Archiv

Posts Tagged ‘Privacy’

Security, Privacy, Ethics, and Legal Consideration

„These technological advancements do not come without challenges. Security, privacy, ethics, and legal considerations all play a major role in how these technologies develop over time. The time has come, however, for companies to begin to determine strategies for utilizing these technologies in order to remain competitive in the global business arena.“

Deans, Candace P. und Ali, Nadira (2009): The Enterprise 2.0 Organization. In: Deans, P. Candace (Hrsg.), Social Software and Web 2.0 Technology Trends. New York, Information Science Reference: 44.

Advertisements

Concerns about Social Software

„[…] most businesses will be legitimately concerned about corporate information security. […]

Social Software also raises privacy concerns in the enterprise domain, but not in the public domain. […]

In many businesses, social software is viewed by some as a way for employees to waist time.“

Quelle: Burkhardt, Peter (2009): Social Software Trends in Business: Introduction. In: Deans, P. Candace (Hrsg.), Social Software and Web 2.0 Technology Trends. New York, Information Science Reference: 12-13.

Who Owns The Data?

„A further point must be noted with regard to data, and that is user concerns about privacy and their rights to their own data. In many of the early web applications, copyright is only loosely enforced. For example, Amazon lays claim to any reviews submitted to the site, but in the absence of enforcement, people may repost the same review elsewhere. However, as companies begin to realize that control over data may be their chief source of competitive advantage, we may see heightened attempts at control.

Much as the rise of proprietary software led to the Free Software movement, we expect the rise of proprietary databases to result in a Free Data movement within the next decade. One can see early signs of this countervailing trend in open data projects such as Wikipedia, the Creative Commons, and in software projects like Greasemonkey, which allow users to take control of how data is displayed on their computer.“

Zugriff: 17.10.2010
Quelle: http://oreilly.com/pub/a/web2/archive/what-is-web-20.html?page=3

Kategorien:Anwendung, Risiken Schlagwörter: , , ,