This document provides an overview of topics to be covered in a week of an online course on Web 2.0 and online communities, including privacy, terms, and identity management. It outlines the schedule for the week, noting sessions on privacy, terms and conditions, social plugins, and a special session. It also lists assignment deadlines and details the requirements for an assignment evaluating an online conference session. The document then covers issues relating to privacy policies, terms of service, types of user data collected, and challenges managing identity across multiple online accounts and services.
Web 1.0 was an early stage evolution focused on how users could connect to the web through the user interface. Web 2.0 emerged around 2004 and focused mainly on interactivity and collaboration through social media; it too has peaked.
Through the evolution of smart phones and the ongoing improvement of technology, Web 3.0 offers more solutions for browsing and enables consumers to browse application data from anywhere in the world.
Hassan Bawab will share how Web 3.0 started as merely a trend but is quickly becoming the standard.
Capitalizing on Web 3.0 requires providing a mobile experience to end-users. It also means more effective communication and ease of reach. Implementing a Web 3.0 strategy can ultimately lead to improved intelligence and customer engagement for organizations in any industry.
Web 1.0 was an early stage evolution focused on how users could connect to the web through the user interface. Web 2.0 emerged around 2004 and focused mainly on interactivity and collaboration through social media; it too has peaked.
Through the evolution of smart phones and the ongoing improvement of technology, Web 3.0 offers more solutions for browsing and enables consumers to browse application data from anywhere in the world.
Hassan Bawab will share how Web 3.0 started as merely a trend but is quickly becoming the standard.
Capitalizing on Web 3.0 requires providing a mobile experience to end-users. It also means more effective communication and ease of reach. Implementing a Web 3.0 strategy can ultimately lead to improved intelligence and customer engagement for organizations in any industry.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.helentheoharakis
Unpacking Pinterest looks at the Terms of Service users agree to by signing up for, and using, this online service.
This presentation was prepared as part of a university assessment (NETS5003 - Internet Power Politics, Semester 2, 2015, Curtin University).
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
JISC Legal examines the legal issues of using Web 2.0 and social networking in the UK higher and further education sectors. For more information please see: www.jisclegal.ac.uk.
A talk on the past, present, and future evolution of the Web -- Where it's headed and in particular, the Semantic Web, and where it fits.
If it doesn't load here on slideshare -- try viewing it at http://novaspivack.com
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.helentheoharakis
Unpacking Pinterest looks at the Terms of Service users agree to by signing up for, and using, this online service.
This presentation was prepared as part of a university assessment (NETS5003 - Internet Power Politics, Semester 2, 2015, Curtin University).
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
JISC Legal examines the legal issues of using Web 2.0 and social networking in the UK higher and further education sectors. For more information please see: www.jisclegal.ac.uk.
A talk on the past, present, and future evolution of the Web -- Where it's headed and in particular, the Semantic Web, and where it fits.
If it doesn't load here on slideshare -- try viewing it at http://novaspivack.com
Fyronic Seminar : Engaging with your stakeholders through Web 2.0, Social Media and Enterprise 2.0
Presented by : Franky Redant - Founder Fyronic, Consultant
A global Digital Magna Carta that lays the foundation for everyone’s access to internet is beneficial for trade and social exchange. Since internet is very accessible to all, privacy concerns for people and companies is important to protect. However, there will be exemptions to privacy concerns when technology increases the user experience and make it easier to use internet. Other cases of exemptions will be when it greatly benefit the functioning of society and such examples includes the health sector and the rescue services.
Personal metadata and the opportunities and challenges of working with social networking sites, presentation by N. Osborne, SUNCAT Assistant Project Officer, given at CIGS Web2.0 metadata and issues seminar, Fri 30 Jan, 2009.
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Nicola Osborne
Presentation given by Nicola Osborne at the CIGS (Cataloguing and Indexing Group Scotland) Web 2.0 Seminar 2009, held at the National Library of Scotland on Friday 30th January 2009
Keynote talk for VL/HCC 2018. I talk about why developers should care about privacy, what privacy is and why it is hard, some of our group's research in building better tools to help developers (in particular, Coconut IDE Plug-in and PrivacyStreams), and lastly some frameworks for thinking about privacy and developers.
SocialSafe is your business social media library.
SocialSafe creates a full archive of all your Facebook, Facebook Pages, Twitter, LinkedIn, Google+, Blogs, Instagram, Pinterest social media posts, interactions and followers, to meet your legal compliance needs.
In addition SocialSafe provides excellent capabilities to support engagement monitoring across your social media use with Search, Insights and more.
