SlideShare une entreprise Scribd logo
1  sur  33
Nguyen, Song Huyen Chau, n7665288
               Tran, Thi Ngoc Nhung, n7704119




Image from http://nh121996.edublogs.org/files/2012/06/web20-2eas71n.jpg
Definitions


                                                Characteristics


                                                    Key applications


                                                        Major risks


Image from http://4.bp.blogspot.com/-QE6FSEhJBeY/T1gaIKMjLDI/AAAAAAAAD3g/iV9UJbhVkfw/s1600/web2.jpg
“Web 2.0 is the business revolution in the
                                   computer industry caused by the move to the
                                   internet as platform, and an attempt to
                                   understand the rules for success on that new
                                   platform. Chief among those rules is this:
                                   build     applications       that     harness       network
                                   effects to get better the more people use
                                   them.”
                                                                             (O‟Reilly, 2006)




Image from http://askatechteacher.files.wordpress.com/2011/12/web2postbubblebubbleboom.gif
Web 2.0 is defined as “a space that allows
anyone to create and share information
online   -     a    space      for      collaboration,
conversation, and interaction; a space that
is highly dynamic, flexible, and adaptable”.
                                    (Coombs , 2007)




             Image from http://pgrschoolofeducation.files.wordpress.com/2011/10/web2marketing.jpg
Image from http://yarikson.files.wordpress.com/2008/04/web-20-scheme.png
Image from http://simpleprocesses.files.wordpress.com/2009/09/web-1-0-and-web-2-02.jpg
Image from http://wemtech.wikispaces.com/file/view/web1vsweb2.png/101172389/web1vsweb2.png
Three basic characteristics:
                                        the freeing and innovative use of data
                                        the building of virtual applications by
                                         drawing from the present applications
                                         and data
                                        the participatory role of the user in
                                         whatever format the user wants to
                                         work or share.
                                                                          (Miller, 2006)




Image from http://cf.ltkcdn.net/web-design/images/std/37992-400x300-Web20.jpg
A user-centred characteristic classification:
   Information sharing (e.g. documents and video)
   Grassroots mobilization (e.g. spreading news and opinions)
   Community building (e.g. meeting new friends, creating new services)
                                           (Kool & van Wamelen, 2008, cited in Chua, 2010)




        Image from http://www.jonathannicholas.com/wp-content/uploads/2008/09/social-networking.jpg
Seven categories of Web 2.0 applications
   Publishing Platforms
   Social Networking Sites
   Democratized Content Networks
   Virtual Networking Platforms
   Information Aggregators
   Edited Social News Platforms
   Content Distribution Sites
                                            (Kami Huyse, cited in McDermott, 2007)




             Image from http://www.connectioncafe.com/assets/blog-images/social-media-logos.jpg
The most popular tool-application areas associated with Web 2.0 include:
blogs, wikis, RSS, podcasts and videocasts, mashups, social sharing services,
communication tools, social networks, folksomonies and tagging, and virtual
worlds.
                                                                                        (Kelly, 2008)




          Image from http://pixelcoblog.com/wp-content/uploads/2009/02/icontexto-drink-web20.png
 Blogs
 Wikis

 Tagging and social bookmarking

 Streaming media

 RSS (Really Simple Syndication)

 SNS (Social Networking Sites)

(Adapted from Anderson, 2007; Harris, 2008)




        Image from http://www.prav-talks.com/wp-content/uploads/2011/11/web-2-sites.jpg
“The term web-log, or blog, refers to a simple webpage consisting
of brief paragraphs of opinion, information, personal diary
entries, or links, called posts, arranged chronologically with the
most recent first, in the style of an online journal (Doctorow et
al., 2002).
                                                                 (Anderson, 2007, p.7)

              Image from http://kathybackus.files.wordpress.com/2011/08/blog-2.jpg
“A wiki is a webpage or set of webpages that can be easily edited by
anyone who is allowed access”
                    (Ebersbach et al., 2006, cited in Anderson, 2007, p.8)




 Image from http://uwstoutinnovations.wikispaces.com/file/view/wiki.gif/81914965/484x335/wiki.gif
“A tag is a keyword that is added to a digital object to describe it, but
not as part of a formal classification system.”

