TITLE

Don't make a Web 2 ass of yourself

AUTHOR(S)
Datta, Raj
PUB. DATE
April 2010
SOURCE
Information World Review;Apr2010, Issue 264, p04
SOURCE TYPE
Trade Publication
DOC. TYPE
Opinion
ABSTRACT
The author discusses the common social software missteps. According to the author, the belief that when one deploys his social software and all else will happen is completely unrealistic unless the enterprise already has a history and culture of community and coordination. He also argues the restriction to the use of social software because he believes that as long as people's performance is handled on the basis of their output, results and effect, the things they do online will totally be negligible.
ACCESSION #
49191021

 

Related Articles

  • A disservice to security? Castle, Ian // SC Magazine: For IT Security Professionals (UK Edition);Dec2007, p21 

    In this article, the author discusses the emergence of the concept of software as a service (SaaS). The author discusses the programme that covered key aspects behind SaaS. He highlights the creation of Web 2.0 applications by software developers. He cites the promotion of the concept of the...

  • Web 2.0: A Kernel of Cool for CIOs. Singer, Larry J. // Public CIO;Feb2008, Vol. 6 Issue 1, p54 

    The article focuses on the basis, characteristics and significance of Web 2.0. Principles of Web. 2.0 include participation of people in an online activity and the creation of valuable content. Web 2.0 allows the formation of a community that can provide information, interaction and luxury. Web...

  • Applying the Technology Acceptance Model and Flow Theory to Cyworld User Behavior: Implication of the Web2.0 User Acceptance. Dong-Hee Shin; Won-Young Kim // CyberPsychology & Behavior;Jun2008, Vol. 11 Issue 3, p378 

    This study explores attitudinal and behavioral patterns when using Cyworld by adopting an expanded Technology Acceptance Model (TAM). A model for Cyworld acceptance is used to examine how various factors modified from the TAM influence acceptance and its antecedents. This model is examined...

  • The attack almanac. Amit, Iftach Ian // Engineering & Technology (17509637);1/16/2009, Vol. 4 Issue 1, p68 

    E-crime is not random - it follows world events and seasonal trends. So adopting an anticipatory security strategy can help close vulnerabilities. Traditional enterprise security methods are caught in a vicious cycle. Cyber-criminals take the initiative to set the strategy of attacks, the...

  • Consumer As Advertiser: A Conceptual Perspective. Uzunoğlu, Ebru // Global Media Journal: Turkish Edition;Sep2011, Vol. 2 Issue 3, p138 

    The new mode of Internet, called Web 2.0, is a place which people actively use to share their emotions, thoughts, experiences, and memories on a daily basis. Additionally, they do not only share all of these in written format, but also express themselves visually by using photos and videos...

  • The Social Web beyond "Walled Gardens": Interoperability, Federation and the Case of Lorea/n-1. Cabello, Florencio; Franco, Marta G.; Haché, Alex // PsychNology Journal;2013, Vol. 11 Issue 1, p43 

    This paper starts from the warning given by Tim Berners-Lee about the present threats to the social web with a view to analyzing the main limitations of the Web 2.0 paradigm (fragmentation, centralization, control and risks to privacy). The authors continue on to describe several proposals...

  • Open Everything. Farkas, Meredith // American Libraries;Mar2008, Vol. 39 Issue 3, p34 

    The article offers highlights of the Midwinter for American Libraries held in Philadelphia, Pennsylvania in 2008. The term Web 2.0 was on the lips of many vendors. If the discussion at the 18th Annual Presidents Seminar of RMG could be summed up in one word, it would be open. While most of the...

  • Open Everything. Farkas, Meredith // American Libraries;Mar2008, Vol. 39 Issue 3, p34 

    The article offers highlights of the Midwinter for American Libraries held in Philadelphia, Pennsylvania in 2008. The term Web 2.0 was on the lips of many vendors. If the discussion at the 18th Annual Presidents Seminar of RMG could be summed up in one word, it would be open. While most of the...

  • Governments Globally Adopt Web 2.0. Newcombe, Tod // Public CIO;Oct2008, Vol. 6 Issue 5, p29 

    The article claims that Web 2.0 represents a change in how things are done, and government is beginning to adopt this new technology. Early adopters include: the federal government of the U.S. with its consolidated portal and Gov Gab, the topical blog posted by the General Services...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics