0% found this document useful (0 votes)
144 views75 pages

I Ct:Ani NT Roduct I On

Ict
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views75 pages

I Ct:Ani NT Roduct I On

Ict
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

I

CT:AnI
ntr
oduct
ion
 Youwakeupi nthemor ni
ngandsear chf oryoursmar tphonet oreadmessagesand
checkforFacebookupdates.Asyougooutofyourr oom,youseeyourf at
her
watchi
ngnewsf rom yourfl
at-scr
eent elevision.Youal soseeyouryoungersi st
er
watchi
ngavideoshedownl oadedintohert ablet.Yourmot her,meanwhi l
e,i
s
prepar
ingameal usi
ngar ecipeshej ustsawi nYout ube.Whenyouar ri
veinschool
,
youseealmosteveryonebusywi th t
hei rsmar tphones,eitherplayinganewl y
downloadedonli
negameorupdat ingt heirblogs.You,al ongwi thalmosteveryone
aroundyou,aredrawntowar dsathingort woi nt oday'
stechnologi cal
 t
rends.

 I
tisimportanttostayupdat edwi thknowledgeoft hetrendswear egoingal ongwi th,
especiall
ygiventhatwe  aredealingwi t
hgadget sandel ectronictoolsthroughout
our l
i
ves.Tobeabl etodot hat,wemustknowwhi chspeci f
ictooltouset oassistus
i
ngat heri
ngt hisi
nformation.Theset ool
smaycomeasahar dwar edevi ceorsi mply
anappl i
cati
onsi t
ti
ngi nyourdeskt oporlaptopcomput er s
.Asf orsof tware,weal so
need toknowhowt ousesomeoft headvancedappl i
cat i
onssi ncewear edealing
withthem mostoft het i
meei therasast udentorasapr ofessi
onal .For exampl e,you
needt ofi
nish yourhomewor kusingyourspr eadsheet(e.g.,Mi cr
osof tExcel),but
youar ehavingahar dt i
medet er
mi ni
ngthef or
mulatouset oobt ainthecor r
ect
resul
t.Onemor einstanceiswhenyoudoyourr esearchf oryourt hesisusi ngonline
resources;however ,iti
salreadytakingyouhour ssearchingf orthet hear ti
cleyou
need.

 I
CTi sanacronym  forInformati
onandCommuni cationsTechnol ogy. Agoodway
tothinkaboutICTistoconsi dertheuseoftechnology,whi chenabl esindi
vidual
s,
businessesandor gani
zationstousedigit
alinformati
on.ICTcover sanypr oductthat
will
store,ret
ri
eve,mani pulat
e,tr
ansmitorreceiveinformationelectroni
call
yina
digi
talfor
m.Thiscover sareas undereducation,banking,healt
hcar e,government,
1
business,andsomanybr anchest hatwecant hinkof.
1
.1Cur
rentSt
ateofI
CT
Technol
ogi
es
Technologynowadaysismostlyi
nfl
uencedbyInt
ernetaccessthati
sal
waysunder
constantchangeduetothechangingneedsofconsumers.Thefoll
owi
ngrepr
esent
s
theti
melineofthewebrepresent
ati
onfrom Web1.0upunt i
l3.
0.

Ti
mel
i
neandDef
ini
ti
on
 Web1.0 
isconsi
deredthe 
foundat
ionofwebtechnol
ogy.The obj
ecti
veofWeb
1
.0 
wastoprovideaccesstotheWebi t
self
,makingt
hepeopletoviewandread
t
heinf
ormati
on.Thekeyareasofinter
estcent
eredonprot
ocolssuchasHTTP,
openstandardmar kuplanguagessuchasHTMLandXML,I nter
netaccess
thr
oughISPs,thefi
r stWebbr owser
s,Webdevel
opmentplatf
ormsandt ool
s,
Web-centri
csoftwar el
anguagessuchasJavaandJavascri
pt,t
hecreati
onof
Websites,t
hecommer ci
ali
zati
onoftheWebandWebbusinessmodel s
,andthe
growt
hofkeypor talsontheWeb.

 Theinf
ancyofWeb1 .
0isthepurposeofthebir
thofWeb2. 0,knownast he
secondgener
ati
onofInt
ernet
-basedservi
ces. 
MostoftheInt
ernetnavi
gators
arenowabletoper
for
m modifi
cati
onofinfor
mat i
on,andi
nteractwi
thone
anothertoshar eideasandknowledge.Thi sbecamet headventof  social
networkingsites,wiki
s,communicationt ools,andfol
ksonomi es—t hat
emphasi zeonl i
necoll
aborati
onandshar i
ngamonguser s.Thepur poseoft his
wast omakesur ethatthesi
teaccessedbyanI nt
ernetuserisint
eractive.
Anothert r
endt hathasbeenamaj orf actorinWeb2. 0istheemer genceoft he
mobi l
eInternetandmobi l
edevices(includingcamer aphones)asamaj ornew
pl
atform drivi
ngt headopti
onandgr owt hoft heWeb.

 Web3. 0,thesupposedt hir


dgener ati
onofI nter
net-basedt echnological
i
nnovati
ons,isref
erredtoas  ‘t
heintel
l
igentWeb’ .Atthis 
instance, 
usage of
semanticweb,mi cr
oformat s,nat
urall
anguagesear ch,dat a- mini
ng,machi ne
l
earni
ng,recommendat ionagent s,andar t
ifi
cial
int
ell
igencet echnologies—whi ch
emphasizemachi ne-f
acili
tatedunderstandingofinformat i
oni nordertoprovi
de
amorepr oducti
veandi ntuit
iveuserexperience,becamever ycommon.

 1
.1.
1Web2.
0
 Web2. 0isthecurr
entst
ateofonl
inetechnologyasitcompareswit
htheearly
daysoftheWeb,character
izedbygreateruseri
nter
acti
vi
tyandcoll
aborat
ion,
moreper vasi
venet
workconnecti
vi
tyandenhancedcommuni cat
ionchannels.

 Oneoft hemostsi
gni
ficantdiffer
encesbet weenWeb2. 0andt hetradi
ti
onal
Wor l
dWi deWeb( WWW,r et
roacti
velyreferr
edt oasWeb1 .0)i
sgr eat
er
col
laborati
onamongInternetusers,contentpr ovi
dersandenterpr
ises.
Ori
ginall
y,dat
awerepost edonWebsi t
es,anduser ssi
mplyviewedor
downloadedthecont
ent .Incr
easingly,usershavemor einputi
ntothenature
1
ands copeofWebcont entand,insomecases,exer treal
-ti
mecont rol
overit
.

