The Hidden Dangers of Social Networks: You can log-on but you cannot hide

Post on 27-Jun-2015

4613 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Talk by Stuart Lee on "The Hidden Dangers of Social Networks: You can log-on but you cannot hide" at the UKOLN Workshop on "Exploiting The Potential Of Blogs and Social Networks".See

Transcript

The Hidden Dangers: You can

Log-on But You Cannot Hide

The Hidden Dangers: You can

Log-on But You Cannot Hide

Dr Stuart D Lee

Oxford University Computing Services

OverviewOverview

The importance of Web 2.0 The impact on a central IT

service Changing expectations Some Concerns Issues of identity

The importance of Web 2.0 The impact on a central IT

service Changing expectations Some Concerns Issues of identity

“Web 2.0, refers to a perceived second generation of Web-based communities and hosted services — such as social-networking sites, wikis and folksonomies — which aim to facilitate collaboration and sharing between users”

+ usually free

Web 2.0 AppsWeb 2.0 AppsType Function Tools

Communicative Share ideas/data Blogs (audio/video)IMPodcastsWebcams

Collaborative Work with others Editing/writing toolsVCOPsWikis

Documentative Collect evidence, present ideas over time

BlogsE-portfolios

Generative Create something new MashupsVCOpsVLWs

Interactive Exchange information/ideas Learning objectivesSocial bookmarksVCOPsVLWs

McGee, P. and Diaz, V. ‘Wikis and Podcasts and Blogs! Oh, My!’ Educause Review (Sep/Oct 2007)

‘5-Factors Driving Change in IT’ Gartner‘5-Factors Driving Change in IT’ Gartner

Web 2.0 - disrupts existing models: ‘Web 2.0 communities, such as MySpace and wikis, connect people in ways that many companies hadn't anticipated when they began to develop their online strategies.’

Experiment with free-form environments. "Social environments" are the wave of the future. Companies should provide interactive tools, such as content tagging systems, RSS feeds, blogs, wikis, etc.

http://www.campustechnology.com/articles/52239

Web 2.0 - disrupts existing models: ‘Web 2.0 communities, such as MySpace and wikis, connect people in ways that many companies hadn't anticipated when they began to develop their online strategies.’

Experiment with free-form environments. "Social environments" are the wave of the future. Companies should provide interactive tools, such as content tagging systems, RSS feeds, blogs, wikis, etc.

http://www.campustechnology.com/articles/52239

Not just IT servicesNot just IT services

Stephens, M. Web 2.0 and Libraries: Best Practices for Social Software (Library 2.0)

McKiernan, G. ‘Social Networking Sites for Engaged Library Services’ - http://www.public.iastate.edu/~gerrymck/LITANationalForum2007.ppt

Stephens, M. Web 2.0 and Libraries: Best Practices for Social Software (Library 2.0)

McKiernan, G. ‘Social Networking Sites for Engaged Library Services’ - http://www.public.iastate.edu/~gerrymck/LITANationalForum2007.ppt

Impact on Central ITImpact on Central IT

Increased burden on services Increased demand for new services

- changing user expectations Out-sourcing, and increased

demands for justifying central services

Hidden perils

Increased burden on services Increased demand for new services

- changing user expectations Out-sourcing, and increased

demands for justifying central services

Hidden perils

Impact on Central ITImpact on Central IT

Increased burden on services Increased demand for new services

- changing user expectations Out-sourcing, and increased

demands for justifying central services

Hidden perils

Increased burden on services Increased demand for new services

- changing user expectations Out-sourcing, and increased

demands for justifying central services

Hidden perils

‘Stephanie Hardwick does not consider herself to be a technology addict, but she carries two MP3 players - an Apple iPod and a Creative Zen - around with her and says she cannot imagine doing her university degree without the internet. A lot of the journals I need are online and I use the internet for everything, like booking tickets, to getting trains, yellow pages. モ The 21-year-old student studying English at Oxford University says she spends at least an hour a day on Facebook, the social networking site, and downloads some of the plays and books she has to read for her course on to her Zen player, so she can listen to them while working out at the gym…’

FT 29/10/07http://www.ft.com/cms/s/0/71cb770e-85b1-11dc-8170-0000779fd2ac.html?nclick_check=1

Surveys (1)Surveys (1)

JISC’s ‘Great Expectations’ - http://www.jisc.ac.uk/news/stories/2007/09/expectations

‘65% ‘regularly’ use social networking sites, such as Facebook, MySpace or Flickr (females more than males - 71% and 59% respectively) and only 5% ‘never’ use them’

JISC’s ‘Great Expectations’ - http://www.jisc.ac.uk/news/stories/2007/09/expectations