Social bookmarking systems allow users to
create lists of „bookmarks‟ or „favorites‟,
to store these centrally on a remote
service and to share them with other
users of the system.
                               (Anderson, 2007, p.9)




Image from http://batya150.files.wordpress.com/2011/09/free-social-media-iconset-price-tag-style.jpg
“Podcasts are audio recordings, usually in MP3 format, of talks,
interviews and lectures, which can be played either on a desktop
computer or on a wide range of handheld MP3 devices.”
                                                            (Anderson, 2007, p.10)




        Image from http://www.indiana.edu/~icy/images/itunes_podcast_icon.jpg
RSS is a family of formats which allow
                                          users to find out about updates to the
                                          content of RSS-enabled websites, blogs
                                          or podcasts without actually having to go
                                          and visit the site.”
                                                                  (Anderson, 2007, p.10)




Image from http://www.deviantart.com/download/51752520/Transparent_PNG_RSS_logo_by_TarnicDotCom.png
“Professional and social networking
sites     that       facilitate       meeting
people, finding like minds, sharing
content—uses               ideas           from
harnessing the power of the crowd,
network       effect       and      individual
production/user                    generated
content.”
                 (Anderson, 2007, p.13)




        Image from http://snowkiwi.com/wordpress/wp-content/uploads/2012/05/sns10_1.jpg
   Aggregation services
     Data 'mash-ups„
     Tracking and filtering content
     Collaborating
                              (Anderson, 2007)




Image from http://img.scoop.it/6baiker4xkR_1_BwxKnp-Tl72eJkfbmt4t8yenImKBVaiQDB_Rd1H6kmuBWtceBJ
Aggregation       services           gather
information from diverse sources
across the Web and publish in one
place (e.g. Google)
                      (Anderson, 2007)




                  Image from http://diversegy.com/img/aggregation_img.jpg
“Web services that pull together data from different sources to create a
new service (i.e. aggregation and recombination). “
                                                                        (Anderson, 2007)




              Image from http://www.lgeoresearch.com/img/MashupHandshake.jpg
“Services that keep track of, filter, analyse and allow search of the
  growing amounts of Web 2.0 content from blogs, multimedia sharing
  services etc.”
                                                                      (Anderson, 2007, p.13)




Image from http://t2.gstatic.com/images?q=tbn:ANd9GcRc1ly-Ow6Jx0qoSee5gLp6Bkg59zGamz2lpcr-lDEbFDf1wxu-
                                                 6h9TmSjl
   Collaborative      reference        works
         (like Wikipedia) that are built
         using wiki-like software tools.
        Uses ideas from harnessing the
         power      of     the      crowd       and
         architecture of participation.”
                             (Anderson, 2007)




Image from http://www1.imperial.ac.uk/resources/C3DBF366-7292-40EF-8D5E-63D292701E2F/global_collaboration.jpg
   Security risks
   Social risks




    Image from http://www.tina-george.com/wp-content/uploads/2011/12/risks.jpg
   Media, marketing and the lack of control
          Web 2.0 = More content, Less control, More uncertainly


         Data privacy
          Web 2.0 = a Personal Data Explosion


      (Bartkiewicz, 2008, p.17 & 23)




                                                     Image from
http://www.artistsvalley.com/images/icons/Network%20Security%20Icons%20Var/Hyperlink%20Security%20Risk/256x25
                                          6/Hyperlink%20Security%20Risk.jpg
“Many of the Web 2.0 applications contain no provision for monitoring
      content or traffic to ensure that sensitive information is not being
      transmitted inappropriately.”
                                                                          (Cunningham, 2009)




Image from http://t0.gstatic.com/images?q=tbn:ANd9GcSwJR2DsolE-IaQbj0iGqeEw8j42fYYKX1aDsceJU7k61VASNN80Q
   SOCIAL FREELOADERS
   SOCIAL “A” LISTERS
   SOCIAL NON-TRANSPARENCY
   SOCIAL GOSSIP
   SOCIAL DEVIANCY
                    (Bogatin, 2006)




                    Image from http://k02.kn3.net/6F91E571B.jpg
   Loss of information
                                  Release of confidential information
                                  Disreputable behaviour
                                  Public negative comments
                                  Accessibility
                                  Lack of engagement


                                                                 (Briggs, 2008)




Image from http://www.dunwebcarts.com/images/OSC/risk-icon.jpg
Image from http://www.wiikno.com/wp/wp-content/uploads/2009/05/people-jumping-web.gif
Image from http://3.bp.blogspot.com/-9UXgxLiQ27w/T32vuRN4jCI/AAAAAAAAATk/10jhQWOMDbU/s1600/thank-
   Anderson, P. (2007) What is web 2.0? ideas, technologies and implications for education.
    JISC Technology and Standards Watch. Retrieved from
    http://www.jisc.ac.uk/media/documents/techwatch/tsw0701b.pdf