 Thes ocialnatur
eofWeb2. 0isanothermajordiff
erencebetweenitandt he
ori
ginal,stat
icWeb.I ncreasingl
y,websit
esenablecommuni ty-basedinput,
i
nteraction,content-
shar i
ngandcol l
aborati
on.Typesofsocial
medi asit
esand
appli
cat i
onsi udef
ncl orums,mi crobl
ogging,soci
alnetworki
ng,social
bookmar ki
ng,socialcurati
on,andwi ki
s.
1
.1.
1.1El
ement
sandTool
sofWeb
2.
0
El
ement
sofWeb2.
0

 Onlinedat abasewi t
hadj ustabl
econt ent:Ther earewebsi t
esthatall
owuser sto
st
orei nformat ion whi
chcanber etr
ievedatal aterti
me.  Thesesitesalso 
enable
userst ocont ri
bute,collaborateandedi tsitecont ent.Agoodexampl eofthi
sisa
wiki,whi challowsanyonet oviewandeven  modi fyinformat i
onont hesit
e.
 Thei ncreasingpr evalenceofSof twar easaSer vi
ce( SaaS) ,webappsandcl oud
comput i
ngr atherthanl ocall
y- i
nstal
ledpr ogramsandser vi
ces.
 Mobi lecomput i
ng,alsoknownasnomadi city,thetrendt owarduser sconnecti
ng
fr
om wher evertheymaybe.Thi strendi senabl edbyt hepr olif
erati
onof
smar tphones,t ablet
sandot hermobi l
edevi cesi nconj uncti
onwi threadil
y
accessi bleWi -Finetwor ks.
 Ma sh- ups:Webpagesorappl i
cationst hatintegratecompl ementaryelements
fr
om t woormor esour ces .
Name Li
nk Descr
ipt
ion

ht
tp:
//
www.
bibsonomy.
or
Bi
bSonomy Bi
bSonomyi
sasyst
em f
orshar
ingbookmar
ksandl
i
stsofl
i
ter
atur
e.
g/

Ci
teULi
kei
sawebser
vicewhi
chal
l
owsuser
stos
aveandshar
eci
tat
Ci
teULi
ke ht
tp:
//
www.
cit
eul
i
ke.
org/
t
oacademi
cpaper
s.

Thesi
tewasboughtbyAvosSyst
emsonApr
il27,201
1thoughwaso
Del
i
cious ht
tp:
//
del
.i
cio.
us
byYahoo!unt
il
Jul
y201
1

Di
gg ht
tp:
//
digg.
com/ Di
ggi
sanewsaggr
egat
orwi
thanedi
tor
ial
l
ydr
ivenf
rontpage

Di
i
go ht
tp:
//
www.
dii
go.
com/ Desi
gnedt
obookmar
kwebpagesandhi
ghl
i
ghtkeypoi
ntsf
orr
efer
e

Googl
e ht
tps:
//
www. googl
e.com/
Bookmar
kingser
vicebyGoogl
e
Bookmar
ks bookmarks

Col
l
abor
ati
vebookmar
kexpl
orat
ionandcur
ati
ont
ool
organi
zedand
Pear
lt
rees ht
tp:
//
pear
lt
rees.
com/
pr
esent
edl
i
keami
ndmap.

Pi
nboar
dcanaut
omat
ical
l
yimpor
tyourl
i
nksandt
weet
sfr
om anumb

out
sideser
vices
.

Thear
chi
vef
eat
uresavesal
ocal
copyofever
ythi
ngyoubookmar
ki

Pi
nboar
d ht
tp:
//
pinboar
d.i
n/ t
heor
igi
nal
page

goesof
fl
ine,andof
fer
sful
l
-textsear
ch.Cur
rent
ly1
1USDannual
fee

opt
ional
25USD

f
eef
orar
chi
vi
ng.
ht
tp:
//
www.
pint
erest
.com Pi
nter
estisawebandmobi leappli
cati
oncompanyt
hatof
fer
savi
sua
Pi
nter
est
/ di
scovery,col
l
ect
ion,shar
ing,andstoraget
ool
.

User
ssubmi
tcont
enti
nthef
orm ofei
theral
i
nkorat
ext(
"sel
f"
)post
.
Reddi
t ht
tps:
//
www.
reddi
t.
com/
andcont
entcanbevot
edon.

https:
//
www.
st euponSt
umbl umbleUponi
sadi
scover
yengi
net
hatf
indsandr
ecommendsweb
St
umbl
eUpon
.com/ t
oitsuser
s.

WeHear
tIt ht
tp:
//
wehear
ti
t.
com/ WeHear
tIti
sani
mage-
basedsoci
alnet
wor
kfori
nspi
ri
ngi
mages

Syncsbookmar
ks(
fol
der
s&sub-
fol
der
s)andpr
ofi
l
esacr
ossdi
ff
eren

Xmar
ks ht
tp:
//
www.
xmar
ks.
com/ br
owser
sandpl
atf
orms.I
ncl
udesshar
ingopt
ionandpossi
bil
i
tyt
oac

bookmar
ksvi
aweb-
based-
int
erf
ace.

 Social networ ki
ng:Thepr acticeofexpandi ngt henumberofone' sbusi ness
and/orsoci alcontactsbymaki ngconnect i
onst hroughi ndividuals.
 Crowdf undingorCr owdsour ci ng:Col
laborativeef fortsbasedont heabi l
it
yto
reachl argenumber sofpar ti
cipantsandt heircollectiver esources
 User- gener atedcont ent( UGC) :Wri
ti
ng,images,audi oandvi deocont ent-
amongot herpossi bi
li
ti
es-madef r
eelyavailableonl inebyt heindividualswho
createi t
.
 Unifi
edcommuni cati
ons( UC) :Theintegrati
onofmul ti
plef ormsofcal land
multi
medi a/cross- mediames sage- managementf unct i
onscont roll
edbyan
i
ndividual userf orbothbusi nessandsoci alpur poses .
 Social curat i
on:Thecol laborativesharingofcont entor ganizedar oundoneor
mor epar ticularthemesort opics.Socialcont entcur ati
onsi t
esi ncludeReddi t
,
Digg,Pi nterestandI nstagram.
Web2.
0tool
s

 SocialmediaareWeb2.0 tool
sall
owi
ngpeopl etointeractwithoneanother
exchangeinfor
mati
on,careeri
nter
est
s,ideas
,andpi ctures/
videosinvir
tual
communi t
iesandnetwor
ks .Amoredetail
eddiscussi
onoft hi
si si
l
lust
rat
edon
Module1.1.3.

 Socialbookmarkingisauser
-def
inedtaxonomysystem f
orbookmarks.Sucha
taxonomyissomet i
mescaledaf
l olksonomyandt hebookmarksareref
err
edto
astags.Unli
kestori
ngbookmarksinafolderonyourcomputer,t
aggedpages
arestoredontheWebandcanbeaccessedf r
om anycomputer.

Thistechnol
ogyletsuser
sorganizetheiraccesstot
hewebsi tesbystori
ngthe
preferr
edsit
esthathavebeenr ecentl
yaccessed,andthenmaybeaccessedl ateron.
Websi tesdedi
catedtosoci
albookmar king,suchasFl
ickranddel.i
cio.
us,pr
ovide
userswi t
haplacetostor
e,categori
ze,annot at
eandsharefavori
teWebpagesand
fi
l
es.

Unl
ikefi
leshari
ng,soci
albookmar ki
ngdoesnotsavet heresour
cest hemselves,
merel
ybookmar ksthatr
eferencethem,i.
e.,ali
nktothebookmar kedpage.
Descri
pti
onsmaybeaddedt othesebookmar ksint
hef or
m ofmet adata,sousers
mayunder st
andthecontentoftheresour
cewi t
houtfi
rstneedi
ngt odownl oaditf
or
t
hemselves. 
Name Li
nk Descr
ipt
ion

Bi
bSonomyisasystem f
orshari
ng
Bi
bSonomy ht
tp:
//
www.
bibsonomy.
org/
bookmar
ksandli
stsofl
it
erat
ure.

Cit
eULikei
sawebservi
cewhichal
lows
Ci
teULi
ke ht
tp:
//
www.
cit
eul
i
ke.
org/ userst
osaveandshar
ecit
ati
onsto
academicpaper
s.

Thesit
ewasboughtbyAvosSystemson
Del
i
cious ht
tp:
//
del
.i
cio.
us Apri
l27,2011thoughwasoper
atedby
Yahoo!unti
lJul
y2011

Diggisanewsaggregatorwi
than
Di
gg ht
tp:
//
digg.
com/
edit
ori
all
ydr
ivenf
rontpage

Desi
gnedtobookmarkwebpagesand
Di
i
go ht
tp:
//
www.
dii
go.
com/
hi
ghl
ightkeypoi
ntsf
orr
efer
ence.Fr
ee.

Googl
e
ht
tps:
//
www.
googl
e.com/
bookmar
ksBookmar
kingser
vicebyGoogl
e
Bookmar
ks

Coll
aborati
vebookmarkexpl
orat
ionand
Pear
lt
rees ht
tp:
//
pear
lt
rees.
com/ curat
iontoolor
gani
zedandpresented
l
ikeami ndmap.

Pinboar
dcanaut omaticall
yimpor tyour
l
inksandt weetsfrom anumberof
outsi
deser vi
ces.Thear chivefeatur e
Pi
nboar
d ht
tp:
//
pinboar
d.i
n/ savesalocal copyofever ythi
ngyou
bookmar kincaset heoriginalpagegoes
offl
i
ne,andof fer
sf ul
l
-textsear ch.
Current
ly11USDannual fee,wi t
han
opt
ional
25USDf
eef
orar
chi
vi
ng.

Pint
eresti
sawebandmobi l
eapplicati
on
Pi
nter
est ht
tp:
//
www.
pint
erest
.com/ companyt hatoff
ersavi
sualdi
scovery,
coll
ecti
on,shari
ng,andst
oragetool.

Userssubmitcontenti
nthefor
m of
Reddi
t ht
tps:
//
www.
reddi
t.
com/ ei
therali
nkorat ext("
sel
f"
)post.Li
nks
andcontentcanbevot edon.

Stumbl
eUponisadi
scover
yengi
nethat
St
umbl
eUpon ht
tps:
//
www.
stumbl
eupon.
com/ fi
ndsandrecommendswebcont
entto
i
tsuser
s.

WeHeartI
tisanimage-basedsoci
al
WeHear
tIt ht
tp:
//
wehear
ti
t.
com/
net
wor
kforinspi
ri
ngimages

Syncsbookmar ks(f
olders&sub-
fol
ders)andpr ofi
l
esacr ossdiffer
ent
Xmar
ks ht
tp:
//
www.
xmar
ks.
com/ browsersandpl atf
orms.I ncl
udes
shari
ngopt i
onandpossi bil
i
tytoaccess
bookmar ksviaweb- based- i
nterf
ace.

Tabl
e1.
1.1
.1aLi
stofSoci
albookmar
kingsi
tesandt
hei
rDescr
ipt
ion1

 APodcasti
sbasi
cal
l
yjustanaudi
o(orvi
deo)f
il
e.Whatdi
sti
ngui
shesapodcast
from ot hert ypesofaudi oont heI nternetisthata“ podcast er”cansol i
cit
subscr i
ptionsf rom l i
stener s,sot hatwhennewpodcast sar erel
eased,t heyare
aut omat icallydelivered,orf ed,t oasubscr i
ber'scomput erormobi l
edevi ce.
Us ually,thepodcastf eat uresanaudi oshowwi thnewepi sodest hataref edto
yourcomput erei t
herspor adi callyoratpl annedi ntervals,suchasdai l
yorweekl y.
2
Thi sformatencour agesl i
st ener sto“ subscribe.”Commonpodcastappl i
cati
ons
i
ncl udei Tuneswhi chcanbeusedonl yforiOSdevi ces,andSpot ify,an
appl i
cat i
onf ocusingon  streami ngser vice(streami ngmedi aismul t
imediawhi ch
allowsamedi af i
let obepl ayedbef oretheent irefilehasbeen  t
empor ari
lybeen
transmi tt
ed. )
 Educ ati
onal tools. Therear etwot ypesofeducat ional t
oolsunderWeb2. 0.
Elect r
onicpor t
foli
os( alsor efer redt oasePor t
foliosorWebf oli
os)aregai ning
recogni ti
onasaval uabl etool forlearner s
.Itispr actical
lyast oragemedi um for
i
ndi vidualswhowi shtost or elear nedi nformat on.Lear
i ningManagement
Syst ems  (LMS) ,however ,isf acul ty-centeredt ypeofappl icati
ont hat 
isfocused
onpr ovidingt oolsf orst udent st olear nandbeassessedwi th.LMSi sownedby
thei nsti
tutiont owher ei tiscur rent l
ybei ngimpl ement edwhi l
etheePor t
foli
ois
ownedbyt hel earner .Asi tismor epopul arandcommont oday,LMSwi llbe
discussedf urtherandwi l
lbet hemai ntopiconModul e1 .1.
4.1.

1
.1.
1.2TheHi
stor
yofWeb2.
0
Thefoundational
componentsofWeb2.0aret
headvancesenabl
edbyAjaxand
otherappli
cati
onssuchasRSSandEcl
ipseandtheuserempower
mentthatt
hey
1
support.

DarcyDiNucci ,aninformati
onar chitect
ureconsul t
ant ,coinedtheterm“ Web2. 0"in
her1999ar t
icle,"FragmentedFut ure”,i
ndicati
ngthatt heWebwi ll
beknownt obea
"tr
ansportmechani sm,theethert hroughwhi chinteractivi
tyhappens.Dar cyforesaw
thatt
heWebwi l
lbeseennotonl yonper sonalcomput erunitsbutinTVset s,car
dashboards,mobi lephones,andhand- heldgamemachi nesaswel l

Thiswas
mostlyobservedwhenPal mI nc.startedint
roducingt heirwellknownpr oduct-
personaldi
gitalassist
ant,wi
thWebaccesscapabi l
it
y.

Ti
m O'
Rei
l
lyi
sgener
all
ycr
edi
tedf
orpopul
ari
zi
ngt
het
erm,f
oll
owi
ngaconf
erence
deal
ingwi t
hnext-generat
ionWebconcept
sandissuesheldbyO'Reil
l
yMedi aand
MediaLi
veI nt
ernat
ionali
n2004.O'
Reil
l
yMedi ahassubsequent
lybeenenerget
ic
abouttr
yingtocopyright"
Web2.0"andholdsanannualconfer
enceofthesame
name.

Ti
m  O'Rei
ll
yandDal eDougher t
y hadabr i
efdiscussi
ont oconfer 
the changes
experi
encedf rom Web1 .0toWeb2. 0,assummar i
zedin Table1.
1.1.
2a. For
i
nstance, t
hewebsi teforEncyclopediaBri
tannicaonli
newaspopul arbefore;most
oftheresearcherstendtogatherinformati
onfrom thissi
te.Inthenewer a,the
att
enti
onofr esearcher
sar enowf ocusedonWi ki
pedia,asinformati
onar emostl
y
updatedbyenduser sthemselves. 

Web1.
0 Web2.
0
Doubl
eCl
i
ck Googl
eAdSense
Of
oto Fl
i
ckr
Akamai Bi
tTor
rent
mp3.
com Napst
er
Br
it
anni
caOnl
i
ne Wi
ki
pedi
a
per
sonal
websi
tes Bl
oggi
ng
Evi
te upcomi
ng.
organdEVDB
sear
chengine
domai
nnamespecul
ati
on
opt
imi
zat
ion
pagevi
ews costpercl
i
ck
scr
eenscr
api
ng webser
vices
publ
i
shi
ng par
ti
cipat
ion
cont
entmanagement
Wi
ki
s
syst
ems
di
rect
ori
es(
taxonomy) t
aggi
ng( "
folksonomy"
) Table
1
.1.
1.2a St
icki
ness Syndicati
on Transi
ti
on
f
rom Web 1.
0t o2.02
1
.1.
1.3Web2.
0Technol
ogi
es
 

Mostoft
het
echnologi
esusedi
ndel
i
ver
ingWeb2.
0ar
eri
chWebt
echnol
ogi
es,
suchast
hel
i
stgivenbelow:

 AdobeFl
ash

Thi
si s t
heplug-
inonbrowsersused fordel
iveri
nghigh-
impact,ri
chWebcontent
.
Designs,ani
mat i
on,andappl
icat
ionuserinterf
acesaredepl
oyedi mmedi
atel
y
acrossallbr
owsersandplat
forms ,at
tr
acti
ngandengagi nguserswit
hari
chWeb
1
exper i
ence.

 Mi
crosof
tSi
l
ver
li
ght

Silver
li
ghti sapowerfuldevel
opmentt oolforengagingoni nt
eract
iveuser
experiencesf orWebandmobi l
eapplicati
onssimil
arwi thAdobeFlash.Thi
st ool
 i
sa
freeplug- i
nthatisbasedunderthe.NETf ramewor kandcompat i
blewit
hmul ti
ple

browser s,devicesandoperati
ngsystems .Itisdi
ff
er entwit
hAdobeFl ashinterms
ofanimat ionmodel used,compressi
onf ormats,f
il
esi ze,pl
atf
orm capabi
li
ty,andso
forth.

 JavaScr
ipt

JavaScr
ipti
sthepr
ogrammi nglanguageofHTMLandt
heWebusedtodefi
net
he
3
behavi
orofwebpages.  Aninst
anceofthi
sisanewwi
ndowbei
ngdi
spl
ayedaf
ter
cl
icki
ngani mage,textshowni nmar queemode( st
ri
ngoftextdi
splayedmovi
ng
fr
om leftt
orightandviceversa),oracont r
ol bei
nginandoutofvisi
bil
it
y.Amore
si
mpl eli
brar
yusedbypr ogrammer s,whichis j
quer
y,isal
sousedtoeaseupthe
contentofcodeasitisalr
eadycommer ci
all
yf r
eeandavail
able.

 Tor
rent

Web2. 0appl i
cat
ionsar eof tenbasedont hedecent r
ali
zeddownl oadmet hodol ogy
thatmadet orr
entsit
es successf ul.At orr
entisalsoaser ver,shari
ngthewor kl
oad
andmaki ngheavil
ydemandedcont entmor eaccessiblet hatitwouldbeint he
centr
ali
zedmodel wheredemandcanl eadtooverwhel medser versandpages.The
mediaf i
leisbei
ngdownl oadedf r
om aswar m ofdistri
but edserverssimult
aneousl y
i
nsteadofonecent rali
zedser ver,whichmakesi tf
ast ertodownl oad.Allpeer s
(downloadersandupl oader s)maycomeandgo,al lowi ngthepi ecestosti
llbe
avail
ablefordownloading,notl ikewhenyouar edirectl
ydownl oadingthefi
le.Once
done,apeermayst i
llcontinuet oupl oad,makinghi m aseeder . 
Thehigherthe
numberofseeder s,thefast eritistodownl oadthef il
e.

Ot
herTechnol
ogi
cal
Innovat
ionsofWeb2.
0

Manuf
act
uri
ng2.
0

TheintegrationofWeb2. 0communi cat


ionandcol l
aborati
onapplicat
ionsinto
tradi
ti
onalmanuf acturingpract i
cesandpr ocesseshasbeendubbedManuf acturing
2.0.Manuf acturi
ng2. 0takest ypicalWeb2. 0appsandser vicesandi ncor
por ates
them intoeverystageofdevel opmentandpr oducti
on.Theuseoft hese
technologi
esandt oolsfaci
li
tatesgr eatercoll
aborati
onandshar ingandr ef
er encing
ofinformationinabusi ness,ideallyleadingtobetterthoughtoutdesignandmor e
4
effi
ci
entpr oducti
on.

 
Fi
gur
e1.
1.1
.3aGr
aphoft
heDegr
eeofCont
ractManuf
act
uri
ngovert
he
5
Manuf
act
uri
ngCompl
exit
y

Ent
erpr
ise2.
0

Similar
ly,t
heinclusi
onofWeb2. 0technologiesintoanenterpr
ise’
sbusiness
processes,intr
anetandextr
anetissomet i
mesr eferr
edtoasEnt er
prise2.
0(E2.
0).
Mostent erpri
se2.0foll
owersuseacombi nationofblogs,soci
alnetworki
ngand
socialcoll
aborati
vetool
saswellasfree,paidandhomegr owntechnologi
es.

Theimagebel
owdi spl
aysthefull
capabi
li
tyofE2.0.Theappli
cati
onsand
bl
ogospher
es(setofbl
ogscollecti
vel
yconnectedwithi
nanonlinecommuni t
y)are
i
nter
acti
ngwit
hteheenterpri
seunittopr
ovidebett
ersocial
andf i
nanci
alassi
stance.
 

Fi
gur
e1.
1.1
.3bCol
l
abor
ati
onofWeb2.
0tool
swi
thanent
erpr
ise6

Web2.
0sui
cide

Sosynonymouswi t
hWeb2. 0issoci al
networ ki
ngt hatthedeleti
onofone’ssoci al
networki
ngpresencesthroughouttheInternetisreferr
edt oasWeb2. 0suicide.
Therearewebappl i
cati
onsdesignedt ofacil
it
atethepr ocess,suchast hefree
servi
ceWeb2. 0suicidemachine.Theappl icati
onat t
empt stopurgeuserinf oon
someoft hemostcommonsoci alnetworkingpr esencepoi nt
s:Facebook,MySpace,
Li
nkedInandTwi t
terbefor
eaddingt heusert otheSoci alNetworkSuicider
sgr oup
4
onFacebookandsi
gni
ngt
hem out
.

