Conference PaperPDF Available

WEB TECHNOLOGY KNOWLEDGE MANAGEMENT AND ITS PRIVACY AND SECURITY CHALLENGE

Authors:

Abstract and Figures

Web 2.0 covers a whole range of technology that can enable social networking and other activities across the developed nations and enable effective communication among the user group. The Web 2.0 is adopted by organizations in developed countries to enable IT functions, managing public relationship and human resource to enable interpersonal communication. The future framework around semantic technology and applying effective SOA will define the secure direction of social networking enabled through Web 3.0. The cloud computing evolution will help improve the knowledge management and able to handle big data for these social media platforms. The proposed Web framework will enable multiple content sources, integrate various applications, combine social networking content under highly secure environment and will turn Web 2.0 into a participatory web and making sharing of information and data secure under open source environment. It can provide a complete virtual architecture and will create a global delivery platform for the developed countries. The future framework around semantic technology and applying effective SOA will define the secure direction of social networking enabled through Web 3.0. The cloud computing evolution will help improve the knowledge management and able to handle big data for these social media platforms.
Content may be subject to copyright.
A preview of the PDF is not available
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The spectacular development of the Web 2.0, particularly through online social networks, has awakened much interest in different areas. Marketing is one of them and businesses have decided to experiment with this new type of technology in support to their commercial activities. However, to take advantage of Web 2.0 tools and sites, it is necessary to distinguish their scope and possible applications from a business standpoint. This requires putting Web 2.0 in clear perspective with e-commerce, which is inherently linked to this purpose. In this article, we clarify Web 2.0 and present how it can be used for marketing. In particular, we discuss the role that online social networks may have in e-marketing, and in doing so how such networks might relate to e-commerce. In addition, recommendations for e-commerce researchers are presented based on the evidence obtained.
Article
Full-text available
While the Office of Science and Technology commissioned this review, the views are those of the authors, are independent of Government and do not constitute Government policy.
Article
Full-text available
Web 2.0 systems have drawn the attention of corporation, many of which now seek to adopt Web 2.0 technologies and transfer its benefits to their organizations. However, with the number of different social networking platforms appearing, privacy and security continuously has to be taken into account and looked at from different perspectives. This paper presents the most common security risks faced by the major Web 2.0 applications. Additionally, it introduces the most relevant paths and best practices to avoid these identified security risks in a corporate environment.
Conference Paper
Full-text available
Current research on social networking largely covers US providers. To investigate broader trends, we examine cross-cultural differences in the usage patterns of social networking services with observation and ethnographic interviews in multiple cultures. This appears to be the first systematic investigation of social networking behavior across multiple cultures. We report here on the first four locations with observation and interviews of 36 respondents, 8-10 in each of the US, France, China, and South Korea. The results show three dimensions of cultural difference for typical social networking behaviors: the users' goals, typical pattern of self expression, and common interaction behaviors. These differences exemplify a developmental path of interest in social networking and the gradual integration of social networking behavior into more general communications behaviors. Future work in other cultures and with additional methods will evaluate the hypotheses presented here.
Article
Full-text available
This article explores the relationship between national culture and computer-mediated communication (CMC) in Wikipedia. The articles on the topic game from the French, German, Japanese, and Dutch Wikipedia websites were studied using content analysis methods. Correlations were investigated between patterns of contributions and the four dimensions of cultural influences proposed by Hofstede (Power Distance, Collectivism versus Individualism, Femininity versus Masculinity, and Uncertainty Avoidance). The analysis revealed cultural differences in the style of contributions across the cultures investigated, some of which are correlated with the dimensions identified by Hofstede. These findings suggest that cultural differences that are observed in the physical world also exist in the virtual world.
Article
Full-text available
In order to inform educators in higher education on the integration of Web 2.0 applications for engaging and effective learning experiences, this survey study compared the use and acceptance of Web 2.0 applications between American and Korean college students through the lens of cultural differences. Undergraduate students were recruited to participate in this study in the U. S. and the South of Korea, producing 183 usable responses. Targeting six Web 2.0 applications (blogs, instant messenger, online social communities/Facebook, online video sharing/YouTube, online video & audio conference/Skype, and social virtual communities/Second Life) the survey investigated five categories of technology acceptance based on the Unified Theory of Acceptance and Use of Technology. Significant differences on utilization level and the anxiety level for using them were found in numerous Web 2.0 applications. Korean students responded that most Web 2.0 applications are apprehensive for them to use when compared to their counterparts in the U.S.. The study further discussed the observed differences based on cultural theories and their implications on Web 2.0 learning technology integration. © International Forum of Educational Technology & Society (IFETS).
Chapter
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness.
Article
The concept of Enterprise 2.0 that uses the Web 2.0 technology for corporate affairs is expandino. The ooncept of Enterprise 2.0 is implemented by combining technologies for blogging, SNS, Wiki and RSS as well as open-source software. Enterprise 2.0 may be delivered to the customer as a service as well as a system.
Article
In lase years with all of the attention paid to social networks (SN) and Web 2.0 tools these days, it is important to both explore their uses and evaluate their effectiveness in supporting communication, developing, and revolutions of countries, are rapidly evolving technology and play an important role in every daily life activities in societies. This technology includes wikis(Wikipedia, Seedwiki), blog, micro blogging (Twitter), YouTube, social book marking, podcasts, Second Life (virtual communities), and RSS.This paper will illustrate how Web 2.0 technology has been successfully used as a supplement for communicative practice in societies. Moreover, this paper explores the impact of communication SNs, Web 2.0 technologies, and the Internet in particular, has been widely credited as contributor to the democracy and freedom of countries. Some challenges of SNs and Web 2.0 have been overviewed. In addition to, the role of such technologies has been influenced by the Tunisian and Egyptian revolutions in 2011 which have been explained and highlighted in this work.