Verified Document

Web 2.0 Technologies & Applications Thesis

Related Topics:

The era of 2004 to today in fact has created a blogging industry that is pervasive in its availability of publishing platforms (USC Annenberg School of Journalism) and also in its readers for organizing and aggregating content of interest (Boeri, 2007). Since 2004, technologies have emerged for completing text mining of blogs to find linguistic patterns in the mass of posts and also build linguistic models that represent public opinion. The use of latent semantic indexing as a technology has become prevalent as a result.

Wikis are also a form of consumer-generated media and were initially developed in 1994 with the first Wiki being introduced in 1995.

The term Wiki was chosen as it means quick in Hawaiian when one of the initial developers of this technology was visiting when he heard the term. Wikis are actually semi-structured content management systems that make it possible for organizations to quickly share content across departments in real-time. Wikis also are created to organize content hierarchically as conversation threads are defined and therefore make for content management system that records events and knowledge as they are created (Cronin, 2009). Wikis are predominantly used behind company's firewalls as the information published in them is highly sensitive. The best known publicly known Wiki is Wikipedia.Org and online dictionary anyone who opts in to the site can contribute content to. Wikipedia.org is currently published in ten languages. Another highly visited site is craigslist.org which operates on the same Wiki-based approach to posting more commercially oriented content including selling, buying, trading and job placements. Both blogs and Wikis are predicated more on the fundamentals of HTML and HTTP protocols, with the latest generations of both technologies relying increasingly on AJAX-oriented technologies for the best possible performance of their user interfaces of these technologies.

Pros and Cons of these Blogs and Wikis

There are many benefits of relying on blogs and Wikis for communicating both inside and outside an organization. The pros and cons of blogs are presented, followed by the pros and cons of Wikis (Cronin, 2009).

Blogs

Pros

Encourages knowledge sharing and collaboration both with customers when used outside the company, and with employees and contributors when used inside the company.

Fosters greater internal team building

Can be upgraded more frequently and easier than newsletters at a greatly reduced cost

Relies on thin-client technology to make it possible to create entries at any time, from any location

Possible to syndicate content in a blog using syndication and blog readers to make it more valuable over time

Companies can use blogs to engage with customers on new product development ideas, solicit feedback on new products, and improve product designs

Cons

Many companies struggle with governance issues relating to the use of blogs as there have been incidents where company secrets and also company criticisms involving confidential information are aired in public.

Once a blog has been created it takes significant time commitments to keep it up and running. The creation and maintenance of a blog take an inordinate amount of time to keep fresh with valid and usable content.

Blogs can quickly degenerate into complaint sessions with customers if not monitored closely and managed well.

Blogging has become so popular that Microsoft has over 1,200 employees blogging today and requires governance and the same time a concentrated effort to make sure blogging efforts remain balanced yet do not compromise the organizations many trade secrets and technological advantages.

Wikis

Pros

Low cost content management system that is easily implemented through open source components.

Thin client that can be deployed on any laptop.

Chronological order of comments allows for replicating how knowledge is created.

Consistent with AJAX-based programming and J2EE programming standards (Cronin, 2009).

Can be configured to operate behind a firewall.

Cons

While the content is chronological in structure it is not easily tagged or analyzed as traditional and more robust structured content management systems do.

Lack of support for advanced syndication technologies.

Numerous reports of "spoofing" and spurious comments on public Wikis claiming accomplishments not earned and lack of validity to Wiki posts overall has this form of collaboration on public sites under scrutiny and at times lacking credibility.

The use of blogs and Wikis needs to be considered in the context of a broader Web 2.0-based communications and collaboration strategy. Web 2.0 refers to the second generation of services available on the Interne to enable enhanced online collaboration and information sharing.

Table 1 provides an overview of all Web 2.0 technologies. It is the recommendation of this report to look at blogs not only as a collaboration platform inside an organization, but more importantly, the building of collaborative relationships with customers outside the company as well. Standards and governance would also need to...