1
.1.
2Thef
utur
eofWeb2.
0:Web
3.
0
Webenthusiastsbel
i
evet
hatt
heWeb2.0isj
ustonephasethatt
ransf
ormedWor l
d
WideWebi ntoanewerandmoreest
abl
i
shedphasetheycal
lWeb3. 0,al
soknown
astheSemant i
cWeb.

Tim Ber ner s-Lee,f ounderofWWW,  suggest edt hattheWebcanst i


llbeimproved
asawhol ei namor ei ntuit
ivemannert oser vet heneedsoft heInternetusersbet t
er.
Berner s-Lee  noticedt hatuser sar eunabl etocl earlychooset he si
tethattheyneed
asmul t
ipleones  arebei ngshown  andi ndexedaf terenteringt hekeywor dsinthe
search  engi ne.
 Het hensuggest sdevel opersandaut hors,singlyorin
coll
abor ation, t
out il
izesel f-descript
ions  
toinform user sofal lsuggestedsi t
esto
l
essenuser s' 
struggl einsear chingfort hecor rectinformat ion.Web3. 0willi
nvolve
thepubl ishingofwebr esour cesinlanguagesi ntendedf ordat a(suchasXML,RDF,
OWLandXHTML)t osuppl ementt hem wi thmet adatathatwi l
lal
lowsof twareto
analyze,cl assifyanddel i
vercont entformor eper sonal r
elevance.TheSemant ic
Annot ationsf orWebSer vi
cesgr oupatW3Ci sdef ini
ngt hespeci fi
cationsforthe
Web3. 0.

Theevol
uti
onofWeb1.
0to2.
0upunti
l3.
0whichi
swherewear
enowi
sdi
scussed
i
ntheli
nkbelow.Cl
i
ckt
hei
maget
oplaythevi
deocl
ip.

ht
tps:
//
www.
yout
ube.
com/
wat
ch?v=A5d61
xYzdv0 
(Li
nkst
oanext
ernal
sit
e.)

Evol
uti
onWeb1
.0,Web2.
0toWeb3.
0
1
.1.
2.1Web3.
0ExpandedDef
ini
ti
on
Thereareactuall
yseveralmajortechnol
ogyt rendsthatareabouttor eachanew
l
evelofmaturit
yatt hesametime.Thesi multaneousmat uri
tyofthesetrendsi
s
mutuall
yrei
nforci
ng,andcollecti
velydri
vingthethir
d- generat
ionWeb.Fr om t
his
broaderper
spect i
ve,Web3.0mi ghtbedef i
nedasat hi
rd-generat
ionWebenabl ed
1
bytheconvergenceofseveral keyemer gingtechnologytrends:

Ubi
qui
tousConnect
ivi
ty

 Br
oadbandadopti
on
 Mobi
leI
nter
netaccess
 Mobi
ledevi
ces

Net
wor
kComput
ing

 Software-as-a-servicebusi
nessmodel
s
 We bservicesinter
oper abi
li
ty
 Distr
ibut
edcomput ing(P2P,gri
dcomputi
ng,host
ed“
cloudcomput
ing”ser
ver
farmssuchasAmazonS3)

OpenTechnol
ogi
es

 OpenAPI
sandpr ot
ocol
s
 Opendat
af or
mats
 Open-
sourcesof
twarepl
atf
orms
 Opendat
a( Cr
eat
iveCommons,OpenDat
aLi
cense,et
c.)

OpenI
dent
it
y

 Openidentit
y( OpenI
D)
 Openreputation
 Port
ableidentit
yandpersonaldat
a(forexample,t
heabil
it
ytopor
tyouruser
accountandsear chhi
stor
yfrom oneservi
cetoanother
)
TheI
ntel
l
igentWeb

 Semant i
cWebt echnol
ogies(
RDF,OWL,SWRL,SPARQL,Semant i
cappl icat
ion
plat
forms,andst at
ement-bas
eddatastor
essuchastr
ipl
est
ores,t
uplestoresand
associ
ativedatabases)
 Dist
ri
buteddatabases—orwhatIcal l
“TheWor l
dWideDatabase”(wide-area
dist
ri
buteddatabaseinter
operabi
l
it
yenabledbySemanti
cWebt echnologies)

I
ntel
l
igentappl
icat
ions(
nat
ural
languagepr
ocessi
ng,machi
nel
ear
ning,machi
ne
r
easoning,aut
onomousagents)

1
.1.
2.2Ubi
qui
tousComput
ing
Themodel ofWeb3. 0’smachine-cl
assifi
ed,dat ashari
ngwor l
dcr eat
esabasi sfor
ubiquit
ouscomput i
ng.Ubiquit
ouscomput ing,alsoknownasper vasi
vecomput ing,
i
sascenar i
oi nwhi chembeddedpr ocessinginever ydayobjectsenables
i
ntercommuni cati
onandunobt rusi
vedat asharingthroughouttheuser’senvi
ronment.
Theconceptover lapswi t
hthatoftheI nt
ernetofThi ngs(IoT)
,inwhichalmostany
enti
tyorobjectimagi nabl
ecanbeout fi
tt
edwi thauni queidenti
fi
er(UID)andthe
abil
it
ytoexchangedat aautomat i
cal
ly.Amodestexampl eofthisconceptisafri
dge
thatsendsagr ocerylistt
oone’ssmar tphone.
Fi
gur
e1.
1.2.
2aEl
ement
sofUbi
qui
t ems1
ousSyst

Thef
oll
owi
ngdef
inescl
ear
lyt
heel
ement
sinvol
vedi
naper
vasi
vecomput
ingsyst
em:

 Inf
ormati
onCont extAware
Theabil
it
ytocoll
ect,metri
cize,monitorandplat
form machi
netomachi neM2M,
machinetohumanM2Ht el
emet r
yacrossawi derangeofst
ruct
ured,semi-
str
uct
uredandunst r
uctur
eddat a
 Sit
uati
onContextAwar e
Theabil
it
ytocreatenewphysi calandvir
tual
envir
onmentswithi
ntel
li
gence
i
nformationanpr ocesscontextfrom thelevellar
get othever ysmall
.
 I
nternetofThings 
Theabili
tytomultipl
exandmul ti
plicit
yofent i
ti
es,assetsandser vi
cesspaci
ng
beyondthecomput ingsphereintomanyot hermet asystemsinsocial
,
commer cial
,organizati
onal
,biologicalandsustainabil
it
ysystem

Pervasivecomputi
ngreli
esont heconvergenceofwirel
esstechnologies,advanced
el
ectronicsandt
heInternet
.Thegoal ofr
esearcher
swor ki
nginper vasivecomput i
ng
i
stocr eatesmartpr
oductsthatcommunicateunobtrusi
vel
y.Thepr oductsare
connect edt
otheInt
ernetandthedatatheygenerateiseasi
lyavai
lable.  
1
.1.
2.3Mor
eInt
ell
i
gentWeb
Thethresholdoft hethir
d-gener at
ionWebwi l
lhavebeencr ossedi n2007.Att hi
s
j
uncture,thefocusofi nnovationwi l
lstartt
oshiftbackfrom fr
ont -endimpr ovements
towardsback- endi nf
rastr
ucturelevel upgradestotheWeb.Thi scyclewi l
lconti
nue
forf
ivetot enyear s
,andwi llr
esultinmaki ngtheWebmor econnect ed,mor eopen,
andmor ei nt
ell
igent.I
twillt
ransformt heWebf rom anetworkofsepar atel
ysil
oed
appli
cati
onsandcont entrepositori
est oamor eseaml essandi nteroperabl
ewhol e.

