SlideShare une entreprise Scribd logo
1  sur  19
Web 2.0: Managing the Risks Chris Adie, Information Services, University of Edinburgh
Let’s all head for the promised land! 2.0
Clouds
What Risks? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reliability ,[object Object],[object Object]
Data Protection Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Biggest risk of all ,[object Object]
What should we do?
Formality spectrum Increasing institutional engagement Formality Magnifies Risk! Institutional adoption Topical adoption Recommend/ suggest Very informal
Very Informal Use ,[object Object],[object Object],[object Object],[object Object],[object Object],Institutional adoption Topical adoption Recommend/ suggest Very informal
Recommend/suggest ,[object Object],[object Object],Institutional adoption Topical adoption Recommend/ suggest Very informal
Topical adoption ,[object Object],[object Object],[object Object],[object Object],Institutional adoption Topical adoption Recommend/ suggest Very informal
Institutional adoption ,[object Object],Institutional adoption Topical adoption Recommend/ suggest Very informal
Futures
Some trends ,[object Object],[object Object],[object Object]
What about Web 3.0? ,[object Object],[object Object],[object Object]
Over to you!

Contenu connexe

Tendances

Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
Marce Torres
 

Tendances (20)

SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillan
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Is your data on the cloud at risk?
Is your data on the cloud at risk?Is your data on the cloud at risk?
Is your data on the cloud at risk?
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Mhdscs2019 v049n03 010
Mhdscs2019 v049n03 010Mhdscs2019 v049n03 010
Mhdscs2019 v049n03 010
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
 
YOTG Munich - Sascha Theißen & Robert Misch - Holtzbrinck Publishing Group & ...
YOTG Munich - Sascha Theißen & Robert Misch - Holtzbrinck Publishing Group & ...YOTG Munich - Sascha Theißen & Robert Misch - Holtzbrinck Publishing Group & ...
YOTG Munich - Sascha Theißen & Robert Misch - Holtzbrinck Publishing Group & ...
 
Targeted  &  Persistent  Attacks  in  EU
Targeted  &  Persistent  Attacks  in  EU Targeted  &  Persistent  Attacks  in  EU
Targeted  &  Persistent  Attacks  in  EU
 

Similaire à Web 2.0: Managing the Risks

N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
Unified Communications Online
 

Similaire à Web 2.0: Managing the Risks (20)

Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 

Plus de Eduserv Foundation

Plus de Eduserv Foundation (16)

User-centric Research
User-centric ResearchUser-centric Research
User-centric Research
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-Science
 
News from the new coffeehouses
News from the new coffeehousesNews from the new coffeehouses
News from the new coffeehouses
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric Identity
 
Virtual World Watch - summary of Second Life Snapshots
Virtual World Watch - summary of Second Life SnapshotsVirtual World Watch - summary of Second Life Snapshots
Virtual World Watch - summary of Second Life Snapshots
 
Sausages, coffee, chicken and the web: Establishing new trust metrics for sch...
Sausages, coffee, chicken and the web: Establishing new trust metrics for sch...Sausages, coffee, chicken and the web: Establishing new trust metrics for sch...
Sausages, coffee, chicken and the web: Establishing new trust metrics for sch...
 
Universities and social networking: making sense out of nonsense
Universities and social networking: making sense out of nonsenseUniversities and social networking: making sense out of nonsense
Universities and social networking: making sense out of nonsense
 
BBC 2.0 Years On
BBC 2.0 Years OnBBC 2.0 Years On
BBC 2.0 Years On
 
How Web 2.0 changed the Guardian
How Web 2.0 changed the GuardianHow Web 2.0 changed the Guardian
How Web 2.0 changed the Guardian
 
UKOLN Blogs and Social Networks workshop - all presentations
UKOLN Blogs and Social Networks workshop - all presentationsUKOLN Blogs and Social Networks workshop - all presentations
UKOLN Blogs and Social Networks workshop - all presentations
 
OpenIDand User-Centric Identity: It’s All About Me
OpenIDand User-Centric Identity: It’s All About MeOpenIDand User-Centric Identity: It’s All About Me
OpenIDand User-Centric Identity: It’s All About Me
 
OpenID and eLearning
OpenID and eLearningOpenID and eLearning
OpenID and eLearning
 
Virtual worlds in context
Virtual worlds in contextVirtual worlds in context
Virtual worlds in context
 
Holyrood Park: a virtual campus for Edinburgh
Holyrood Park: a virtual campus for EdinburghHolyrood Park: a virtual campus for Edinburgh
Holyrood Park: a virtual campus for Edinburgh
 
Second Nature - Nature Publishing Group In Second Life
Second Nature - Nature Publishing Group In Second LifeSecond Nature - Nature Publishing Group In Second Life
Second Nature - Nature Publishing Group In Second Life
 
SEAL - Second Environment, Advanced Learning
SEAL - Second Environment, Advanced LearningSEAL - Second Environment, Advanced Learning
SEAL - Second Environment, Advanced Learning
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Web 2.0: Managing the Risks