   Bartkiewicz, 2008.
    http://assets.en.oreilly.com/1/event/16/The%20Emerging%20Business%20Risks%20of%20
    Web%202_0%20Models%20Presentation.pdf

   Bogatin, D. (2006). Web 2.0: Top five social risks list. Retrieved from
    http://www.zdnet.com/blog/micro-markets/web-20-top-five-social-risks-list/288

   Briggs, D. (2008). The risks and opportunities of web 2.0. Retrieved from
    http://www.slideshare.net/davebriggs/risk-opportunities-of-web-20

   Chua, A.Y.K. (2010). A study of Web 2.0 applications in library websites. Library &
    information science research, 32 (3), 203.
   Coombs, K.A. (2007). Building a library web site on the pillars of Web 2.0. Computers
    in Libraries, 27 (1), 16-19.

   Cunningham, P. (2009). Web 2.0: Issues & risks. Information Management Journal,
    43(1), 28. Retrieved from
    http://web.ebscohost.com.ezp01.library.qut.edu.au/ehost/pdfviewer/pdfviewer?sid=6
    98fd342-3627-44a0-92d5-dd0426b36b5d%40sessionmgr114&vid=2&hid=113

   Doctorow, C., Dornfest, F., Johnson, J. Scott, Powers, S. (2002). Essential Blogging.
    O‟Reilly.

   Ebersbach, A., Glaser, M., Heigl, R. 2006. Wiki: Web Collaboration. Springer-Verlag:
    Germany.

   Harris, C. (2008). WEB 2.0. Canadian Underwriter, 75(2), 10. Retrieved from
    http://search.proquest.com.ezp01.library.qut.edu.au/docview/224940145/fulltextPDF
    ?accountid=13380

   Laningham, S (ed.) 2006. Tim Berners-Lee. Podcast, developerWorks Interviews, 22nd
    August, IBM website. Available online at: http://www-
    128.ibm.com/developerworks/podcast/ [last accessed 17/01/07].
   Lawton, G. (2007). Web 2.0 creates security challenges. Computer, 40(10), 13-16.
    doi:10.1109/MC.2007.367


   McDermott, I. E. (2007). All A-Twitter about Web 2.0: What does it offer libraries?.
    Searcher, 15(9), 34−39.

   O ‟Reilly, T. (2006). Web 2.0 Compact Definition: Trying Again. Retrieved from
    http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html

   O ‟Reilly, T. (2007). What Is Web 2.0: Design Patterns and Business Models for the Next
    Generation of Software. Communication & Strategies 65(1), 17-37. Retrieved from
    http://mpra.ub.uni-muenchen.de/4578/

Contenu connexe

Tendances

Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
Ian Forrester
 
Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation
studentweb20
 

Tendances (20)

Web 2.0: Implications For The Cultural Heritage Sector
Web 2.0: Implications For The Cultural Heritage SectorWeb 2.0: Implications For The Cultural Heritage Sector
Web 2.0: Implications For The Cultural Heritage Sector
 
Web2 0 Ppt
Web2 0 PptWeb2 0 Ppt
Web2 0 Ppt
 
Document of presentation(web 3.0)(part 2)
Document of presentation(web 3.0)(part 2)Document of presentation(web 3.0)(part 2)
Document of presentation(web 3.0)(part 2)
 
Web2.0 2012 - lesson 2
Web2.0 2012 - lesson 2Web2.0 2012 - lesson 2
Web2.0 2012 - lesson 2
 
WEB 2.0
WEB 2.0WEB 2.0
WEB 2.0
 
Web 2.0 By Nyros Developer
Web 2.0 By Nyros DeveloperWeb 2.0 By Nyros Developer
Web 2.0 By Nyros Developer
 
PPT on Web 2.0
PPT on Web 2.0PPT on Web 2.0
PPT on Web 2.0
 
IBM Connections - Bridging the Gap (delivered at DanNotes, Nov 2011)
IBM Connections - Bridging the Gap (delivered at DanNotes, Nov 2011)IBM Connections - Bridging the Gap (delivered at DanNotes, Nov 2011)
IBM Connections - Bridging the Gap (delivered at DanNotes, Nov 2011)
 