Becausethefocusofthethi
rd-
gener
ationWebi squit
edif
fer
entfr
om thatofWeb
2.0,t
hisnewgenerat
ionoftheWebpr obablydoesdeser
veit
sownname.I n
keepingwit
hthenamingconventi
onestabli
shedbylabel
i
ngthesecondgener at
ion
oftheWebasWeb2. 0,thi
sthi
rd-
generati
onoftheWebcoul dbecal
ledWeb3. 0.

Technol
ogi
cal
Conver
gence

Technologi
calconver
genceisthetendencythatast
echnologychanges,di
ffer
ent
technol
ogical
systemssomet i
mesevolvetowardperf
ormingsimi
lart
asks.Therear
e
threecommont ypesoftechnologi
cal
convergence:

 Digit
alconver genceref erstotheconver genceoffouri ndustr
iesint oone
conglomer ate,I
TTCE( InformationTechnol ogi
es,Telecommuni cation,Consumer
Elect
ronics,andEnt er
tainment ).Previousl
yseparatetechnologiessuchasvoi ce
(andtelephonyf eatur
es) ,data(andpr oducti
vit
yapplicati
ons),andvi deocannow
shareresourcesandi nter actwitheachot hersyner
gisti
call
y.Thi si
sawaywher e
newt echnologicaldevicesar ebeingpr oduced whichar ebasedf rom previous
1
technologiesperformingt hesamet askswithadvancedf eatures.

 
Fi
gur
e1.
1.2.
3aTi
melineIll
ust
rat
ing 
theTechnol
ogi
calConver
gencef
orCi
nema/
TV,
2
Telephone,I
nter
face,comput
er,andgames

 Telecommunicati
onsconvergence,or  
networkconver gence,  
istheterm usedt o
descri
beemer gi
ngtelecommunicationstechnologies,andnet workarchi t
ectur
e
usedtomi gr
atemulti
plecommuni cati
onsservicesintoasi ngl
enet work.
Specifi
cal
l
ythisi
nvolvestheconvergingofpreviouslydisti
nctmedi asuchas
tel
ephonyanddat acommuni cat
ionsintocommoni nterfacesonsi ngl
edevi ces,
3
suchasmostsmar tphonescanmakephonecal l
sandsear chtheweb.

 
 
Figur
e1.
1.2.
3bNet
wor
kConver
genceforVoi
ce,Dat
a,andVi
deot
ocr
eat
eanew
4
t
echnology

 Medi aconver gence,int hisi


nst ance,i sdef i
nedast heint
erl
inki
ngofcomput i
ng
andot herinformati
ont echnol ogi es ,medi acontent,andcommuni cat
ion
networ ksthathavearisenast her esul toftheevoluti
onandpopul ari
zationofthe
I
nternetaswel lastheact i
vit
ies,pr oduct sandservicesthathaveemer gedi nthe
di
gitalmedi aspace.Manyex pertsvi ewthisassimpl ybei
ngt heti
poft heiceberg,
asallfacetsofinst
it
uti
onal act i
vi
tyandsoci alli
fesuchasbusi ness,government ,
art
,jour nal
i
sm,health,andeducat ionar eincreasinglybei
ngcar ri
edouti nthese
di
gitalmedi aspacesacr ossagr owi ngnetwor kofinformati
onand
5
communi cati
ontechnol ogydevi ces .
 

Fi
gure1
.1.
2.3cI
l
lust
rat
ionofMediaConver
genceI
nvol
vi
ngSmar
tphonesand
6
Lapt
opUnit
stoaccessmediasi
tes

Convergentservices,suchasVoIP,I
PTV,SmartTV,andothers,t
endt orepl
acet
he
ol
dertechnologiesandt huscandisr
uptmarket
s.I
P-basedconver genceisi
nevi
tabl
e
andwillr
esulti
nnewser vi
ceandnewdemandi nt
hemar ket.

Whent heoldt
echnol
ogyconvergesint
othepubl
ic-
ownedcommon,IPbased
ser
vicesbecomeaccess-
independentorl
essdependent
.Theol
dser
vicei
saccess-
dependent.

1
.1.
3Soci
alandAss
ist
iveMedi
a
Soci
alMedi
a

Socialmediaismerel
yacol lecti
onofcommuni cat
ionchannel
saccessed 
through
theWeband  mobil
e appli
cations 
wit
hthepurposeof  
all
owi
nguserstoint
eract,
coll
aborat
e,andexchange informati
on,i
nter
ests,i
deas,andanyvi
sual
represent
ati
onwit
hanot heruserinaWeb- basedcommuni ty.
Typesofsoci
almedi
a

Websit
esandapplicat
ionsdedicat
edtofor
ums,micr
obl
oggi
ng,soci
alnetworki
ng,
soci
albookmarki
ng,social
curati
on,andwi
kisar
eamongthedi
ffer
enttypesof
soci
almedia.

 Microbloggi
ngi sawebser vi
ce,whichallowsthesubscr i
bertobr oadcastshort
messagest oothersubscr
ibersoftheservice.Thisis atypeofbl ogthatletsuser
s
publi
shshorttextupdat
es,thepostsofwhi char etermed  microposts.Micropost
s
canbemadepubl i
conaWebsi t
eand/ ordist
ri
but edtoapr i
vat egroupof
subscri
bers.
Socialnet
workingsit
es,li
keFacebook,al souseami croblogging
feat
ureinprofil
es.OnFacebook,thisiscall
ed" StatusUpdat es".Bloggerscan
usuall
yuseanumberofser vi
cefortheupdat esincludinginstantmessagi ng,e-
mail
,orTwi t
ter.
 