Wikis on the other hand need to be considered purely internally-focused collaborative applications for organizing and cataloging knowledge as it is created. Wikis, given the spurious and often low credibility of postings on public sites, needs to only be used in those scenarios where the posters can be verified and their contributions validated
Integrating User-Generated Content into Web 2.0 Applications

Inherent in the user dynamics of the map completed by O'Reilly and Battelle are the theoretical foundations of social networking (O'Reilly, 2005).

Specifically the architecture of participation, remixable data sources and data transformations (also known as mash-ups in Web 2.0 vernacular), and the harnessing of collective intelligence are the user-defined taxonomies are factors that have collectively served as the catalyst for the growth of social networking.

Social networking is bringing an entirely new level of participation and interactive feedback to nearly every task completed online. With the growth in social networking participation through the variety of websites and applications, the impacts to society are starting to be seen, mostly from gaps in the existing collaborative platform that supports these applications (Hatala, Lutta, 2009). First, there is the issue of authenticity and validating the true identity of someone within a social networking context. Facebook and MySpace both do not today have a highly reliable identity authentication process in place; hence the concern of many parents regarding their children participating on these sites and the risk of interacting with strangers who may or may not be who they present themselves as online. Second, social networking is bringing an entirely new level of immediate transparency to the online communication process, inviting thousands if not millions of people to communicate with one another (Jones, 2008). Blogs and Wikis were the precursor to this aspect of social networking's impact on society today. These three factors of blogs, Wikis and the emerging set of social networking applications are forcing transparency to the forefront of what is considered credible online behavior; to be oblique or not forthcoming about ones' true intentions online is to not be trusted at the least and ostracized at the worst. Third, the complex issue of how relationships are created, sustained, and how trust is eventually created is also one of the main issues that is impacting the adoption of social networking globally. Fourth, there are the concerns within organizations that their proprietary and confidential information will be either intentionally or accidentally shared through social networking sites. There are also the concerns over what is said about an organization by its employees on blogs, Wikis and through sessions on social networking sites. Google, IBM, Intel, Oracle, Microsoft and many other technology-related companies have been quick to define standards for their employees to follow for blogging specifically and social networking in general. These guidelines look to both protect valuable intellectual property and proprietary data, yet also give employees the flexibility of promoting the company and their contributions. The potential for conflicts of interest and the ethical dichotomy of having employees participate in social networking and media, known to be the new framework of global free speech, yet monitoring them either loosely through policies or rigorously by filtering, is one of the emerging paradoxes society is going to have to deal with well into the future as well (Hauser, Tappeiner, Walde, 2007).

Contrary to these limitations that the gaps in the collaborative platform that social networking is based on are the many advantages and advances in collaboration within and between organizations and companies of all types. While the initial direction of social networking vendors and sites was to seek balkanization of the global social networking user base by segmenting using their own technologies and processes for communicating, there's an increasing pressure to make all forms of social networking communicate with one another. As has been referenced, Google's API to unify all social networking sites and applications is a case in point, as are the emerging group of start-up companies that seek to create a more unified collaborative architecture where all social networking applications and processes can be integrated together. On a small scale this is already happening mostly within the four walls of companies, protected by firewalls to ensure proprietary and highly confidential data is not leaked or hacked from the outside. The use…

Sources used in this document:
References

Josh Bernoff, Charlene Li. 2008. Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review 49, no. 3 (April 1): 36-42. http://www.proquest.com (Accessed March 14, 2009)

Robert Boeri. (2007, December). Content 2.0 Converges. EContent, 30(10), 22.

Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1394701741).