As social media use increases throughout your organisation SocialSafe is THE cost-effective tool to support both regulatory compliance and engagement monitoring.
Online: The rise and rise (CIMCIG presentation, February 2009)pwcom.co.uk Ltd
Presentation to CIMCIG conference, Building Centre, London on 11 February 2009 by Paul Wilkinson. Looks at potential importance of Web 2.0 as part of the PR/marketing communications mix for construction businesses - particularly in a recession
A brief overview of four major social networks (Facebook, Twitter, YouTube and Flickr). Presented to the Lawrence Chamber of Commerce on February 10, 2010.
Today we examined the controversial term "gamification". We also discussed how business use techniques to try motivate, inspire loyalty and engage users.
We took a closer look at elevator pitches in preparation for next week. We also discussed a range of cloud-based tools to help collaboration, task and file management.
This class looks at the so-called "Deep" or "Hidden" Web, featuring databases, search engines, metadata, and some issues to do with making your site accessible to humans and computers alike. This will be followed by a film about a young Iranian women Neda Agha-Soltan and her part in the Arab Spring.
In this class we examined copyright as it pertains to social media and user generated content. The second part of the class featured a guest speaker telling her story about the Christchurch earthquakes.
In this class we present a survey of social media types and some key services. We also discuss reasons for blogging and some provide some writing tips in preparation for your assignments.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
1. Web 2.0 & Online Communities, Summer School 2011
Day 10: Privacy, terms, & identity
2. This week (Week 4)
Tuesday (day 10):
– Privacy, terms & identity management
Wednesday (day 11):
– Social plugins & project work
Thursday (day 12):
– It’s Prajesh’s very own special day!
Miscellany:
– Wiki software upgraded
– Blog assignment 2 marks (same as last week)
– Blog assignment 3 due Friday (IRGO!)
– Project: Research almost done, page & content
started, user recruitment begun
2
4. Blog assignment 3 (4 th February by 5:00pm)
For the last blog assignment, students will be
required to go to at least one session of
the IRGO unConference 2.
Your task is to participate at a session of your
choice (check the programme for the full range
of topics) and then critique this session.
Please feel free to include other media such as
photos etc. of the session in question to augment
your writing.
Read the unConference programme for sessions
of interest and the FAQ page for answers to
common questions.
4
6. TOS and privacy policies
Provided by all community‐driven websites
– E.g., Facebook, Twitter, Ning, etc.
Governs collection, storage, transfer, usage, etc.
of user data by operators (services)
Sets expectations of behaviour and
responsibilities of both parties
Users agree to adhere to TOS and privacy policy
Lays out consequences of breaching TOS or
privacy guidelines
15. danah boyd says ...
“As social media become more embedded in
everyday society, the mismatch between the
rule‐based privacy that software offers and
the subtler, intuitive ways that humans
understand the concept will increasingly
cause cultural collisions and social slips.”
15
17. Facebook Like button
Used on 3rd party websites
Clicks send information to user’s profiles & to Facebook
Does not require click!
But what else: “... assemble a vast amount of data
about Internet users' browsing habits.”
Soon: ‘... for a brand or check in at a store could find
those actions appearing on their friends' pages as a
"Sponsored Story" paid for by advertisers.’
17
22. Time for you to get busy
Compare Facebook and Twitter privacy policies
and answer these questions:
1. Which privacy policy is easiest to locate?
2. Which is the most onerous and why?
3. Which (if any) appears to hold user’s interests as
paramount?
4. Which service do you trust more?
5. Anything in the policies that you find especially
troubling?
6. Are there any other privacy issues that these
services can’t control?
22
26. What do people do to manage accounts?
Use the same username/password for multiple
sites
Use their browser's ability to remember their
password (enabled by default)
Don't register for the new site
Don't ever log in to the site
Log in once, click "remember me"
Click the back button on their browser and never
come back to the site
Maintain a list of user IDs and passwords in an
offline document
26
27. Other more secure methods
Store account details in a “password vault”:
– On your PC (e.g., protected by fingerprint recognition)
– In a portable USB device, protected by a strong pass
phrase
– On a trustworthy online service, e.g., mashedlife.com
Login using an OpenID account where possible
Use popular online service (e.g., Facebook Connect,
Twitter OAuth, ...)
30. Facebook Connect
What happens?
– Login into 3rd party
websites
– Approve level of data
access between Facebook
and website
– See if your friends have
also connected to the
website
– Publish content to
Facebook through the
website
30