Social Media & Företag

774 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
774
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Me & My PowerBook from Brian Lane Winfield Moore cc by sa
  • 11-23-17 from code poet cc by nc sa
  • Torsdag 3 februari
  • Chinese chess from whitecat singapore cc by nc
  • Home Computer (by unknown) from Stijn Vogels cc by nc sa
  • Habermas om Informationssystem 24 november 2004 Mathias Klang <klang@informatik.gu.se>
  • O’Reilly: What is web2.0 (2005) http://oreilly.com/web2/archive/what-is-web-20.html
  • Google automatically scans e-mails to add context-sensitive advertisements to them. Privacy advocates raised concerns that the plan involved scanning their personal, assumed private, e-mails, and that this was a security problem. Allowing e-mail content to be read, even by a computer, raises the risk that the expectation of privacy in e-mail will be reduced. Furthermore, e-mail that non-subscribers choose to send to Gmail accounts is scanned by Gmail as well, even though those senders never agreed to Gmail's terms of service or privacy policy. Google can change its privacy policy unilaterally and Google is technically able to cross-reference cookies across its information-rich product line to make dossiers on individuals. However, most e-mail systems make use of server-side content scanning in order to check for spam . [41] [42] Privacy advocates also regard the lack of disclosed data retention and correlation policies as problematic. Google has the ability to combine information contained in a person's e-mail messages with information from Internet searches. Google has not confirmed how long such information is kept or how it can be used. One of the concerns is that it could be of interest to law enforcement agencies. More than 30 privacy and civil liberties organizations have urged Google to suspend Gmail service until these issues are resolved. [43] Gmail's privacy policy contains the clause: "residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems". Google points out that Gmail adheres to most industry-wide practices. Google has stated that they will "make reasonable efforts to remove deleted information from our systems as quickly as is practical." [44] [45] Google defends its position by citing their use of email-scanning to the user's benefit. Google states that Gmail refrains from displaying ads next to potentially sensitive messages such as those that mention tragedy, catastrophe, or death. [4 Monday, February 7, 2011 Mathias Klang klang@ituniv.se
  • Consumer Watchdogs Flog Google's Privacy Policy (2008) http://techdailydose.nationaljournal.com/2008/06/consumer-watchdogs-flog-google.php Google originally placed a cookie on each registered user's computer, which can be used to track that person's search history, and that cookie was not set to expire until 2038 . [12] As of 2007, Google's cookie now expires in two years but renews itself when a Google service is used. [12] There is no evidence that Google turns over information to the FBI or the NSA , though some users remain anxious about the possibility. [12] In response, Google claims cookies are necessary to maintain user preferences between sessions and offer other search features. Other popular search engines, such as Yahoo! Search and Microsoft 's Bing , use cookies with distant expiration dates as well. Privacy International has raised concerns regarding the dangers and privacy implications of having a centrally-located, widely popular data warehouse of millions of Internet users' searches, and how under controversial existing U.S. law, Google can be forced to hand over all such information to the U.S. government [13] . In early 2005, the United States Department of Justice filed a motion in federal court to force Google to comply with a subpoena for, "the text of each search string entered onto Google's search engine over a one-week period (absent any information identifying the person who entered such query)." [14] Google fought the subpoena, due to concerns about users' privacy. [15] In March 2006, the court ruled partially in Google's favor, recognizing the privacy implications of turning over search terms and refusing to grant access. [16] Steve Ballmer [17] , Liz Figueroa [18] , Mark Rasch [19] , and the editors of Google Watch [20] believe the processing of email message content by Google's Gmail service goes beyond proper use. Google claims that mail sent to or from Gmail is never read by a human being beyond the account holder, and is only used to improve relevance of advertisements. [21] Whether Google is the only one doing this or simply the only one who publicly admits it is unknown, since the privacy policies of other popular email services, like Hotmail and Yahoo , allows for collection and utilizing of personal information for ads when using their services, but do not specify precisely what information and which services [22] [23] . Google's online map service, "Street View" has been accused of taking pictures and coming too close inside people's private homes and/or people who walk down the street not knowing they are being watched on Google's service. [24] [25] Aaron and Christine Boring, a Pittsburgh couple, sued Google for "invasion of privacy". They claimed that Street View made a photo of their home available online, and it diminished the value of their house, which was purchased for its privacy. [26] They lost their case in a