We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKeith Callard
Modified over 2 years ago
collaboration crowdsourcing mash-ups on-line apps social networking wikis folksonomies RSS long tail
Blogs Rethink … communication Some businesses fear – many embrace Customer relations / conversation Corporate transparency Advertising Blog policy a good idea because …
Blogs Rethink … communication Defamation Leak confidential information Harm reputation Copyright infringement Breach securities laws Quick criticism if not genuine - flog
Streisand effect Rethink … reactions & remedies Don’t look at this!! Trying to suppress can backfire
Wikipedia Rethink … information & sources Wikis – crowdsourcing – essence of 2.0 Almost as accurate as Brittanica Anyone can change Anyone can fix Schools ban it Courts quote it
Web based apps Rethink … reliability & back-up Compelling apps are available Many advantages… but –What if it fails? –Where is your data? Assess the risks
MySpace / YouTube / Downloads Rethink … copyright, privacy Copyright fights and uncertainties Can’t just use what is on the Net People putting info on selves on Net Inconsistent with privacy
David R. Canton Barrister, Solicitor & Trade-mark Agent Harrison Pensa LLP Visit me at my blog at: www.canton.elegal.ca (519) 661-6776 email@example.com www.harrisonpensa.com www.legallandmines.net © 2007 Harrison Pensa LLP
➲ What’s a social network? ➲ Cases o Facebook and Twitter o Youtube o Wiki o Blogging (Dell) ➲ What will the future bring?
➲ Privacy ➲ Article: “Adolescent Weblog Use: Risky or Protective?” “Informed consent procedures were not required for this study because the blogs were.
Creating Collaborative Partnerships
Introduction What’s a social network? (P/K) Cases – Facebook and Twitter (P/K) – Youtube (K) – Wiki (P) – Blogging (Dell) (K) What will the future bring?
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
CHAPTER 9 Social Computing. CHAPTER OUTLINE 9.1 Web Fundamentals of Social Computing in Business 9.3 Social Computing in Business: Shopping 9.4.
Ethical dilemmas working with new media channels Philip Young University of Sunderland.
Learning Technologies Centre Learning and Teaching with Social Technologies.
Lecture 5 Web 2.0 Teaser Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet, Fall 2011.
Slide 1 May 2009 Creating a culture for working better together.
Data Publishing on Web 2.0 Leigh Dodds, Chief Technology Officer, Ingenta 1 st February 2007.
Literacy with Information and Communication Technology (ICT) Cheryl Prokopanko Coordinator : Learning Support & Technology Manitoba Education, Citizenship.
FACEBOOK PRIVACY CONCERNS Presenter: Anquin C. Cooper Based on the Article: Facebook In Privacy Breach By: Geoffrey A. Fowler.
Library 2.0 Gillian Wood / Graham Spooner NSW Health & The College of Nursing.
Social Media and Your Career How to use social media to land your next job Confidential -- Copyright Web Developers of New York All Rights Reserved.
Learning 2.0: It’s all about PLAY! Matt Gullett Emerging Technology Manager The Public Library of Charlotte & Mecklenburg County Matt’s.
Small Business & Web Technology Going Social. Agenda What is Social Network? Why Social Network Matter? Trends in Social Networking – Facebook – Twitter.
How to drive more and better quality traffic to your website.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
© 2017 SlidePlayer.com Inc. All rights reserved.