Web 2.0
Part of the Internet technologies glossary:
Web 2.0 is the current state of online technology as it compares to the early days of the Web,
characterized by greater user interactivity and collaboration, more pervasive network
connectivity and enhanced communication channels.
One of the most significant differences between Web 2.0 and the traditional World Wide Web
(WWW, retroactively referred to as Web 1.0) is greater collaboration among Internet users,
content providers and enterprises. Originally, data was posted on Web sites, and users simply
viewed or downloaded the content. Increasingly, users have more input into the nature and scope
of Web content and in some cases exert real-time control over it.
The social nature of Web 2.0 is another major difference between it and the original, static Web.
Increasingly, websites enable community-based input, interaction, content-sharing and
collaboration. Types of social media sites and applications include forums, microblogging, social
networking, social bookmarking, social curation, and wikis.
Elements of Web 2.0
Wikis: Websites that enable users to contribute, collaborate and edit site content.
Wikipedia is one of the oldest and best-known wiki-based sites.
The increasing prevalence of Software as a Service (SaaS), web apps and cloud
computing rather than locally-installed programs and services.
Mobile computing, also known as nomadicity, the trend toward users connecting from
wherever they may be. That trend is enabled by the proliferation of smartphones, tablets
and other mobile devices in conjunction with readily accessible Wi-Fi networks.
Mash-ups: Web pages or applications that integrate complementary elements from two or
more sources.
Social networking: The practice of expanding the number of one's business and/or social
contacts by making connections through individuals. Social networking sites include
Facebook, Twitter, LinkedIn and Google+.
Collaborative efforts based on the ability to reach large numbers of participants and their
collective resources, such as crowdsourcing, crowdfunding and crowdsource testing.
User-generated content (UGC): Writing, images, audio and video content -- among other
possibilities -- made freely available online by the individuals who create it.
Social curation: The collaborative sharing of content organized around one or more
particular themes or topics. Social content curation sites include Reddit, Digg, Pinterest
and Instagram.
Manufacturing 2.0
The integration of Web 2.0 communication and collaboration applications into traditional
manufacturing practices and processes has been dubbed Manufacturing 2.0. Manufacturing 2.0
takes typical Web 2.0 apps and services and incorporates them into every stage of development
and production. The use of these technologies and tools facilitates greater collaboration and
sharing and referencing of information in a business, ideally leading to better thought out design
and more efficient production.
Enterprise 2.0
Similarly, the inclusion of Web 2.0 technologies into an enterprises business processes, intranet
and extranet is sometimes referred to as Enterprise 2.0. Most enterprise 2.0 followers use a
combination of blogs, social networking and social collaborative tools as well as free, paid and
homegrown technologies. The term Enterprise 2.0 was coined by Harvard Business School
Associate Professor Andrew McAfee in an MIT Sloan Management Review he named
"Enterprise 2.0: The Dawn of Emergent Collaboration."
Web 2.0 suicide
So synonymous with Web 2.0 is social networking that the deletion of ones social networking
presences throughout the Internet is referred to as Web 2.0 suicide. There are web applications
designed to facilitate the process, such as the free service Web 2.0 suicide machine. The
application attempts to purge user info on some of the most common social networking presence
points: Facebook, MySpace, LinkedIn and Twitter before adding the user to the Social Network
Suiciders group on Facebook and signing them out.
The future of Web 2:0: Web 3.0
Some industry pundits are already claiming that Web 2.0 is merely a transitional phase between
the early days of the World Wide Web's existence and a more established phase they're calling
Web 3.0, also known as the Semantic Web.
The creator of the World Wide Web, Tim Berners-Lee, suggests that the Web as a whole can be
designed more intelligently to be more intuitive about how to serve a user's needs. Berners-Lee
observes that although search engines index much of the Web's content, they have little ability to
select the pages that a user really wants or needs. He suggests developers and authors, singly or
in collaboration, can use self-descriptions or similar techniques so that new context-aware
programs can better classify the information that might be relevant to a user. Web 3.0 will
involve the publishing of web resources in languages intended for data (such as XML, RDF,
OWL and XHTML) to supplement them with metadata that will allow software to analyze,
classify and deliver content for more personal relevance. The Semantic Annotations for Web
Services group at W3C is defining the specifications for the Web 3.0.