Pri
mary Content
Ser
vice Owner Launched Sof
twar
eli
cense Mul
ti
l
ingual
Ad-
free
ser
vice l
icense

FacebookFacebook,I
nc.2004-
02 soci
alnet
wor
k pr
opr
iet
ary ownTOS Yes No

Googl
e+ Googl
e,I
nc. 201
1-06 soci
alnet
wor
k pr
opr
iet
ary ownTOS Yes No

micr
o- Apachev2
i
dent
i.
ca St
atusNet
,Inc.
2008-
07 CC-
BY3.
0 Yes Yes
bl
ogging (pump.
io)

micr
o-
Tout Tout 201
0-04 pr
opr
iet
ary ownTOS Yes Yes
bl
ogging

micr
o-
Twi
tt
er Twi
tt
er,I
nc. 2006-
08 pr
opr
iet
ary ownTOS Yes No
bl
ogging

micr
o-
Yammer Yammer
,Inc. 2008-
09 pr
opr
iet
ary ownTOS Yes Yes
bl
ogging

Tabl
e1.
1.3aLi
stofSi
tesof
fer
ingmi
crobl
oggi
ngser
vices1

Socialcurat
ioni
scol
labor
ati
veonlineshar
ingof
 contentorganizedaroundbyan
i
ndividual
ornumberofpeoplewi t
hint
hecommuni t
y. Anal t
ernateterm,“cont
ent
aggregati
on,”i
ssometi
mespr oposedtomiti
gat
ehowot herdiscri
minator
sdisagr
ee
oftheterm cur
ati
onasitisoriginall
ymeantf ortheonesusedi nthefiel
dofar ts.
Amongt heoldestsoci
alcurationsitesar eDiggandReddi t.Bothofthosesi t
esallow
userstosuggestl
inkst
oar t
iclesandal l
owot herreader
st ogiveapproval –onDi gg,
forexample,bycli
cki
nga“ t
humbsup”i con.  
Higherapprovalrat
ingsmeant hata
stor
ywi l
lappearmorepromi nently.Pinterest
,ont heot
herhand,i sdedicatedto
i
mages.  

o Wikisarecontentmanagementsyst emst hatprovidecoll


aborative
modifi
cati
onofi t
scontentandstruct
uredi r
ectl
yfrom thewebbr owser.
Coinedfrom aHawai i
anterm whichmeansqui ck, awi ki
isrunusingwiki
sof
tware,otherwiseknownasawi kiengi
ne.Inat ypicalwiki
,texti
swri
tten
usi
ngasi mpli
fi
edmar kuplanguage( knownas" wi ki
mar kup"),andoft
en
edi
tedwi t
hthehel pofari
ch-textedi
tor.

Therear eatleastt
ensoft housandsofot herwi ki
sinuse,bot hpubli
candpr i
vate,
i
ncludingwi kisf
unct i
oningasknowl edgemanagementr esources,notet
akingtools ,
communi t
ywebsi t
esandi ntr
anets.WardCunni ngham devel oped t
hef i
rstwiki
soft
war e,Wi ki
Wiki
Web,or igi
nall
ydescri
bedi tas" t
hesimplestonli
nedat abaset hat
couldpossiblywor k".TheencyclopediaprojectWi kipedi
aisbyf arthemostpopul ar
wiki
-basedwebsi t
easoft oday,andisinfactoneoft hemostwi del
yviewedsi tesof
anykindoft hewor ld,havingbeenr ankedinthet opt ensi
nce2007.Thet abl
ebel ow
2
showsal i
stofotherwi ki
sandt henotessignifyi
ngt hefuncti
onsofthesesi t
es.

Name Focus Not


es Li
cense

Ini
ti
all
ypre-
populatedwi t
h
i
nformat i
onabout
manydi ffer
ent
About
Us.
com I
nter
netdi
rect
ory websites.Uses GFDLandCCBY-
SA
MediaWi ki
soft
war e,butnow
l
argelywi t
hRuby
onRai l
s

Engl
ish,Fr
ench,Ger
man,Sustainabl
e
Appr
opedi
a CCBY-
SA3.
0
Spanish development,
Name Focus Not
es Li
cense

i
ncluding
appropriate
technology
mer gi
ngwi th
severalother
wikis

AChinese
Bai
duBai
ke Encycl
opedi
c/Chi
nese Copyr
ight
ed
encycl
opedi
a

LargestChi
nese
Bai
ke.
com (
互动 wiki
.Social
Encycl
opedi
c networki
ng Copyr
ight
ed
百科) featur
es.Chi
nese
l
anguageonl y

ASpanish
l
anguage
Basededat
os Encycl
opedi
c/Spani
sh encycl
opedi
a, Copyr
ight
ed/
Other
wit
hownwi ki
sof
tware.

Or i
ginall
yin
Dutch,wi th
Englishver sion.
Collectors
speci f
icfor
comi cs,coi ns,
stamps,t rading
Cat
awi
ki Cat
alogues cards,boar d
games,model
cars,model
tr
ains,banknot es,
books,wat ches,
Disney
memor abili
a,
cl
ocksandot her.

non-
profi
torgani
zat
ions f
undedand GNUFr ee
Connect
ipedi
a mai
ntai
nedby Docume nt
ati
on
andfoundat
ions
MeyerMemori
al Li
censeanda
Name Focus Not
es Li
cense

Tr
ust
.Runson Creat
iveCommons
Wagn Li
cense

Publ
icDomain,CPDL
Chor
alPubl
ic Awikil
ibraryof Li
cence,C.C.
DomainLi
brar
y Musi
c f
reetypeset Li
cences,
(
CPDL) musi
cal scores Copyri
ght
ed(free
use)

Envi
ronmental
Mul
ti
l
ingual
—Encycl
opedisust
ainabi
l
it
y
Ekopedi
a CCBY-
SA3.
0
c mergingwith
Appropedi
a.

Encycl
opedi
aof
Mat
hemat
ics CCBY-
SA3.
0
Mathemati
cs

Reference
i
nformationand
Famil
yHist
ory
Geneal
ogyr
esear
ch research CCBY-
SA3.
0US
Resear
chWi ki
guidance.I
n1 1
l
anguages.

Famil
ytr
eesand
Fami
l
ypedi
a Geneal
ogy CCBY-
SA
hi
stor
y

ACr eat
ive
Commons
str
uctur
edwi ki
Ref
erence—Foodand
Foodi
sta.
com aboutfoods, CC-
BY
Cooki
ng
reci
pes,andother
culi
nary
i
nformation.

Dedicat
edtothe
Gal
axi
ki Fi
cti
onal
gal
axy creat
ionofa GFDL[15]
fi
cti
onalgal
axy

Gar
denol
ogy.
orgGar
deni
ng Meantasa Cr
eati
veCommons
"
complet ant At
epl tr
ibut
ionShar
eAl
i
ke
Name Focus Not
es Li
cense

andgardenwiki
encycl
opedi
a"

I
nter
nal
GCpedi
a Gover
nment Governmentof
CanadaWiki

Ageogr aphical
databasethat
GeoNames Pl
aces l
inksspecif
ic
nameswi th
uniquefeatures

Threenon-
accessibl
ewiki
s
runni
ngon
I
ntel
l
ipedi
a Gover
nment
—Int
ell
i
gence networksthatl
i
nk
theU.S.
i
ntell
i
gence
communi ty

I
nternat
ional Awikil
i
braryof
MusicScore Musi
c publ
i
cdomai n GFDL
Li
braryProject musi
calscores

Amul ti
-l
ingual
academi c
encyclopedia,
Jur
isPedi
a Gover
nment
—Law i
ncludingArabic, CC-
NC
Chinese,Engli
sh,
French,German
andSpani sh

Most
lycopyri
ghted.
Ali
sti
ngofl
yri
cs
Lyr
icWi
ki Musi
c—Lyr
ics CCBY-SAf or
byalbum
mi
nori
tyofcontent.

