References
Bernoff, J., & Li, C.. (2008). Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review, 49(3), 36-42.
Cunningham, P., & Wilkins, J.. (2009). A Walk in the Cloud. Information Management Journal, 43(1), 22-24,26,28-30,54.
Mansfield-Devine, S.. (2008). Anti-social networking: exploiting the trusting environment of Web 2.0. Network Security, 2008(11), 4-7.
Orr, B.. (2008). Security 2.0: Not just a new kettle of phish. American Bankers Association. ABA Banking Journal, 100(2), 54-55.
Tim O'Reilly. (2006, July). Web 2.0: Stuck on a Name or Hooked on Value? Dr. Dobb's Journal, 31(7), 10.
Provos, N., Rajab, M., & Mavrommatis, P.. (2009). Cybercrime 2.0: When the Cloud Turns Dark. Association for Computing Machinery. Communications of the ACM, 52(4), 42.
Short, J. (2008). Risks in a Web 2.0 World. Risk Management, 55(10), 28-31,4.
Warr, W.. (2008). Social software: fun and games, or business tools? Journal of Information Science, 34(4), 591.
Appendices:
Appendix a: Web 2.0 Meme Map
Source: (O'Reilly, 2006)
Appendix B: Web 2.0 Applications
WEB 2.0 APPLICATIONS
Applications
Descriptions
Blogs
Online diary or journal entry on the Internet, which primarily supports text, photo (photoblog), video (vlog), and audio (podcast) formats
• Google, AOL, and Yahoo offer free blogging platforms
Mashup
• Web service that gathers related content from more than one source
• IBM's mashup applications enable project managers to match team resources with a map to identify the geographical locations of the resources
Peer-to-Peer Networking
• a technique for effectively sharing music, audio, and text files
• Napster and Gnutella are...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now