Anda di halaman 1dari 12

Definition

Web 2.0
Part of the Internet technologies glossary:
Web 2.0 is the current state of online technology as it compares to the early days of the Web,
characterized by greater user interactivity and collaboration, more pervasive network
connectivity and enhanced communication channels.
One of the most significant differences between Web 2.0 and the traditional World Wide Web
(WWW, retroactively referred to as Web 1.0) is greater collaboration among Internet users,
content providers and enterprises. Originally, data was posted on Web sites, and users simply
viewed or downloaded the content. Increasingly, users have more input into the nature and scope
of Web content and in some cases exert real-time control over it.
The social nature of Web 2.0 is another major difference between it and the original, static Web.
Increasingly, websites enable community-based input, interaction, content-sharing and
collaboration. Types of social media sites and applications include forums, microblogging, social
networking, social bookmarking, social curation, and wikis.
Elements of Web 2.0

Wikis: Websites that enable users to contribute, collaborate and edit site content.
Wikipedia is one of the oldest and best-known wiki-based sites.

The increasing prevalence of Software as a Service (SaaS), web apps and cloud
computing rather than locally-installed programs and services.

Mobile computing, also known as nomadicity, the trend toward users connecting from
wherever they may be. That trend is enabled by the proliferation of smartphones, tablets
and other mobile devices in conjunction with readily accessible Wi-Fi networks.

Mash-ups: Web pages or applications that integrate complementary elements from two or
more sources.

Social networking: The practice of expanding the number of one's business and/or social
contacts by making connections through individuals. Social networking sites include
Facebook, Twitter, LinkedIn and Google+.

Collaborative efforts based on the ability to reach large numbers of participants and their
collective resources, such as crowdsourcing, crowdfunding and crowdsource testing.

User-generated content (UGC): Writing, images, audio and video content -- among other
possibilities -- made freely available online by the individuals who create it.

Unified communications (UC): The integration of multiple forms of call and


multimedia/cross-media message-management functions controlled by an individual user
for both business and social purposes.

Social curation: The collaborative sharing of content organized around one or more
particular themes or topics. Social content curation sites include Reddit, Digg, Pinterest
and Instagram.

The History of Web 2.0


The foundational components of Web 2.0 are the advances enabled by Ajax and other
applications such as RSS and Eclipse and the user empowerment that they support.
Darcy DiNucci, an information architecture consultant, coined the term Web 2.0 In her 1999
article, "Fragmented Future:
The Web we know now, which loads into a browser window in essentially static screenfuls, is
only an embryo of the Web to come. The first glimmerings of Web 2.0 are beginning to appear,
and we are just starting to see how that embryo might develop. The Web will be understood not
as screenfuls of text and graphics but as a transport mechanism, the ether through which
interactivity happens.
Tim O'Reilly is generally credited with popularizing the term, following a conference dealing
with next-generation Web concepts and issues held by O'Reilly Media and MediaLive
International in 2004. O'Reilly Media has subsequently been energetic about trying to copyright
"Web 2.0" and holds an annual conference of the same name.
Web 2.0 controversy
Critics of Web 2.0 maintain that it makes it too easy for the average person to affect online
content, which can impact the credibility, ethics and even legality of web content. The extent of
data sharing and gathering also raises concerns about privacy and security. Defenders of Web 2.0
point out that these problems have existed ever since the infancy of the medium and that the
alternative -- widespread censorship based on ill-defined elitism -- would be far worse. The final
judgment concerning any web content, say the defenders, should be made by end users alone.
Web 2.0 reflects evolution in that direction.
Web 2.0 technologies
Most of the technologies used in delivering web 2.0 are rich Web technologies, such as Adobe
Flash, Microsoft Silverlight and JavaScript (in addition to Ajax, RSS and Eclipse). Web 2.0
applications are often based on the decentralized download methodology that made BitTorrent so
successful, in which each downloader of content is also a server, sharing the workload and
making heavily demanded content more accessible that it would be in the centralized model
where demand can lead to overwhelmed servers and pages.