Eric Bonabeau. (2009). Decisions 2.0: the Power of Collective Intelligence. MIT Sloan Management Review, 50(2), 45-52. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1625861001).
Roxanne E. Christ, Jeanne S. Berges, Shannon C. Trevino. 2007. Social Networking Sites: To Monitor or Not to Monitor Users and Their Content? Intellectual Property & Technology Law Journal 19, no. 7 (July 1): 13-17. http://www.proquest.com (Accessed March 14, 2009).
Sona Hathi 2008. Billions lost from social networking. Strategic Communication Management 12, no. 2 (February 1): 9. http://www.proquest.com (Accessed March 14, 2009).
Christoph Hauser, Gottfried Tappeiner, Janette Walde. 2007. The Learning Region: The Impact of Social Capital and Weak Ties on Innovation. Regional Studies 41, no. 1 (February 1): 75. http://www.proquest.com (Accessed March 14, 2009).
VINE 37, no. 1 (January 1): 49. http://www.proquest.com (accessedA March 20, 2009).
http://www.proquest, com (Accessed March 14, 2009).
EContent, March 1, 10-11. http://www.proquest.com (Accessed March 14, 2009).
Scott Kirsner 2007. Web 1.0 vs. Web 2.0; a critical look back at the hype surrounding Web 2.0 and how it compares to the dotcom boom. CIO, July 1, 1. http://www.proquest.com (Accessed March 14, 2009).
Andrew P. McAfee 2006. Enterprise 2.0: The Dawn of Emergent Collaboration. MIT Sloan Management Review 47, no. 3 (April 1): 21-28. http://www.proquest.com (Accessed March 14, 2009).
O'Reilly, 2005. What is Web 2.0. Design Patterns and Business Models fo the next generation of Software. Tim O'Reilly. September 30, 2005. Accessed from the Internet on March 14, 2009: http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Branding New Service Dominant Logic
Words: 12522 Length: 50 Document Type: Dissertation

Branding in Service Markets Amp Aim And Objectives Themes for AMP Characteristics Composing Branding Concept Branding Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Categories and Themes Branding Theory Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Branding Concept Characteristics Characteristics Composing Branding Concept Sampling of Studies Reviewed Evolution of Branding Theory Evolution of Marketing Service-Brand-Relationship-Value Triangle Brand Identity, Position & Image Just as marketing increasingly influences most aspects of the consumer's lives, brands

Small Computer Systems Proposed Research
Words: 4808 Length: 15 Document Type: Term Paper

According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and

Aloud or in Writing, Making
Words: 17261 Length: 55 Document Type: Thesis

Companies such as XYZ Widget Corporation are well situated to take advantage of burgeoning markets in developing nations, particularly in Asia and Africa. 2. XYZ can grow its business by expanding its operations to certain developing nations in ways that profit the company as well as the impoverished regions that are involved, particularly when marketing efforts are coordinated with nongovernmental organizations operating in the region. 3. Several constraints and challenges must

Verizon Wireless the Following Pages
Words: 3815 Length: 14 Document Type: Term Paper

The current licenses spectrum of Verizon and future ones that are expected to be acquired include: 45 MHz of spectrum, a weighted average of 39.8 MHz, a weighted average of 38.1 MHz, and a weighted average of 34.2 MHz. Combined with the company's CDMA technology, these spectrum licenses are expected to grant the company significant competitive advantage. This situation will further lead to a better anticipation of demand increase

Direct to Consumer Advertising History of Drug
Words: 16271 Length: 59 Document Type: Term Paper

Direct to Consumer Advertising HISTORY OF DRUG ADVERTISING THE DTC ADVERTISING PHENOMENON CREATING DEMAND DECEPTIVE ADVERTISING - A WOLF IN SHEEP'S CLOTHING CAUSE OF DEATH PROFIT UTILIZATION, PRICING, AND DEMOGRAPHICS LEGISLATION, POLITICS AND PATENTS LEGISLATIVE INITIATIVES REGARDING DTC RECALLED and/or DEADLY DRUGS In order to provide the most efficient method of evaluation, the study will utilize existing stores of qualitative and quantitative data from reliable sources, such as U.S. Government statistical references, University studies, and the studies and publications of non-profit

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now