Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Hidden Dangers: You can Log-on But You Cannot Hide Dr Stuart D Lee Oxford University Computing Services Dr Stuart D Lee Oxford University Computing.

Similar presentations


Presentation on theme: "The Hidden Dangers: You can Log-on But You Cannot Hide Dr Stuart D Lee Oxford University Computing Services Dr Stuart D Lee Oxford University Computing."— Presentation transcript:

1 The Hidden Dangers: You can Log-on But You Cannot Hide Dr Stuart D Lee Oxford University Computing Services Dr Stuart D Lee Oxford University Computing Services

2 Overview The importance of Web 2.0 The impact on a central IT service Changing expectations Some Concerns Issues of identity The importance of Web 2.0 The impact on a central IT service Changing expectations Some Concerns Issues of identity

3 Web 2.0, refers to a perceived second generation of Web-based communities and hosted services such as social- networking sites, wikis and folksonomies which aim to facilitate collaboration and sharing between users + usually free

4 Web 2.0 Apps TypeFunctionTools CommunicativeShare ideas/dataBlogs (audio/video) IM Podcasts Webcams CollaborativeWork with othersEditing/writing tools VCOPs Wikis DocumentativeCollect evidence, present ideas over time Blogs E-portfolios GenerativeCreate something newMashups VCOps VLWs InteractiveExchange information/ideasLearning objectives Social bookmarks VCOPs VLWs McGee, P. and Diaz, V. Wikis and Podcasts and Blogs! Oh, My! Educause Review (Sep/Oct 2007)

5 5-Factors Driving Change in IT Gartner Web disrupts existing models: Web 2.0 communities, such as MySpace and wikis, connect people in ways that many companies hadn't anticipated when they began to develop their online strategies. Experiment with free-form environments. "Social environments" are the wave of the future. Companies should provide interactive tools, such as content tagging systems, RSS feeds, blogs, wikis, etc. rticles/52239 Web disrupts existing models: Web 2.0 communities, such as MySpace and wikis, connect people in ways that many companies hadn't anticipated when they began to develop their online strategies. Experiment with free-form environments. "Social environments" are the wave of the future. Companies should provide interactive tools, such as content tagging systems, RSS feeds, blogs, wikis, etc. rticles/52239

6 Not just IT services Stephens, M. Web 2.0 and Libraries: Best Practices for Social Software (Library 2.0) McKiernan, G. Social Networking Sites for Engaged Library Services - gerrymck/LITANationalForum20 07.ppt Stephens, M. Web 2.0 and Libraries: Best Practices for Social Software (Library 2.0) McKiernan, G. Social Networking Sites for Engaged Library Services - gerrymck/LITANationalForum20 07.ppt

7 Impact on Central IT Increased burden on services Increased demand for new services - changing user expectations Out-sourcing, and increased demands for justifying central services Hidden perils Increased burden on services Increased demand for new services - changing user expectations Out-sourcing, and increased demands for justifying central services Hidden perils

8 Impact on Central IT Increased burden on services Increased demand for new services - changing user expectations Out-sourcing, and increased demands for justifying central services Hidden perils Increased burden on services Increased demand for new services - changing user expectations Out-sourcing, and increased demands for justifying central services Hidden perils

9 Stephanie Hardwick does not consider herself to be a technology addict, but she carries two MP3 players - an Apple iPod and a Creative Zen - around with her and says she cannot imagine doing her university degree without the internet. A lot of the journals I need are online and I use the internet for everything, like booking tickets, to getting trains, yellow pages. The 21-year-old student studying English at Oxford University says she spends at least an hour a day on Facebook, the social networking site, and downloads some of the plays and books she has to read for her course on to her Zen player, so she can listen to them while working out at the gym… FT 29/10/ fd2ac.html?nclick_check=1

10 Surveys (1) JISCs Great Expectations - ries/2007/09/expectations ries/2007/09/expectations 65% regularly use social networking sites, such as Facebook, MySpace or Flickr (females more than males - 71% and 59% respectively) and only 5% never use them JISCs Great Expectations - ries/2007/09/expectations ries/2007/09/expectations 65% regularly use social networking sites, such as Facebook, MySpace or Flickr (females more than males - 71% and 59% respectively) and only 5% never use them