Manufacturing 2.0
The integration of Web 2.0 communication and collaboration applications into traditional
manufacturing practices and processes has been dubbed Manufacturing 2.0. Manufacturing 2.0
takes typical Web 2.0 apps and services and incorporates them into every stage of development
and production. The use of these technologies and tools facilitates greater collaboration and
sharing and referencing of information in a business, ideally leading to better thought out design
and more efficient production.
Enterprise 2.0
Similarly, the inclusion of Web 2.0 technologies into an enterprises business processes, intranet
and extranet is sometimes referred to as Enterprise 2.0. Most enterprise 2.0 followers use a
combination of blogs, social networking and social collaborative tools as well as free, paid and
homegrown technologies. The term Enterprise 2.0 was coined by Harvard Business School
Associate Professor Andrew McAfee in an MIT Sloan Management Review he named
"Enterprise 2.0: The Dawn of Emergent Collaboration."
Web 2.0 suicide
So synonymous with Web 2.0 is social networking that the deletion of ones social networking
presences throughout the Internet is referred to as Web 2.0 suicide. There are web applications
designed to facilitate the process, such as the free service Web 2.0 suicide machine. The
application attempts to purge user info on some of the most common social networking presence
points: Facebook, MySpace, LinkedIn and Twitter before adding the user to the Social Network
Suiciders group on Facebook and signing them out.
The future of Web 2:0: Web 3.0
Some industry pundits are already claiming that Web 2.0 is merely a transitional phase between
the early days of the World Wide Web's existence and a more established phase they're calling
Web 3.0, also known as the Semantic Web.
The creator of the World Wide Web, Tim Berners-Lee, suggests that the Web as a whole can be
designed more intelligently to be more intuitive about how to serve a user's needs. Berners-Lee
observes that although search engines index much of the Web's content, they have little ability to
select the pages that a user really wants or needs. He suggests developers and authors, singly or
in collaboration, can use self-descriptions or similar techniques so that new context-aware
programs can better classify the information that might be relevant to a user. Web 3.0 will
involve the publishing of web resources in languages intended for data (such as XML, RDF,
OWL and XHTML) to supplement them with metadata that will allow software to analyze,
classify and deliver content for more personal relevance. The Semantic Annotations for Web
Services group at W3C is defining the specifications for the Web 3.0.
Ubiquitous Computing
The model of Web 3.0s machine-classified, data sharing world creates a basis for ubiquitous
computing. Ubiquitous computing, also known as pervasive computing, is a scenario in which
embedded processing in everyday objects enables intercommunication and unobtrusive data
sharing throughout the users environment. The concept overlaps with that of the Internet of
Things (IoT), in which almost any entity or object imaginable can be outfitted with a unique

identifier (UID) and the ability to exchange data automatically. A modest example of this concept
is a fridge that sends a grocery lists to ones smartphone.

Transcript of Online Systems, Function and Platform


Function of Online System
Photos
Interesting?
Online Shopping System
like comment share
Flow of Client User Browsing in the Web Page
like comment share
Education:
What is a Platform?
What is a System?
a set of principles or procedures according to which something is done; an
organized scheme or method.
Platform
like comment share
Glenn Hung Aguda
Online Systems, Function and Platform
The key term in the definition of platform is 'programmed'. If you can program it,
then it's a platform. If you can't, then it's not
Sample
User reviews are proven sales drivers, and something the majority of customers will
want to see before deciding to make a purchase.
Thank You

Transcript of Online Safety Security Ethics Etiquette


Online Safety Security Ethics Etiquette
Online Safety One of the biggest concerns every parent has for their children is to
keep them safe, whether online or offline (At home, at school, at play). Some new
developments are making online safety easier and improving offline safety as well.
Privacy and Security on the Internet: 5 Tips to Stay Safe
As the Internet becomes an increasingly integral part of daily life, questions about
privacy and security on the Internet are on the rise. Keeping your personal
information, private data and finances safe can be difficult, but by following a few
tips, you can avoid the vast majority of scams, spyware and privacy breaches.
Tip 1. Be Aware
The best tool to avoid spyware and stay safe on the Internet is your own brain. Free
software with no potential upgrades or strings attached, websites that are covered
in flashy ads, and free Wi-Fi in an unexpected place are all signs that something
may be wrong, and ignoring that intuition can get you in trouble. By staying aware
of what you are doing, and thinking about your security while you live your online
life, you stand a better chance of avoiding potentially dangerous situations.
Tip 2: Check for website safety
The Internet can be dangerous because so many websites require your personal
information to either log in to your account or to complete a transaction. Hackers,
thieves and spyware programmers realize this and often try to intercept your
information during these transactions, so make sure you are always dealing with
secure websites and companies. First, only provide your information to reputable
businesses, then ensure that the company's website uses a Web address that starts
with "https" and has a padlock symbol either in the address bar or at the bottom of
the browser. This means that the site encrypts your information, making the data
nearly useless to any thieves or hackers who may intercept the transmission.
Tip 3: Choose strong and varied passwords
For most people, a password is the strongest protection to ward off hackers and
thieves, and yet so many choose passwords that are barely worth the time it takes
to enter them. When creating a password, always use a mix of letters and numbers,
and include a symbol if the website allows it. While more difficult to remember, this
will make your password almost impossible to guess.
More importantly, you have to use different passwords for different websites. Think
about how often you use the same username and password for many online
accounts. Hackers specifically target low-security sites to gain access to large lists
of usernames and corresponding passwords, knowing that many people use the
same combination of credentials for things like online banking.
Tip 4: What is spyware? How do I stop it?