Comparative study of web 1, Web 2 and Web 3
Comparative study of web 1, Web 2 and Web 3Comparative study of web 1, Web 2 and Web 3
Comparative study of web 1, Web 2 and Web 3
 
You Can Change the World (Wide Web)
You Can Change the World (Wide Web)You Can Change the World (Wide Web)
You Can Change the World (Wide Web)
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 
Web 2.0 Technical Paper - Ankur Batla, Akshat Gupta, Kumar Priyanshu
Web 2.0 Technical Paper - Ankur Batla, Akshat Gupta, Kumar PriyanshuWeb 2.0 Technical Paper - Ankur Batla, Akshat Gupta, Kumar Priyanshu
Web 2.0 Technical Paper - Ankur Batla, Akshat Gupta, Kumar Priyanshu
 
Web2.0 Basics
Web2.0 BasicsWeb2.0 Basics
Web2.0 Basics
 
Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation Collective Intelligence and Web 2.0 Presentation
Collective Intelligence and Web 2.0 Presentation
 
Presentation
PresentationPresentation
Presentation
 
Social Media Speaks Out - July 2014
Social Media Speaks Out - July 2014Social Media Speaks Out - July 2014
Social Media Speaks Out - July 2014
 
Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0Enhancing communication and cooperation with web 2.0
Enhancing communication and cooperation with web 2.0
 
Web 2.0, Web Social
Web 2.0, Web SocialWeb 2.0, Web Social
Web 2.0, Web Social
 
Web 2.0 MSC 2010
Web 2.0 MSC 2010Web 2.0 MSC 2010
Web 2.0 MSC 2010
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 

En vedette

Proquest education journals database
Proquest education journals databaseProquest education journals database
Proquest education journals database
sieuquayami
 
Bmgt 205 chapter_10
Bmgt 205 chapter_10Bmgt 205 chapter_10
Bmgt 205 chapter_10
Chris Lovett
 

En vedette (7)

Proquest education journals database
Proquest education journals databaseProquest education journals database
Proquest education journals database
 
Reporte de inflación bcrp setiembre 2010
Reporte de inflación   bcrp setiembre 2010Reporte de inflación   bcrp setiembre 2010
Reporte de inflación bcrp setiembre 2010
 
Bmgt 205 chapter_10
Bmgt 205 chapter_10Bmgt 205 chapter_10
Bmgt 205 chapter_10
 
Reduce stress and achieve success 100824
Reduce stress and achieve success 100824Reduce stress and achieve success 100824
Reduce stress and achieve success 100824
 
chlorophyll
chlorophyllchlorophyll
chlorophyll
 
Preparing and Delivering an Effective Presentation
Preparing and Delivering an Effective PresentationPreparing and Delivering an Effective Presentation
Preparing and Delivering an Effective Presentation
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similaire à Inn530 2 nguyen, song huyen chau n7665288 and tran, thi ngoc nhung n 7704119

Info1010 presentation
Info1010 presentationInfo1010 presentation
Info1010 presentation
tylerewall
 
WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS LIBRARY CAN UTILISE FO...
WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS  LIBRARY CAN UTILISE FO...WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS  LIBRARY CAN UTILISE FO...
WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS LIBRARY CAN UTILISE FO...
`Shweta Bhavsar
 
Definiton, terms and overview
Definiton, terms and overviewDefiniton, terms and overview
Definiton, terms and overview
Roxy Pilly
 

Similaire à Inn530 2 nguyen, song huyen chau n7665288 and tran, thi ngoc nhung n 7704119 (20)

Web2.0 Oakley 10 Jun07
Web2.0 Oakley 10 Jun07Web2.0 Oakley 10 Jun07
Web2.0 Oakley 10 Jun07
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
 
Web2.0 2007 01-29
Web2.0 2007 01-29Web2.0 2007 01-29
Web2.0 2007 01-29
 
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
 
Alberta L. Brown Presentation - Sophia
Alberta L. Brown Presentation - SophiaAlberta L. Brown Presentation - Sophia
Alberta L. Brown Presentation - Sophia
 
Web20 Intro Naj Shaik
Web20 Intro Naj ShaikWeb20 Intro Naj Shaik
Web20 Intro Naj Shaik
 
Info1010 presentation
Info1010 presentationInfo1010 presentation
Info1010 presentation
 
WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS LIBRARY CAN UTILISE FO...
WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS  LIBRARY CAN UTILISE FO...WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS  LIBRARY CAN UTILISE FO...
WHAT IS WEB 2.0? DESCRIBE IN DETAIL THE WEB 2.0 TOOLS LIBRARY CAN UTILISE FO...
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Northwest Elearning Community Conference Keynote
Northwest Elearning Community Conference Keynote Northwest Elearning Community Conference Keynote
Northwest Elearning Community Conference Keynote
 
Northwest eLearning Community Conference Keynote (10-07)
Northwest eLearning Community Conference Keynote (10-07)Northwest eLearning Community Conference Keynote (10-07)
Northwest eLearning Community Conference Keynote (10-07)
 
Webometrics20
Webometrics20Webometrics20
Webometrics20
 
Webometrics 2.0: Blogometrics, Wikimetrics, Tagometrics, and Sociometrics Rev...
Webometrics 2.0: Blogometrics, Wikimetrics, Tagometrics, and Sociometrics Rev...Webometrics 2.0: Blogometrics, Wikimetrics, Tagometrics, and Sociometrics Rev...
Webometrics 2.0: Blogometrics, Wikimetrics, Tagometrics, and Sociometrics Rev...
 
Presentation web 3.0(part 1)
Presentation web 3.0(part 1)Presentation web 3.0(part 1)
Presentation web 3.0(part 1)
 
June 2023:Top 10 Cited Articles in Web & Semantic Technology
June 2023:Top 10 Cited Articles in Web & Semantic TechnologyJune 2023:Top 10 Cited Articles in Web & Semantic Technology
June 2023:Top 10 Cited Articles in Web & Semantic Technology
 
DM110 - Week 1 - Introductions / Web 2.0
DM110 - Week 1 - Introductions / Web 2.0DM110 - Week 1 - Introductions / Web 2.0
DM110 - Week 1 - Introductions / Web 2.0
 
Definiton, terms and overview
Definiton, terms and overviewDefiniton, terms and overview
Definiton, terms and overview
 
European Economic and Social Committee on "Communicating Europe"
European Economic and Social Committee on "Communicating Europe"European Economic and Social Committee on "Communicating Europe"
European Economic and Social Committee on "Communicating Europe"
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Inn530 2 nguyen, song huyen chau n7665288 and tran, thi ngoc nhung n 7704119