Pennsylvania court. "While it is easy to imagine that many whose property appears on Google's virtual maps resent the privacy implications, it is hard to believe that any – other than the most exquisitely sensitive – would suffer shame or humiliation," Judge Hay ruled. [27] In its 2007 Consultation Report, Privacy International ranked Google as "Hostile to Privacy", its lowest rating on their report, making Google the only company in the list to receive that ranking. [28] [29] Carl Hewitt noted that intimate personal information is a "toxic asset" in Google datacenters because it will lead to government regulation "analogous to nuclear power plants," Consequently, he recommended that Google should perform semantic integration in clients' clouds so that client information in Google datacenters could be decrypted only by using a client's private key. [30] [ edit ] European Union European Union (EU) data protection officials (the Article 29 working party who advise the EU on privacy policy) have written to Google asking the company to justify its policy of keeping information on individuals’ internet searches for up to two years. The letter questioned whether Google has “fulfilled all the necessary requirements” on the EU laws concerning data protection. [31] The probe by the EU into the data protection issue, As of 24 May 2007 (2007 -05-24) [update] is continuing. On 1 June Google agreed that its privacy policy is vague, and that they are constantly working at making it clearer to users. [32] The resulting modifications to its privacy policies have been met with praise [33] . [ edit ] Norway The Data Inspectorate of Norway (Norway is not a member of the EU ) has investigated Google (and others) and has stated that the 18- to 24-month period for retaining data proposed by Google was too long. [34] Monday, February 7, 2011 Mathias Klang klang@ituniv.se
  • State of the Wiki 2009: http://wikimania2009.wikimedia.org/wiki/Proceedings:336
  • State of the Wiki 2009: http://wikimania2009.wikimedia.org/wiki/Proceedings:336
  • State of the Wiki 2009: http://wikimania2009.wikimedia.org/wiki/Proceedings:336 Some Wikipedias may already be shifting from encyclopedic core to more topical and current events content Source: Bridgespan analysis of data found at http://wikistics.falsikon.de/ (pulled August 2009)
  • 2nd Anoniversary from Anonymous9000 cc by
  • http://en.wikipedia.org/wiki/Pierre_Bourdieu
  • helli.(sh).ell ` ๑ ´ by Hadi Fooladi cc by nc sa
  • Iceberg from sweart cc by nc sa
  • http://sysomos.com/insidetwitter/engagement/
  • http://sysomos.com/insidetwitter/engagement/ Most Retweets Happen in the First Hour We discovered that 92.4% of all retweets happen within the first hour of the original tweet being published, while an additional 1.63% of retweets happen in the second hour, and 0.94% take place in the third hour. This means that if a tweet is not retweeted in the first hour, it is very likely that it will not be retweeted. The graph below shows the fraction of tweets from the second hour onwards - the x-axis shows the time in hours since the original tweet, while the vertical axis shows the fraction of retweets within a particular hour. The 92.4% of all retweets, which happen within the first hour, are not displayed in the chart. 1.63% of retweets happen in the second hour, and 0.94% take place in the third hour.
  • 065_365- Show us your smile! from dotbenjamin cc by sa
  • "United Breaks Guitars" is a song by Canadian musician David Carroll and his band, Sons of Maxwell. It chronicles a real-life experience of how his guitar was broken during a trip on United Airlines in 2008, and the subsequent reaction from the airline. The song became an immediate YouTube and ITMS hit upon its release in July 2009. http://en.wikipedia.org/wiki/United_Breaks_Guitars
  • anthony selonke vi from gsgeorge cc by nc
  • En anställd vid Karolinska universitetssjukhuset riskerar avsked sedan personen lagt ut bilder från kirurgiska ingrepp på internetnätverket Facebook.
  • Is your boss spying on you from topgold cc by
  • 153_365 - Digging in the dirt from Micah Taylor cc by nc sa
  • "OK cara, lo ammetto, ci siamo fatti un po' prendere la mano con questa storia del Viagra..." by ecatoncheires cc by nc sa
  • bad by brintam cc by nc
  • I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by nc sa
  • Social Media & Företag

    1. 1. Social Media & företag <ul><li>Mathias Klang </li></ul>
    2. 2. MEDIA: TILLGÅNG & KONTROL
    3. 5. 12 timmar senare
    4. 6. Strategi
    5. 7. VAD ÄR SOCIAL MEDIA?
    6. 9. TEKNIK kontrollerar hur och vad vi inteagerar, skapar & TÄNKER…
    7. 11. Lunarstormdecenniet 2000 2001 2002 2003 2005 2004 2006 Wikipedia Blogger 1999
    8. 12. 2000 2001 2002 2003 2005 2004 2006 Wikipedia Linkedin Blogger 1999 Second Life My Space Skype Google c:a 1998
    9. 13. 2000 2001 2002 2003 2005 2004 2006 Wikipedia Linkedin Blogger 1999 Second Life My Space Skype Digg Facebook YouTube Flickr Ning Google c:a 1998
    10. 14. Flickr 2000 2001 2002 2003 2005 2004 2006 Wikipedia Linkedin Blogger 1999 Second Life My Space Skype Digg Facebook Ning YouTube Twitter Spotify Google c:a 1998
    11. 15. Flickr 2000 2001 2002 2003 2005 2004 2006 Wikipedia Linkedin Blogger 1999 Second Life My Space Skype Digg Facebook Ning YouTube Twitter Spotify Google c:a 1998 2008 2007 2009 Farmville iphone Wikileaks
    12. 17. Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order of things.