Spyware probably poses the biggest threat to privacy and security on the Internet,
yet so few people really know what it is or how it works. Put simply, spyware is any
piece of software that records your actions or information without your knowledge.
Some spyware is fairly benign, tracking browsing history and keeping the data it
receives anonymous, while other spyware is specifically designed to get your online
banking credentials so thieves can clean out your accounts.
Because it's almost impossible to avoid spyware on your own, having anti-spware
and antivirus programs running on your computer is a must.
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and Internet security, it's important to
remember that most people with privacy issues on the Internet put themselves in
that position. Think about social networking sites and just how much personal
information you have posted there. If someone were trying to steal your identity
and needed your father's middle name or where you went to elementary school
two commonly used security questions you need to think about how a thief could
locate those facts. If you're concerned about Internet privacy, you have to consider
staying away from social networking sites, minimizing the information you put out
there, or maximizing privacy settings on these sites.
Online Etiquette
1.Whenever you work and communicate online, there are some basic rules
you should follow:
Think before you send.
If you send an email or post a message in anger, it could come back to
haunt you later. The same goes for pictures and videos you post online.
Even when something is deleted from a page, it may still be out there
waiting to be found when you least expect it.
2.Respect the time and bandwidth of others.
Don't pass along emails that contain hoaxes, or send messages to the
entire student body. The same goes for sending large videos or
attachments in an email message. It wastes everyone's time when they
have to wade through extra information to get to the important stuff.
Etiquette refers to a code of rules governing behavior in society and includes a
sound knowledge of ethics apart from manners. Etiquette can be acquired through a
conscious learning of what constitutes decent behavior. But in the course of time
etiquette should become a part of unconscious behavior and should appear as his
personality. Each society may be characterized by its distinct etiquette while it is
also possible for different cultures in a society to have its own set of convention and
social norms. Etiquette may be of different kinds such as social etiquette, business

etiquette, office etiquette, computer etiquette and so on.


3. Don't send messages that could be misinterpreted as threatening or hurtful.
Be careful about the language you use as well as the information you pass along
about others. Sending messages that could be seen as threatening may result in
disciplinary action.
4.Follow the conventions of writing when sending formal emails or posting
comments online.
Unless the message you're sending is informal (such as a text message to a friend),
you should use correct spelling, grammar, and punctuation. You shouldn't WRITE IN
ALL CAPS! (It's considered shouting)
5.Respect others' right to privacy.
Don't use technology to pass along rumors or share personal information about
someone without their permission. The same goes for posting names and photos of
others.
Internet safety, or online safety, is the knowledge of maximizing the user's
personal safety and security risks to private information and property
associated with using the internet, and the self-protection from computer
crime in general. As the number of internet users continues to grow
worldwide,[1] internet safety is a growing concern for both children and
adults. Common concerns regarding safety on the internet include:
malicious users (spam, phishing, cyberbullying, cyberstalking etc.),
websites and software (malware, computer viruses, etc.) and various
types of obscene or offensive content. Several crimes can be committed
on the Internet such as stalking, identity theft and more. Most social
networking and chat sites have a page about safety. Numerous groups,
governments and organizations have expressed concerns about the safety
of children using the Internet.
What Are Online Ethics?
Online ethics refers to patterns of behavior used when on the Internet, guided both
by law and personal philosophy. The great capabilities of this communication
medium allow for the potential of great harm, cruelty, and even crime. Major
concerns in the field of online ethics include the protection of private information,
the limits of a presumed freedom of expression, and issues of libel. Understanding
legal ramifications and trusting personal philosophy used in other areas of life can
help a person determine his or her online ethics.
Internet security - is a tree branch of computer security specifically
related to the Internet, often involving browser security but also network
security on a more general level as it applies to other applications or
operating systems on a whole. Its objective is to establish rules and
measures to use against attacks over the Internet.The Internet represents

an insecure channel for exchanging information leading to a high risk of


intrusion or fraud, such as phishing. Different methods have been used to
protect the transfer of data, including encryption.

Transcript of Online Safety Security Ethics Etiqutte


Online Security
Online Safety
Online Ethics
Online Etiquette
Thank You
.
.
Internet security - is a tree branch of computer security specifically related to the
Internet, often involving browser security but also network security on a more
general level as it applies to other applications or operating systems on a whole. Its
objective is to establish rules and measures to use against attacks over the
Internet.The Internet represents an insecure channel for exchanging information
leading to a high risk of intrusion or fraud, such as phishing. Different methods have
been used to protect the transfer of data, including encryption.
Online Etiquette
PLATFORMS
Social
SOCIAL
SEO
CMS
Online Safety Security Ethics Etiquette
Internet Etiquette
is online communication that makes everyone comfortable. The internet is a group
of computers that are connected, etiquette is a social code. That is the technical
definition of the words. Combing the words into a term enables it to become a
philosophy or part of one.
3.
Don't send messages that could be misinterpreted as threatening or hurtful.
Be careful about the language you use as well as the information you pass along
about others. Sending messages that could be seen as threatening may result in
disciplinary action.

4.
Follow the conventions of writing when sending formal emails or posting comments
online.
Unless the message you're sending is informal (such as a text message to a friend),
you should use correct spelling, grammar, and punctuation. You shouldn't WRITE IN
ALL CAPS! (It's considered shouting)
5.Respect others' right to privacy.
5
. Don't use technology to pass along rumors or share personal information about
someone without their permission. The same goes for posting names and photos of
others.

Almero, Keisha Mae


Arnedo, Nicole
Ugao, Dan Michael
Online Safety is one of the biggest concerns every parent has for their children is to
keep them safe, whether online or offline (At home, at school, at play). Some new
developments are making online safety easier and improving offline safety as well.
Online ethics
refers to patterns of behavior used when on the Internet, guided both by law and
personal philosophy. The great capabilities of this communication medium allow for
the potential of great harm, cruelty, and even crime. Major concerns in the field of
online ethics include the protection of private information, the limits of a presumed
freedom of expression, and issues of libel. Understanding legal ramifications and
trusting personal philosophy used in other areas of life can help a person determine
his or her online ethics.

Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety and security risks to private information and property associated with using
the internet, and the self-protection from computer crime in general. As the number
of internet users continues to grow worldwide,[1] internet safety is a growing
concern for both children and adults. Common concerns regarding safety on the
internet include: malicious users (spam, phishing, cyberbullying, cyberstalking etc.),
websites and software (malware, computer viruses, etc.) and various types of
obscene or offensive content. Several crimes can be committed on the Internet such
as stalking, identity theft and more. Most social networking and chat sites have a
page about safety. Numerous groups, governments and organizations have

expressed concerns about the safety of children using the Internet.


Online Etiquette
1
.Whenever you work and communicate online, there are some basic rules you
should follow:
Think before you send.
If you send an email or post a message in anger, it could come back to haunt you
later. The same goes for pictures and videos you post online. Even when something
is deleted from a page, it may still be out there waiting to be found when you least
expect it.

2
.Respect the time and bandwidth of others.
Don't pass along emails that contain hoaxes, or send messages to the entire
student body. The same goes for sending large videos or attachments in an email
message. It wastes everyone's time when they have to wade through extra
information to get to the important stuff.
Group 2
Privacy and Security on the Internet: 5 Tips to Stay Safe
Tip 1. Be Aware
The best tool to avoid spyware and stay safe on the Internet is your own brain. Free
software with no potential upgrades or strings attached, websites that are covered
in flashy ads, and free Wi-Fi in an unexpected place are all signs that something
may be wrong, and ignoring that intuition can get you in trouble. By staying aware
of what you are doing, and thinking about your security while you live your online
life, you stand a better chance of avoiding potentially dangerous situations.
Tip 2: Check for website safety
The Internet can be dangerous because so many websites require your personal
information to either log in to your account or to complete a transaction. Hackers,
thieves and spyware programmers realize this and often try to intercept your
information during these transactions, so make sure you are always dealing with
secure websites and companies. First, only provide your information to reputable
businesses, then ensure that the company's website uses a Web address that starts
with "https" and has a padlock symbol either in the address bar or at the bottom of
the browser. This means that the site encrypts your information, making the data
nearly useless to any thieves or hackers who may intercept the transmission.
Tip 3: Choose strong and varied passwords