11 Surveys (2) THEMA - Exploring the experiences of Master's students in technology-rich environments (http://www.oucs.ox.ac.uk/ltg/ projects/thema/)http://www.oucs.ox.ac.uk/ltg/ projects/thema/ YouTube Facebook Second Life THEMA - Exploring the experiences of Master's students in technology-rich environments (http://www.oucs.ox.ac.uk/ltg/ projects/thema/)http://www.oucs.ox.ac.uk/ltg/ projects/thema/ YouTube Facebook Second Life

12 But … Educause Centre for Applied Research (ECAR) 2006 showed 70.6% use Facebook several times a week, same number download music/videos But students prefer moderate technology use, and new students prefer even less. Dont bother with IM or Facebook - thats our network. Leave us alone Dont enter our world to [contact us] … well come to you Berg, J., Berquam, L., and Christoph, K. Social Networking Technologies: a poke for Campus Services Educause Review (March/April 2007) Educause Centre for Applied Research (ECAR) 2006 showed 70.6% use Facebook several times a week, same number download music/videos But students prefer moderate technology use, and new students prefer even less. Dont bother with IM or Facebook - thats our network. Leave us alone Dont enter our world to [contact us] … well come to you Berg, J., Berquam, L., and Christoph, K. Social Networking Technologies: a poke for Campus Services Educause Review (March/April 2007)

13 Web 2.0 speed-bumps Security Identity Privacy Business Model A World of Widgets, Wikis, and Mashups October 2007 Security Identity Privacy Business Model A World of Widgets, Wikis, and Mashups October 2007

14 Concerns (1) … we are currently looking into using external Web 2.0 services as part of and after our online courses. Obviously as part of this we need to consider the legal/institutional aspects of this provision

15 Concerns (2) What shocked me about the Facebook audience was how willing they were - and are - to provide information about themselves for benefits that you and I might consider questionable. Appvertising Facebookers abandon online privacy for virtual doo-doo October 2007, 7/10/09/facebookers_throw_virtu al_feces/ What shocked me about the Facebook audience was how willing they were - and are - to provide information about themselves for benefits that you and I might consider questionable. Appvertising Facebookers abandon online privacy for virtual doo-doo October 2007, 7/10/09/facebookers_throw_virtu al_feces/

16 Concerns (3) Web 2.0 and client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage Web 2.0 tops emerging cyber- threats om/articles/51890 Web 2.0 and client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage Web 2.0 tops emerging cyber- threats om/articles/51890

17

18 Concerns (4) We may share your information with third parties, including responsible companies with which we have a relationship No way to delete your personal data University IT Regulations Any password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person We may share your information with third parties, including responsible companies with which we have a relationship No way to delete your personal data University IT Regulations Any password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person

19

20 SecondLife Kirriemuirs snapshot (Sep, 2007): undation/sl/uksnapshot092007/final. pdf

21

22 SecondLife Its a waste of money It damages the Universitys reputation (its a game, its full of porn …) Its a waste of money It damages the Universitys reputation (its a game, its full of porn …)

23 What is an IT provider to do? Explore provision (e.g. PP and iTunesU) but also welcome SaaS Tread carefully - fad from future Educate re privacy Educate re libel Educate re copyright Use tools themselves: - Directors Blog - Wikinomics - Crowd-sourcing Explore provision (e.g. PP and iTunesU) but also welcome SaaS Tread carefully - fad from future Educate re privacy Educate re libel Educate re copyright Use tools themselves: - Directors Blog - Wikinomics - Crowd-sourcing

24 Stuart Lee Stuart Lee


Download ppt "The Hidden Dangers: You can Log-on But You Cannot Hide Dr Stuart D Lee Oxford University Computing Services Dr Stuart D Lee Oxford University Computing."

Similar presentations


Ads by Google