Ubiquitous Computing
The model of Web 3.0s machine-classified, data sharing world creates a basis for ubiquitous
computing. Ubiquitous computing, also known as pervasive computing, is a scenario in which
embedded processing in everyday objects enables intercommunication and unobtrusive data
sharing throughout the users environment. The concept overlaps with that of the Internet of
Things (IoT), in which almost any entity or object imaginable can be outfitted with a unique
identifier (UID) and the ability to exchange data automatically. A modest example of this concept
is a fridge that sends a grocery lists to ones smartphone.
Spyware probably poses the biggest threat to privacy and security on the Internet,
yet so few people really know what it is or how it works. Put simply, spyware is any
piece of software that records your actions or information without your knowledge.
Some spyware is fairly benign, tracking browsing history and keeping the data it
receives anonymous, while other spyware is specifically designed to get your online
banking credentials so thieves can clean out your accounts.
Because it's almost impossible to avoid spyware on your own, having anti-spware
and antivirus programs running on your computer is a must.
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and Internet security, it's important to
remember that most people with privacy issues on the Internet put themselves in
that position. Think about social networking sites and just how much personal
information you have posted there. If someone were trying to steal your identity
and needed your father's middle name or where you went to elementary school
two commonly used security questions you need to think about how a thief could
locate those facts. If you're concerned about Internet privacy, you have to consider
staying away from social networking sites, minimizing the information you put out
there, or maximizing privacy settings on these sites.
Online Etiquette
1.Whenever you work and communicate online, there are some basic rules
you should follow:
Think before you send.
If you send an email or post a message in anger, it could come back to
haunt you later. The same goes for pictures and videos you post online.
Even when something is deleted from a page, it may still be out there
waiting to be found when you least expect it.
2.Respect the time and bandwidth of others.
Don't pass along emails that contain hoaxes, or send messages to the
entire student body. The same goes for sending large videos or
attachments in an email message. It wastes everyone's time when they
have to wade through extra information to get to the important stuff.
Etiquette refers to a code of rules governing behavior in society and includes a
sound knowledge of ethics apart from manners. Etiquette can be acquired through a
conscious learning of what constitutes decent behavior. But in the course of time
etiquette should become a part of unconscious behavior and should appear as his
personality. Each society may be characterized by its distinct etiquette while it is
also possible for different cultures in a society to have its own set of convention and
social norms. Etiquette may be of different kinds such as social etiquette, business
4.
Follow the conventions of writing when sending formal emails or posting comments
online.
Unless the message you're sending is informal (such as a text message to a friend),
you should use correct spelling, grammar, and punctuation. You shouldn't WRITE IN
ALL CAPS! (It's considered shouting)
5.Respect others' right to privacy.
5
. Don't use technology to pass along rumors or share personal information about
someone without their permission. The same goes for posting names and photos of
others.
Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety and security risks to private information and property associated with using
the internet, and the self-protection from computer crime in general. As the number
of internet users continues to grow worldwide,[1] internet safety is a growing
concern for both children and adults. Common concerns regarding safety on the
internet include: malicious users (spam, phishing, cyberbullying, cyberstalking etc.),
websites and software (malware, computer viruses, etc.) and various types of
obscene or offensive content. Several crimes can be committed on the Internet such
as stalking, identity theft and more. Most social networking and chat sites have a
page about safety. Numerous groups, governments and organizations have
2
.Respect the time and bandwidth of others.
Don't pass along emails that contain hoaxes, or send messages to the entire
student body. The same goes for sending large videos or attachments in an email
message. It wastes everyone's time when they have to wade through extra
information to get to the important stuff.
Group 2
Privacy and Security on the Internet: 5 Tips to Stay Safe
Tip 1. Be Aware
The best tool to avoid spyware and stay safe on the Internet is your own brain. Free
software with no potential upgrades or strings attached, websites that are covered
in flashy ads, and free Wi-Fi in an unexpected place are all signs that something
may be wrong, and ignoring that intuition can get you in trouble. By staying aware
of what you are doing, and thinking about your security while you live your online
life, you stand a better chance of avoiding potentially dangerous situations.