    13. 18.
    14. 20. 2006 2007
    15. 21. EGENSKAPER
    16. 22. GRATIS <ul><li>“ If you are not paying for it, you're not the customer; you're the product being sold. ” </li></ul>
    17. 24. GRATIS? <ul><li>Sökmotor </li></ul><ul><li>Reader </li></ul><ul><li>Maps </li></ul><ul><li>Kalender </li></ul><ul><li>Scholar </li></ul><ul><li>Och mycket mer… </li></ul>
    18. 25. <ul><li>The Gmail service includes relevant advertising and related links based on the IP address, content of messages and other information related to your use of Gmail. </li></ul><ul><li>We provide advertisers only aggregated non-personal information such as the number of times one of their ads was clicked. We do not sell, rent or otherwise share your personal information with any third parties except in the limited circumstances described in the Google Privacy Policy , such as when we believe we are required to do so by law. </li></ul>
    19. 27. ANVÄNDARGENERERAD
    20. 28. INNEHÅLL
    21. 31. PROBLEM <ul><li>Guardian UK suggests that growth of Wikipedia may stall as “inclusionists” and “deletionists” fight for control, with “deletionists” </li></ul><ul><li>increasingly arguing for tightly-controlled and well-written encyclopedia articles that provide valuable information on topics of </li></ul><ul><li>widespread interest (e.g., Wikipedia is not a “junkyard”) </li></ul><ul><li>“ Wikilawyering” may be drowning out contributors with less Wikipedia experience </li></ul>
    22. 33. SANNING
    23. 35. NÄTVERK
    24. 36. PIERRE BOURDIEU <ul><li>&quot;social capital is the sum of the resources, actual or virtual, that accrue to an individual or a group by virtue of possessing a durable network of more or less institutionalized relationships of mutual acquaintance and recognition.&quot; </li></ul>
    25. 37. <ul><li>Social media…At its most basic sense, social media is a shift in how people discover, read and share news, information and content . It's a fusion of sociology and technology, transforming monologues (one to many) into dialogues (many to many) and is the democratization of information, transforming people from content readers into publishers. </li></ul><ul><li>(Wikipedia, maj 2009) </li></ul>
    26. 39. Dagens Media April 2010
    27. 40. Milgram SMALL WORLD THEORY
    28. 41. Six Degrees of Kevin Bacon
    29. 42. BETYDELSE
    30. 43. CHARLES KETTERING <ul><li>There is a great difference between knowing and understanding: you can know a lot about something and not really understand it. </li></ul>
    31. 46. MEM <ul><li>&quot;A unit of cultural inheritence, hypothesized as analogous to the particulate gene, and as naturally selected by virtue of its 'phenotypic' consequencies on its own survival and replication in the cultural environment&quot;. Richard Dawkins ( Den själviska genen 1976) </li></ul>
    32. 47. INTERNET MEM
    33. 48. KONTROL
    34. 49. INTERAKTION
    35. 53. ÅSIKTER
    36. 55. PERSONAL
    37. 56. MATS MÜGGE <ul><li>” Jättebra barnskötare - men texten är inte förenlig med vår verksamhet” </li></ul>
    38. 57. NAKEN REKTOR
    39. 59. Fotade & laddade upp bilder
    40. 60. Kommenterade bilderna
    41. 61. Tysta gruppen
    42. 63. VARFÖR TÄNKER VI INTE?
    43. 64.  GOOD EVIL 
    44. 65. VI ÄR DUMMA
    45. 66. VI ÄR TANKLÖSA
    46. 67. TILLBAKA TILL KONTROL? <ul><li>Hur kontrollerar man personalen? </li></ul>
    47. 68. TACK!
    48. 69. Information: Mathias Klang <ul><li>All images from/alla bilder från www.flickr.com (unless specifically stated), (om ej annat anges) </li></ul><ul><li>Image & licensing info in the notes section of slides/bild & licensinfo finns i anteckningsdelen för varje slide </li></ul><ul><li>Presentation licensed/Presentation licensierad under: Creative Commons BY-NC-SA </li></ul><ul><li>The presentation can be downloaded from/Presentationen kan laddas ner från: www.slideshare.net/klang </li></ul><ul><li>More information about me/för mer information om mig: www.techrisk.se & www.digital-rights.net </li></ul>

    ×