We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKeith Callard
Modified about 1 year ago
collaboration crowdsourcing mash-ups on-line apps social networking wikis folksonomies RSS long tail
Blogs Rethink … communication Some businesses fear – many embrace Customer relations / conversation Corporate transparency Advertising Blog policy a good idea because …
Blogs Rethink … communication Defamation Leak confidential information Harm reputation Copyright infringement Breach securities laws Quick criticism if not genuine - flog
Streisand effect Rethink … reactions & remedies Don’t look at this!! Trying to suppress can backfire
Wikipedia Rethink … information & sources Wikis – crowdsourcing – essence of 2.0 Almost as accurate as Brittanica Anyone can change Anyone can fix Schools ban it Courts quote it
Web based apps Rethink … reliability & back-up Compelling apps are available Many advantages… but –What if it fails? –Where is your data? Assess the risks
MySpace / YouTube / Downloads Rethink … copyright, privacy Copyright fights and uncertainties Can’t just use what is on the Net People putting info on selves on Net Inconsistent with privacy
David R. Canton Barrister, Solicitor & Trade-mark Agent Harrison Pensa LLP Visit me at my blog at: www.canton.elegal.ca (519) 661-6776 firstname.lastname@example.org www.harrisonpensa.com www.legallandmines.net © 2007 Harrison Pensa LLP
➲ What’s a social network? ➲ Cases o Facebook and Twitter o Youtube o Wiki o Blogging (Dell) ➲ What will the future bring?
➲ Privacy ➲ Article: “Adolescent Weblog Use: Risky or Protective?” “Informed consent procedures were not required for this study because the blogs were.
Creating Collaborative Partnerships Learning Outcomes 1.Explain Web 2.0 and identify its four characteristics 2.Explain how Business 2.0 is helping communities.
Introduction What’s a social network? (P/K) Cases – Facebook and Twitter (P/K) – Youtube (K) – Wiki (P) – Blogging (Dell) (K) What will the future bring?
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
CHAPTER 9 Social Computing. CHAPTER OUTLINE 9.1 Web Fundamentals of Social Computing in Business 9.3 Social Computing in Business: Shopping 9.4.
Ethical dilemmas working with new media channels Philip Young University of Sunderland.
Learning Technologies Centre Learning and Teaching with Social Technologies.
Lecture 5 Web 2.0 Teaser Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet, Fall 2011.
Slide 1 May 2009 Creating a culture for working better together.
Data Publishing on Web 2.0 Leigh Dodds, Chief Technology Officer, Ingenta 1 st February 2007.
Literacy with Information and Communication Technology (ICT) Cheryl Prokopanko Coordinator : Learning Support & Technology Manitoba Education, Citizenship.
FACEBOOK PRIVACY CONCERNS Presenter: Anquin C. Cooper Based on the Article: Facebook In Privacy Breach By: Geoffrey A. Fowler.
Library 2.0 Gillian Wood / Graham Spooner NSW Health & The College of Nursing.
Social Media and Your Career How to use social media to land your next job Confidential -- Copyright Web Developers of New York All Rights Reserved.
Learning 2.0: It’s all about PLAY! Matt Gullett Emerging Technology Manager The Public Library of Charlotte & Mecklenburg County Matt’s.
Small Business & Web Technology Going Social. Agenda What is Social Network? Why Social Network Matter? Trends in Social Networking – Facebook – Twitter.
How to drive more and better quality traffic to your website.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Adriana Iordan Web Marketing Manager / Avangate Social Networking Media How the software authors should use it?
Social Networking Presentation to Department Heads January 21, 2010.
CHAPTER 8 Social Computing. CHAPTER OUTLINE 1.Web Fundamentals of Social Computing in Business 3.Social Computing in Business: Shopping 4.Social.
Social Media in the Physician Practice Setting. Objectives 1. Review the types of social media available for communication with patients. 2. Explain the.
You promise to : Not display offensive messages or pictures Not harass, insult, attack others using the computer Not to access social media sites, i.e.
Management of Data as Responsible Use ICPL Information Privacy and Security As usual in higher education, different institution will have, and take,
Fatima Begum. Introduction What is a social network? “A website where one connects with those sharing personal or professional interests, place of origin,
Social Media: Marketing and the Legal Risks Training Session One: The Social Media Playbook Matthew Spanovich & Eric Wiechman December 2, 2011 Spanovich.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 7/2/ Facebook is the most popular social.
With Social Media Workplace Culture and Change Management Ian Graham, Bank of Montreal ian.graham AT bmo.com.
Social Media Gone Wild Benefits, Dangers & Information Security and Privacy Policies Benefits, Dangers & Information Security and Privacy Policies 1.
ICT Issues Social Networking. Social Networking Social networking: the interaction between a group of people who have a common interest, eg. music. Popular.
MANAGED SECURITY: Protecting your data and your business Insert reseller logo.
Utilizing Social Networking Getting the most out of social media tools.
Blogging Issues: Dr. Jennifer L. Bowie Electronic Writing & Publishing A few things to keep in mind when blogging.
Beyond Google: Information literacy and Web 2.0 Transformational Technologies: 2 nd November 2007.
WEB 2.O APPLICATIONS FOR SMALL BUSINESS IT255: Unit 3.
For more info visit at For more info visit at
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Social Media 101: Understanding the Basics Basic tools for entrepreneurs, small business owners, job seekers, and nonprofits © Copyright 2012 Secretary.
Prepared by Lee LeFever, MHA | Contact: | mobile | Lee LeFever 11/08/2005 COM 546 Evolution and Trends In.
1. Key Lessons in Mobile Payments Utility Payment Conference| San Diego, California TIO Networks Corp. Steve Barha, EVP Mobile & Web.
Tradition innovation Online Branding Kate Legg Solicitor.
Microsoft Management Seminar Series SMS 2003 Change Management.
The Answer is simple. Team Marketing!. Many Network Marketers fail because they try to build their Team as an individual effort.
Introduce Web 2.0 & Social Media in the Public Sector Case Study: Public Health Agency of Canada Presented at the Advanced Learning Institute's 4th Social.
Charnelle Bacon & Brandon Carr. Benefits of a Social Web Share Create Connect The social web is a place that one can share a multiplex of information,
New Approaches for Collecting Public Input Online Government Applications of Social Media Networks and Communities May 28th, 2010 Joe Pringle, Managing.
© 2017 SlidePlayer.com Inc. All rights reserved.