  • 1. Nguyen, Song Huyen Chau, n7665288 Tran, Thi Ngoc Nhung, n7704119 Image from http://nh121996.edublogs.org/files/2012/06/web20-2eas71n.jpg
  • 2. Definitions Characteristics Key applications Major risks Image from http://4.bp.blogspot.com/-QE6FSEhJBeY/T1gaIKMjLDI/AAAAAAAAD3g/iV9UJbhVkfw/s1600/web2.jpg
  • 3. “Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: build applications that harness network effects to get better the more people use them.” (O‟Reilly, 2006) Image from http://askatechteacher.files.wordpress.com/2011/12/web2postbubblebubbleboom.gif
  • 4. Web 2.0 is defined as “a space that allows anyone to create and share information online - a space for collaboration, conversation, and interaction; a space that is highly dynamic, flexible, and adaptable”. (Coombs , 2007) Image from http://pgrschoolofeducation.files.wordpress.com/2011/10/web2marketing.jpg
  • 8. Three basic characteristics:  the freeing and innovative use of data  the building of virtual applications by drawing from the present applications and data  the participatory role of the user in whatever format the user wants to work or share. (Miller, 2006) Image from http://cf.ltkcdn.net/web-design/images/std/37992-400x300-Web20.jpg
  • 9. A user-centred characteristic classification:  Information sharing (e.g. documents and video)  Grassroots mobilization (e.g. spreading news and opinions)  Community building (e.g. meeting new friends, creating new services) (Kool & van Wamelen, 2008, cited in Chua, 2010) Image from http://www.jonathannicholas.com/wp-content/uploads/2008/09/social-networking.jpg
  • 10. Seven categories of Web 2.0 applications  Publishing Platforms  Social Networking Sites  Democratized Content Networks  Virtual Networking Platforms  Information Aggregators  Edited Social News Platforms  Content Distribution Sites (Kami Huyse, cited in McDermott, 2007) Image from http://www.connectioncafe.com/assets/blog-images/social-media-logos.jpg
  • 11. The most popular tool-application areas associated with Web 2.0 include: blogs, wikis, RSS, podcasts and videocasts, mashups, social sharing services, communication tools, social networks, folksomonies and tagging, and virtual worlds. (Kelly, 2008) Image from http://pixelcoblog.com/wp-content/uploads/2009/02/icontexto-drink-web20.png
  • 12.  Blogs  Wikis  Tagging and social bookmarking  Streaming media  RSS (Really Simple Syndication)  SNS (Social Networking Sites) (Adapted from Anderson, 2007; Harris, 2008) Image from http://www.prav-talks.com/wp-content/uploads/2011/11/web-2-sites.jpg
  • 13. “The term web-log, or blog, refers to a simple webpage consisting of brief paragraphs of opinion, information, personal diary entries, or links, called posts, arranged chronologically with the most recent first, in the style of an online journal (Doctorow et al., 2002). (Anderson, 2007, p.7) Image from http://kathybackus.files.wordpress.com/2011/08/blog-2.jpg
  • 14. “A wiki is a webpage or set of webpages that can be easily edited by anyone who is allowed access” (Ebersbach et al., 2006, cited in Anderson, 2007, p.8) Image from http://uwstoutinnovations.wikispaces.com/file/view/wiki.gif/81914965/484x335/wiki.gif
  • 15. “A tag is a keyword that is added to a digital object to describe it, but not as part of a formal classification system.” Social bookmarking systems allow users to create lists of „bookmarks‟ or „favorites‟, to store these centrally on a remote service and to share them with other users of the system. (Anderson, 2007, p.9) Image from http://batya150.files.wordpress.com/2011/09/free-social-media-iconset-price-tag-style.jpg
  • 16. “Podcasts are audio recordings, usually in MP3 format, of talks, interviews and lectures, which can be played either on a desktop computer or on a wide range of handheld MP3 devices.” (Anderson, 2007, p.10) Image from http://www.indiana.edu/~icy/images/itunes_podcast_icon.jpg
  • 17. RSS is a family of formats which allow users to find out about updates to the content of RSS-enabled websites, blogs or podcasts without actually having to go and visit the site.” (Anderson, 2007, p.10) Image from http://www.deviantart.com/download/51752520/Transparent_PNG_RSS_logo_by_TarnicDotCom.png
  • 18. “Professional and social networking sites that facilitate meeting people, finding like minds, sharing content—uses ideas from harnessing the power of the crowd, network effect and individual production/user generated content.” (Anderson, 2007, p.13) Image from http://snowkiwi.com/wordpress/wp-content/uploads/2012/05/sns10_1.jpg
  • 19. Aggregation services  Data 'mash-ups„  Tracking and filtering content  Collaborating (Anderson, 2007) Image from http://img.scoop.it/6baiker4xkR_1_BwxKnp-Tl72eJkfbmt4t8yenImKBVaiQDB_Rd1H6kmuBWtceBJ
  • 20. Aggregation services gather information from diverse sources across the Web and publish in one place (e.g. Google) (Anderson, 2007) Image from http://diversegy.com/img/aggregation_img.jpg
