701E2F/global_collaboration.jpg
Security risks Social risks Image from http://www.tina-george.com/wp-content/uploads/2011/12/risks.jpg
Media, marketing and the lack of control Web 2.0 = More content, Less control, More uncertainly Data privacy Web 2.0 = a Personal Data Explosion (Bartkiewicz, 2008, p.17 & 23) Image fromhttp://www.artistsvalley.com/images/icons/Network%20Security%20Icons%20Var/Hyperlink%20Security%20Risk/256x25 6/Hyperlink%20Security%20Risk.jpg
“Many of the Web 2.0 applications contain no provision for monitoring content or traffic to ensure that sensitive information is not being transmitted inappropriately.” (Cunningham, 2009)Image from http://t0.gstatic.com/images?q=tbn:ANd9GcSwJR2DsolE-IaQbj0iGqeEw8j42fYYKX1aDsceJU7k61VASNN80Q
SOCIAL FREELOADERS SOCIAL “A” LISTERS SOCIAL NON-TRANSPARENCY SOCIAL GOSSIP SOCIAL DEVIANCY (Bogatin, 2006) Image from http://k02.kn3.net/6F91E571B.jpg
Loss of information Release of confidential information Disreputable behaviour Public negative comments Accessibility Lack of engagement (Briggs, 2008)Image from http://www.dunwebcarts.com/images/OSC/risk-icon.jpg
Image from http://www.wiikno.com/wp/wp-content/uploads/2009/05/people-jumping-web.gif
Image from http://3.bp.blogspot.com/-9UXgxLiQ27w/T32vuRN4jCI/AAAAAAAAATk/10jhQWOMDbU/s1600/thank-
Anderson, P. (2007) What is web 2.0? ideas, technologies and implications for education. JISC Technology and Standards Watch. Retrieved from http://www.jisc.ac.uk/media/documents/techwatch/tsw0701b.pdf Bartkiewicz, 2008. http://assets.en.oreilly.com/1/event/16/The%20Emerging%20Business%20Risks%20of%20 Web%202_0%20Models%20Presentation.pdf Bogatin, D. (2006). Web 2.0: Top five social risks list. Retrieved from http://www.zdnet.com/blog/micro-markets/web-20-top-five-social-risks-list/288 Briggs, D. (2008). The risks and opportunities of web 2.0. Retrieved from http://www.slideshare.net/davebriggs/risk-opportunities-of-web-20 Chua, A.Y.K. (2010). A study of Web 2.0 applications in library websites. Library & information science research, 32 (3), 203.
Coombs, K.A. (2007). Building a library web site on the pillars of Web 2.0. Computers in Libraries, 27 (1), 16-19. Cunningham, P. (2009). Web 2.0: Issues & risks. Information Management Journal, 43(1), 28. Retrieved from http://web.ebscohost.com.ezp01.library.qut.edu.au/ehost/pdfviewer/pdfviewer?sid=6 98fd342-3627-44a0-92d5-dd0426b36b5d%40sessionmgr114&vid=2&hid=113 Doctorow, C., Dornfest, F., Johnson, J. Scott, Powers, S. (2002). Essential Blogging. O‟Reilly. Ebersbach, A., Glaser, M., Heigl, R. 2006. Wiki: Web Collaboration. Springer-Verlag: Germany. Harris, C. (2008). WEB 2.0. Canadian Underwriter, 75(2), 10. Retrieved from http://search.proquest.com.ezp01.library.qut.edu.au/docview/224940145/fulltextPDF ?accountid=13380 Laningham, S (ed.) 2006. Tim Berners-Lee. Podcast, developerWorks Interviews, 22nd August, IBM website. Available online at: http://www- 128.ibm.com/developerworks/podcast/ [last accessed 17/01/07].
Lawton, G. (2007). Web 2.0 creates security challenges. Computer, 40(10), 13-16. doi:10.1109/MC.2007.367 McDermott, I. E. (2007). All A-Twitter about Web 2.0: What does it offer libraries?. Searcher, 15(9), 34−39. O ‟Reilly, T. (2006). Web 2.0 Compact Definition: Trying Again. Retrieved from http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html O ‟Reilly, T. (2007). What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communication & Strategies 65(1), 17-37. Retrieved from http://mpra.ub.uni-muenchen.de/4578/
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.