collaboration crowdsourcing mash-ups on-line apps social networking wikis folksonomies RSS long tail.

Slides:



Advertisements
Similar presentations
MANAGED SECURITY: Protecting your data and your business Insert reseller logo.
Advertisements

Learning Technologies Centre Learning and Teaching with Social Technologies.
Data Publishing on Web 2.0 Leigh Dodds, Chief Technology Officer, Ingenta 1 st February 2007.
Introduction What’s a social network? (P/K) Cases – Facebook and Twitter (P/K) – Youtube (K) – Wiki (P) – Blogging (Dell) (K) What will the future bring?
Do you have the know how?. Does your company or organisation have the know how?
Privacy: Facebook, Twitter
Social Media 101: Understanding the Basics Basic tools for entrepreneurs, small business owners, job seekers, and nonprofits © Copyright 2012 Secretary.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Legal Liability under the Digital Millennium Copyright Act and the Communications Decency Act Presented by Daliah Saper Saper Law Offices, LLC.
Social Media in the Physician Practice Setting. Objectives 1. Review the types of social media available for communication with patients. 2. Explain the.
Small Business & Web Technology Going Social. Agenda What is Social Network? Why Social Network Matter? Trends in Social Networking – Facebook – Twitter.
EServices Office Managing Ubiquitous Content On the Web: Today and in the Future – (State ISO Meeting, July 10, 2008)
MI021/CS021: Computers in Management April 24, 2009 Peer Production, Social Media, and Web 2.0 Prof. John Gallaugher written case &
With Social Media Workplace Culture and Change Management Ian Graham, Bank of Montreal ian.graham AT bmo.com.
ICT Issues Social Networking. Social Networking Social networking: the interaction between a group of people who have a common interest, eg. music. Popular.
Legal Aspects of Web 2.0 and Social Networking 26 Feb 2010.
Learning 2.0: It’s all about PLAY! Matt Gullett Emerging Technology Manager The Public Library of Charlotte & Mecklenburg County Matt’s.
Library 2.0 Gillian Wood / Graham Spooner NSW Health & The College of Nursing.
Social Networks MARK Starter Look at the site What does this cloud-based application do? what are some differences.
Business Circle Useful Social Networking Charles Brexel.
Prepared by Lee LeFever, MHA | Contact: | mobile | Lee LeFever 11/08/2005 COM 546 Evolution and Trends In.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 7/2/ Facebook is the most popular social.
Facebook: teaching, communicating and collaborating Tony Brett Head of IT Support Staff Services OUCS Tuesday 6 November 2007.
Adriana Iordan Web Marketing Manager / Avangate Social Networking Media How the software authors should use it?
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
8 Social Computing.
Mark a greenfield Join the Conversation Social Media in Higher Education.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Social Media Gone Wild Benefits, Dangers & Information Security and Privacy Policies Benefits, Dangers & Information Security and Privacy Policies 1.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Social Media: Marketing and the Legal Risks Training Session One: The Social Media Playbook Matthew Spanovich & Eric Wiechman December 2, 2011 Spanovich.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
For more info visit at For more info visit at
New Approaches for Collecting Public Input Online Government Applications of Social Media Networks and Communities May 28th, 2010 Joe Pringle, Managing.
Creating Collaborative Partnerships
FACEBOOK PRIVACY CONCERNS Presenter: Anquin C. Cooper Based on the Article: Facebook In Privacy Breach By: Geoffrey A. Fowler.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Student Technology Code of Ethics
Government IT Professionals Online Survey Results FINAL REPORT September 2010.
Management of Data as Responsible Use ICPL Information Privacy and Security As usual in higher education, different institution will have, and take,
Web 2.0 Vincent Binon - Marketing I.R.I.S. eCommunication
Utilizing Social Networking Getting the most out of social media tools.
Web 2.0 Online Learning Tools and Resources Chris O'Neal *
Social Networking Presentation to Department Heads January 21, 2010.
Social Media and Your Career How to use social media to land your next job Confidential -- Copyright Web Developers of New York All Rights Reserved.
Wellington SharePoint Users Group 2007 Microsoft Office System Overview Ryan Duguid.
Blogging Issues: Dr. Jennifer L. Bowie Electronic Writing & Publishing A few things to keep in mind when blogging.
Slide 1 May 2009 Creating a culture for working better together.
Introduce Web 2.0 & Social Media in the Public Sector Case Study: Public Health Agency of Canada Presented at the Advanced Learning Institute's 4th Social.
➲ Privacy ➲ Article: “Adolescent Weblog Use: Risky or Protective?” “Informed consent procedures were not required for this study because the blogs were.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Your goals: Communicate with key audiences Connect with influencers Build word of mouth Create a community Collaborate Conduct conversations Extend your.
Lecture 5 Web 2.0 Teaser Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet, Fall 2011.
Literacy with Information and Communication Technology (ICT) Cheryl Prokopanko Coordinator : Learning Support & Technology Manitoba Education, Citizenship.
Consider the Professional Responsibilities of Your Role Gretchen A. Winter, J.D. Executive Director, Center for Professional Responsibility in Business.
➲ What’s a social network? ➲ Cases o Facebook and Twitter o Youtube o Wiki o Blogging (Dell) ➲ What will the future bring?
CHAPTER 9 Social Computing. CHAPTER OUTLINE 9.1 Web Fundamentals of Social Computing in Business 9.3 Social Computing in Business: Shopping 9.4.
Beyond Google: Information literacy and Web 2.0 Transformational Technologies: 2 nd November 2007.
How to drive more and better quality traffic to your website.
You promise to : Not display offensive messages or pictures Not harass, insult, attack others using the computer Not to access social media sites, i.e.
Ethical dilemmas working with new media channels Philip Young University of Sunderland.
BUS 508 Week 4 Assignment Internet Technology, Marketing, and Security (Sony Corp) Check this A+ tutorial guideline at
Jessica Wang Randy Cadenhead Sutherland Cox Communications
Literacy with Information and Communication Technology (ICT)
Using the Web for Teaching and Learning
Engaging that Other Audience
Presentation transcript:

collaboration crowdsourcing mash-ups on-line apps social networking wikis folksonomies RSS long tail

Blogs Rethink … communication Some businesses fear – many embrace Customer relations / conversation Corporate transparency Advertising Blog policy a good idea because …

Blogs Rethink … communication Defamation Leak confidential information Harm reputation Copyright infringement Breach securities laws Quick criticism if not genuine - flog

Streisand effect Rethink … reactions & remedies Don’t look at this!! Trying to suppress can backfire

Wikipedia Rethink … information & sources Wikis – crowdsourcing – essence of 2.0 Almost as accurate as Brittanica Anyone can change Anyone can fix Schools ban it Courts quote it

Web based apps Rethink … reliability & back-up Compelling apps are available Many advantages… but –What if it fails? –Where is your data? Assess the risks

MySpace / YouTube / Downloads Rethink … copyright, privacy Copyright fights and uncertainties Can’t just use what is on the Net People putting info on selves on Net Inconsistent with privacy

David R. Canton Barrister, Solicitor & Trade-mark Agent Harrison Pensa LLP Visit me at my blog at: (519) © 2007 Harrison Pensa LLP