Tip 2: Check for website safety
The Internet can be dangerous because so many websites require your personal
information to either log in to your account or to complete a transaction. Hackers,
thieves and spyware programmers realize this and often try to intercept your
information during these transactions, so make sure you are always dealing with
secure websites and companies. First, only provide your information to reputable
businesses, then ensure that the company's website uses a Web address that starts
with "https" and has a padlock symbol either in the address bar or at the bottom of
the browser. This means that the site encrypts your information, making the data
nearly useless to any thieves or hackers who may intercept the transmission.
Tip 3: Choose strong and varied passwords
For most people, a password is the strongest protection to ward off hackers and
thieves, and yet so many choose passwords that are barely worth the time it takes
to enter them. When creating a password, always use a mix of letters and numbers,
and include a symbol if the website allows it. While more difficult to remember, this
will make your password almost impossible to guess.
More importantly, you have to use different passwords for different websites. Think
about how often you use the same username and password for many online
accounts. Hackers specifically target low-security sites to gain access to large lists
of usernames and corresponding passwords, knowing that many people use the
same combination of credentials for things like online banking.
Tip 4: What is spyware? How do I stop it?
Spyware probably poses the biggest threat to privacy and security on the Internet,
yet so few people really know what it is or how it works. Put simply, spyware is any
piece of software that records your actions or information without your knowledge.
Some spyware is fairly benign, tracking browsing history and keeping the data it
receives anonymous, while other spyware is specifically designed to get your online
banking credentials so thieves can clean out your accounts.
Because it's almost impossible to avoid spyware on your own, having anti-spware
and antivirus programs running on your computer is a must.
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and Internet security, it's important to
remember that most people with privacy issues on the Internet put themselves in
that position. Think about social networking sites and just how much personal
information you have posted there. If someone were trying to steal your identity
and needed your father's middle name or where you went to elementary school
two commonly used security questions you need to think about how a thief could
locate those facts. If you're concerned about Internet privacy, you have to consider
staying away from social networking sites, minimizing the information you put out
there, or maximizing privacy settings on these sites.
The Internet offers so many opportunities to explore, create and collaborate. And to
make the most of the web, its important to keep yourself safe and secure. Whether
youre a new Internet user or an expert, the advice and tools here can help you
navigate the web safely and securely
Secure Your Passwords
Passwords are the first line of defense against cyber criminals. Its crucial to pick
strong passwords that are different for each of your important accounts and it is
good practice to update your passwords regularly. Follow these tips to create strong
passwords and keep them secure.
Signing in and out
Signing into your Google Account is simple just click on the Sign in button in the
top right corner of any Google service to check your Gmail, upload a video to
YouTube or just to get more relevant search results.
But when using public computers like in a cybercafe or library, remember that you
may still be signed into any services youve been using even after you close the
browser. So when using a public computer, be sure to sign out by clicking on your
account photo or email address in the top right corner and selecting Sign out.
Managing Multiple Accounts
Many devices now support multiple online accounts. This means youre in control of
which account you use, and when. And even if you are signed in to multiple Google
Accounts on the same device, personal information from one Google Account is not
combined with information from any other Google Account, unless you decide to link
those accounts together.
You can toggle between your Google Accounts easily and quickly, both on desktop
and on mobile. For example, you can add a secondary Google Account when youre
signed in on your main account and switch back and forth between them. And on
newer Google tablets with multi-user modes like the Nexus 7, it is simple for
multiple accounts to be associated with one device. This makes it easy for different
people in your family to check their email or access their apps without having to
sign in and out. Once you have set up a primary account, you can easily add
accounts in the device settings.
Use Secure Networks
Its good to be extra careful whenever you go online using a network you dont
know or trust like using the free Wi-Fi at your local cafe. The service provider can
monitor all traffic on their network, which could include your personal information.
However, if you are using a service that encrypts your connection to the web
service, it can make it much more difficult for someone to snoop on your activity. By
default, we encrypt the Gmail connection between your computer and Google this
helps protect your Google activity from being snooped on by others.
Lock Your Screen Or Device
You wouldnt go out for the day and leave your front door wide open, right? The
same principle applies to the devices you use. You should always lock your screen
when you finish using your computer, laptop or phone. For added security, you
should also set your device to automatically lock when it goes to sleep. This is
especially important for phones or tablets, which are more likely to get misplaced
and discovered by people you dont want to access your information, and home
computers that are in shared spaces.