For most people, a password is the strongest protection to ward off hackers and
thieves, and yet so many choose passwords that are barely worth the time it takes
to enter them. When creating a password, always use a mix of letters and numbers,
and include a symbol if the website allows it. While more difficult to remember, this
will make your password almost impossible to guess.
More importantly, you have to use different passwords for different websites. Think
about how often you use the same username and password for many online
accounts. Hackers specifically target low-security sites to gain access to large lists
of usernames and corresponding passwords, knowing that many people use the
same combination of credentials for things like online banking.
Tip 4: What is spyware? How do I stop it?
Spyware probably poses the biggest threat to privacy and security on the Internet,
yet so few people really know what it is or how it works. Put simply, spyware is any
piece of software that records your actions or information without your knowledge.
Some spyware is fairly benign, tracking browsing history and keeping the data it
receives anonymous, while other spyware is specifically designed to get your online
banking credentials so thieves can clean out your accounts.
Because it's almost impossible to avoid spyware on your own, having anti-spware
and antivirus programs running on your computer is a must.
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and Internet security, it's important to
remember that most people with privacy issues on the Internet put themselves in
that position. Think about social networking sites and just how much personal
information you have posted there. If someone were trying to steal your identity
and needed your father's middle name or where you went to elementary school
two commonly used security questions you need to think about how a thief could
locate those facts. If you're concerned about Internet privacy, you have to consider
staying away from social networking sites, minimizing the information you put out
there, or maximizing privacy settings on these sites.
The Internet offers so many opportunities to explore, create and collaborate. And to
make the most of the web, its important to keep yourself safe and secure. Whether
youre a new Internet user or an expert, the advice and tools here can help you
navigate the web safely and securely
Secure Your Passwords
Passwords are the first line of defense against cyber criminals. Its crucial to pick
strong passwords that are different for each of your important accounts and it is
good practice to update your passwords regularly. Follow these tips to create strong
passwords and keep them secure.
Signing in and out
Signing into your Google Account is simple just click on the Sign in button in the

top right corner of any Google service to check your Gmail, upload a video to
YouTube or just to get more relevant search results.
But when using public computers like in a cybercafe or library, remember that you
may still be signed into any services youve been using even after you close the
browser. So when using a public computer, be sure to sign out by clicking on your
account photo or email address in the top right corner and selecting Sign out.
Managing Multiple Accounts
Many devices now support multiple online accounts. This means youre in control of
which account you use, and when. And even if you are signed in to multiple Google
Accounts on the same device, personal information from one Google Account is not
combined with information from any other Google Account, unless you decide to link
those accounts together.
You can toggle between your Google Accounts easily and quickly, both on desktop
and on mobile. For example, you can add a secondary Google Account when youre
signed in on your main account and switch back and forth between them. And on
newer Google tablets with multi-user modes like the Nexus 7, it is simple for
multiple accounts to be associated with one device. This makes it easy for different
people in your family to check their email or access their apps without having to
sign in and out. Once you have set up a primary account, you can easily add
accounts in the device settings.
Use Secure Networks
Its good to be extra careful whenever you go online using a network you dont
know or trust like using the free Wi-Fi at your local cafe. The service provider can
monitor all traffic on their network, which could include your personal information.
However, if you are using a service that encrypts your connection to the web
service, it can make it much more difficult for someone to snoop on your activity. By
default, we encrypt the Gmail connection between your computer and Google this
helps protect your Google activity from being snooped on by others.
Lock Your Screen Or Device
You wouldnt go out for the day and leave your front door wide open, right? The
same principle applies to the devices you use. You should always lock your screen
when you finish using your computer, laptop or phone. For added security, you
should also set your device to automatically lock when it goes to sleep. This is
especially important for phones or tablets, which are more likely to get misplaced
and discovered by people you dont want to access your information, and home
computers that are in shared spaces.

Anda mungkin juga menyukai