  • 21. “Web services that pull together data from different sources to create a new service (i.e. aggregation and recombination). “ (Anderson, 2007) Image from http://www.lgeoresearch.com/img/MashupHandshake.jpg
  • 22. “Services that keep track of, filter, analyse and allow search of the growing amounts of Web 2.0 content from blogs, multimedia sharing services etc.” (Anderson, 2007, p.13) Image from http://t2.gstatic.com/images?q=tbn:ANd9GcRc1ly-Ow6Jx0qoSee5gLp6Bkg59zGamz2lpcr-lDEbFDf1wxu- 6h9TmSjl
  • 23. Collaborative reference works (like Wikipedia) that are built using wiki-like software tools.  Uses ideas from harnessing the power of the crowd and architecture of participation.” (Anderson, 2007) Image from http://www1.imperial.ac.uk/resources/C3DBF366-7292-40EF-8D5E-63D292701E2F/global_collaboration.jpg
  • 24. Security risks  Social risks Image from http://www.tina-george.com/wp-content/uploads/2011/12/risks.jpg
  • 25. Media, marketing and the lack of control Web 2.0 = More content, Less control, More uncertainly  Data privacy Web 2.0 = a Personal Data Explosion (Bartkiewicz, 2008, p.17 & 23) Image from http://www.artistsvalley.com/images/icons/Network%20Security%20Icons%20Var/Hyperlink%20Security%20Risk/256x25 6/Hyperlink%20Security%20Risk.jpg
  • 26. “Many of the Web 2.0 applications contain no provision for monitoring content or traffic to ensure that sensitive information is not being transmitted inappropriately.” (Cunningham, 2009) Image from http://t0.gstatic.com/images?q=tbn:ANd9GcSwJR2DsolE-IaQbj0iGqeEw8j42fYYKX1aDsceJU7k61VASNN80Q
  • 27. SOCIAL FREELOADERS  SOCIAL “A” LISTERS  SOCIAL NON-TRANSPARENCY  SOCIAL GOSSIP  SOCIAL DEVIANCY (Bogatin, 2006) Image from http://k02.kn3.net/6F91E571B.jpg
  • 28. Loss of information  Release of confidential information  Disreputable behaviour  Public negative comments  Accessibility  Lack of engagement (Briggs, 2008) Image from http://www.dunwebcarts.com/images/OSC/risk-icon.jpg
  • 31. Anderson, P. (2007) What is web 2.0? ideas, technologies and implications for education. JISC Technology and Standards Watch. Retrieved from http://www.jisc.ac.uk/media/documents/techwatch/tsw0701b.pdf  Bartkiewicz, 2008. http://assets.en.oreilly.com/1/event/16/The%20Emerging%20Business%20Risks%20of%20 Web%202_0%20Models%20Presentation.pdf  Bogatin, D. (2006). Web 2.0: Top five social risks list. Retrieved from http://www.zdnet.com/blog/micro-markets/web-20-top-five-social-risks-list/288  Briggs, D. (2008). The risks and opportunities of web 2.0. Retrieved from http://www.slideshare.net/davebriggs/risk-opportunities-of-web-20  Chua, A.Y.K. (2010). A study of Web 2.0 applications in library websites. Library & information science research, 32 (3), 203.
  • 32. Coombs, K.A. (2007). Building a library web site on the pillars of Web 2.0. Computers in Libraries, 27 (1), 16-19.  Cunningham, P. (2009). Web 2.0: Issues & risks. Information Management Journal, 43(1), 28. Retrieved from http://web.ebscohost.com.ezp01.library.qut.edu.au/ehost/pdfviewer/pdfviewer?sid=6 98fd342-3627-44a0-92d5-dd0426b36b5d%40sessionmgr114&vid=2&hid=113  Doctorow, C., Dornfest, F., Johnson, J. Scott, Powers, S. (2002). Essential Blogging. O‟Reilly.  Ebersbach, A., Glaser, M., Heigl, R. 2006. Wiki: Web Collaboration. Springer-Verlag: Germany.  Harris, C. (2008). WEB 2.0. Canadian Underwriter, 75(2), 10. Retrieved from http://search.proquest.com.ezp01.library.qut.edu.au/docview/224940145/fulltextPDF ?accountid=13380  Laningham, S (ed.) 2006. Tim Berners-Lee. Podcast, developerWorks Interviews, 22nd August, IBM website. Available online at: http://www- 128.ibm.com/developerworks/podcast/ [last accessed 17/01/07].
  • 33. Lawton, G. (2007). Web 2.0 creates security challenges. Computer, 40(10), 13-16. doi:10.1109/MC.2007.367  McDermott, I. E. (2007). All A-Twitter about Web 2.0: What does it offer libraries?. Searcher, 15(9), 34−39.  O ‟Reilly, T. (2006). Web 2.0 Compact Definition: Trying Again. Retrieved from http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html  O ‟Reilly, T. (2007). What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communication & Strategies 65(1), 17-37. Retrieved from http://mpra.ub.uni-muenchen.de/4578/

Notes de l'éditeur

  1. Context: Rationale: Web 2.0 applications are used in variety of services at QUT (BB, Virtual, Blogs, Mobile application ...) it’s useful for new students to know what’s technology is used in conducting those services.Audience: first-year international business students in Faculty of Business at QUT Aims: to introduce basic concepts, applications of Web 2.0 as well as its major types of risks Outcomes: students get to know what web 2.0 is for further adoption in their study and work + understand the hidden risks to be secure in the Web 2.0 environment
  2. Give examples of some popular blogs (in education, in business)
  3. Example: Wikipedia / Wiki in different context: workplace, academic institutions
  4. Add vodcast
  5. Examples of RSS readers
  6. Examples of
  7. Give examples
  8. To avoid risk  need to have deep understanding of used applications, their strengths and weaknesses.