‘65% ‘regularly’ use social networking sites, such as Facebook, MySpace or Flickr (females more than males - 71% and 59% respectively) and only 5% ‘never’ use them’

Surveys (2)Surveys (2)

THEMA - Exploring the experiences of Master's students in technology-rich environments (http://www.oucs.ox.ac.uk/ltg/projects/thema/)

YouTube Facebook Second Life

THEMA - Exploring the experiences of Master's students in technology-rich environments (http://www.oucs.ox.ac.uk/ltg/projects/thema/)

YouTube Facebook Second Life

But …But … Educause Centre for Applied Research (ECAR)

2006 showed 70.6% use Facebook several times a week, same number download music/videos

But students prefer moderate technology use, and new students prefer even less.

‘Don’t bother with IM or Facebook - that’s our network. Leave us alone’

‘Don’t enter our world to [contact us] … we’ll come to you’

Berg, J., Berquam, L., and Christoph, K. ‘Social Networking Technologies: a “poke” for Campus Services’ Educause Review (March/April 2007)

Educause Centre for Applied Research (ECAR) 2006 showed 70.6% use Facebook several times a week, same number download music/videos

But students prefer moderate technology use, and new students prefer even less.

‘Don’t bother with IM or Facebook - that’s our network. Leave us alone’

‘Don’t enter our world to [contact us] … we’ll come to you’

Berg, J., Berquam, L., and Christoph, K. ‘Social Networking Technologies: a “poke” for Campus Services’ Educause Review (March/April 2007)

Web 2.0 ‘speed-bumps’Web 2.0 ‘speed-bumps’

Security Identity Privacy Business Model

‘A World of Widgets, Wikis, and Mashups’

www.pcw.co.uk, October 2007

Security Identity Privacy Business Model

‘A World of Widgets, Wikis, and Mashups’

www.pcw.co.uk, October 2007

Concerns (1)Concerns (1)

‘… we are currently looking into using external Web 2.0 services as part of and after our online courses. Obviously as part of this we need to consider the legal/institutional aspects of this provision’

‘… we are currently looking into using external Web 2.0 services as part of and after our online courses. Obviously as part of this we need to consider the legal/institutional aspects of this provision’

Concerns (2)Concerns (2)

‘What shocked me about the Facebook audience was how willing they were - and are - to provide information about themselves for benefits that you and I might consider questionable.’

Appvertising ‘Facebookers abandon online privacy

for virtual doo-doo’ October 2007, http://www.theregister.co.uk/2007/10/09/facebookers_throw_virtual_feces/

‘What shocked me about the Facebook audience was how willing they were - and are - to provide information about themselves for benefits that you and I might consider questionable.’

Appvertising ‘Facebookers abandon online privacy

for virtual doo-doo’ October 2007, http://www.theregister.co.uk/2007/10/09/facebookers_throw_virtual_feces/

Concerns (3)Concerns (3)

‘Web 2.0 and client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage’

‘Web 2.0 tops emerging cyber-threats’ http://www.campustechnology.com/articles/51890

‘Web 2.0 and client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage’

‘Web 2.0 tops emerging cyber-threats’ http://www.campustechnology.com/articles/51890

Concerns (4)Concerns (4)

‘We may share your information with third parties, including responsible companies with which we have a relationship’

No way to delete your personal data University IT Regulations 6.2 - ‘Any

password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person’

‘We may share your information with third parties, including responsible companies with which we have a relationship’

No way to delete your personal data University IT Regulations 6.2 - ‘Any

password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person’

SecondLifeSecondLife

Kirriemuir’s snapshot (Sep, 2007): http://www.eduserv.org.uk/upload/foundation/sl/uksnapshot092007/final.pdf

Kirriemuir’s snapshot (Sep, 2007): http://www.eduserv.org.uk/upload/foundation/sl/uksnapshot092007/final.pdf

SecondLifeSecondLife

It’s a waste of money It damages the University’s

reputation (it’s a game, it’s full of porn …)

It’s a waste of money It damages the University’s

reputation (it’s a game, it’s full of porn …)

What is an IT provider to do?What is an IT provider to do?

Explore provision (e.g. PP and iTunesU) but also welcome SaaS

Tread carefully - ‘fad from future’ Educate re privacy Educate re libel Educate re copyright Use tools themselves:

- Director’s Blog- Wikinomics- ‘Crowd-sourcing’

Explore provision (e.g. PP and iTunesU) but also welcome SaaS

Tread carefully - ‘fad from future’ Educate re privacy Educate re libel Educate re copyright Use tools themselves:

- Director’s Blog- Wikinomics- ‘Crowd-sourcing’

Stuart Lee

Stuart.lee@oucs.ox.ac.uk

top related