1000biologi
cal
dat
abaseofbi
ologi
cal databasesand BioLi
censeand
Met
aBase
dat
abases over800' web MetaBase:
Copyr
ight
s
servi
ces',mor
e
Name Focus Not
es Li
cense

than50' user
-
contri
buted'
databases

Awhi t
enational
ist
andextremer i
ght
Met
apedi
a Encycl
opedi
a unknown
-wingonli
ne
encycl
opedia.

All
owspeopl eand
enterpr
isest
o [23]
MyWi
ki
Biz Mi
sc—Busi
nessdi
rect
ory GFDLandot
her
writ
eabout
themselves

UsesGPS,aer i
al
photographyand
otherfr
eesources
OpenSt
reet
Map Pl
aces—Maps ODbL1
.0
ofimagest o
creat
eamapof
theworld

Promot esshari
ng
anddi ssemi nat
ion
ofknowl edge
OpenWet
War
e Sci
ence—Bi
ology CCBY-
SA
relatedt o
biological
research

At
temptsto
pr
ovidefi
xesand
PCGami
ngWi
ki Games—Vi
deogames CCNC-
SA3.
0
i
nfor
mationonal
l
PCgames

Freewiki
-styl
e
Pl
anet
Mat
h Mi
sc—Mat
hemat
ics mathematical
encycl
opedia

Infor
mationand
Rat
ional
Wiki Encycl
opedi
c arti
cl
esar ewrit
tenCC-
BY-
SA3.
0
from ali
beraland
secularpointof
Name Focus Not
es Li
cense

viewasa
responseto
Conservapedi
a

Host sC
programming
r
iscos.
inf
o Comput
ers—RI
SCOS cc-
by2.
5
resourcesand
project
s

Wr i
tten
exclusivel
yby
professional
s
Schol
arpedi
a Encycl
opedi
c focusingont heir Copyr
ight
ed
fi
eldofexper ti
se;
subjecttopeer
revi
ew

As oci
all
earni
ng
networkbuil
t
Wordsindi
ff
erent
Ter
mWi
ki aroundter
msand
l
anguages
questi
onsin75
l
anguages.

As oci
al
networkingsit
e
dedicat
edt o
Tr
avel
l
erspoi
nt Pl
aces—Tr
avel shari
ngst or
ies CCBY-
SA3.
0
and
recommendat ions
abouttravel

Ar apidr eference
forpr acti
cal point
-of-car ecl i
nical Creati
veCommons
knowl edgewi t
ha Att
ribut
ion-
Wi
kEM Emer
gencyMedi
cine popul arlinked NonCommer ci
al-
point-of- care NoDer i
vati
ves4.0
phone Int
ernati
onalLi
cense
application.
I
ntendedf or
cli
niciansonl yand
Name Focus Not
es Li
cense

notdir
ectl
yfor
pati
ents.

Compiles
Wi
ki
Answer
s Gener
alknowl
edge answersto Copyr
ight
ed
quest
ionsposed

Thepr oj
ectaims
tocreatehigh-
quali
ty,complet
e
publi
cdomai
n
Wi
ki
Art Ar
t,pai
nti
ngs andwel l-
art
works
str
ucturedonli
ne
reposit
oryoffi
ne
art
.

AWi ki
medi
a
Wi
ki
books Gener
al—t
ext
books CCBY-
SA/
other
pr
oject

Openeducat i
onal
Openeducat
ional resourceswhi
ch CCBY-
SAandCC-
Wi
ki
Educat
or
r
esour
ces anyonemayuse,BY
adapt,andshare

Awikihow-
to
wi
ki
How How-
toar
ti
cl
es CC-
by-
nc-
sa3.
0
manual

Combi nesGoogle
Mapswi t
hawi ki
system for
Wi
ki
Mapi
a Pl
aces—Map polygonall
y CCby- sa[44]
nc-
definedareas;
currentl
ysupport
s
35l anguages

Areposit
oryof
Wiki
medi
a f
reeelectr
oni
c
Mi
sc—El
ect
roni
cmedi
a CCBY-
SAandot
her
Commons media;a
Wiki
mediaproject

Wi
ki
news Gener
al—News Col
l
abor
ati
ve CC-
BY
Name Focus Not
es Li
cense

newsser
vice,a
Wiki
medi
apr oj
ect

Mult
il
ingual
Wiki
medi aproj
ect
Wi
ki
pedi
a Encycl
opedi
c CCBY-
SA
t
hatuses
MediaWiki

Aquote
Wi
ki
quot
e Ref
erence—Quot
ati
ons r
eposit
ory;a CCBY-
SA
Wiki
mediaproj
ect

Anonline
encyclopedia
focusi
ngonShi '
a,
thesecondmaj or
denomi nat
ioni n
I
slam.Ithas
Wi
ki
Shi
a Shi
'
aIsl
am Unknown
arti
cl
esin8
l
anguages.Far si
hasthemost
numberofar t
icles
whichismor e
[46]
than3500.

Gazetteerand
Pl
aces—Gr
eatBr
it
ainand i
nteracti
vemapof
Wi
ki
shi
re CCBY-
SA3.
0
I
rel
and GreatBrit
ainand
I
reland

Adigit
alli
braryof
Reference—Pr
imar
y f
reecont ent
Wi
ki
sour
ce CCBY-
SA
sources t
extualsources;a
Wikimediaproject

Adirector
yof
Wi
ki
speci
es Sci
ence—Bi
ology species;a GFDLandCCBY-
SA
Wikimediapr
oject

Wi
ki
tr
avel Pl
aces—Tr
avel Atravel
guide CCBY-
SA3.
0
usi
ngWi ki
media'
s
Name Focus Not
es Li
cense

soft
war e,but
unconnect edto
theWi ki
medi a
Foundat i
on
(whichhost s
Wikivoyage).20
suppor t
ed
l
anguages

Afreeglobal
famil
ytr
eeusing
MediaWiki
Wi
ki
Tree Geneal
ogy soft
ware,but Unknown[51]
unconnectedto
theWiki
medi a
Foundati
on.

Supportsfree
l
earni
ng
communi ti
es,
General
—Sel
f-di
rect
ed
Wi
ki
ver
sit
y proj
ects, CCBY-
SA3.
0
l
earni
ng
materi
als,and
l
earners;a
Wiki
medi aproject

Amultil
i
ngual
tr
avelguideoft
he
Wi
ki
voyage Pl
aces—Tr
avel CCBY-
SA3.
0
Wiki
medi a
Foundati
on.

Comput erpr
ogr
ammi
ng, World'
soldest
Wi
ki
Wiki
Web speci
fical
l
ydesi
gn wiki(
begancir
ca GPL
patt
erns 1995)

Anonli
ne
Wi
kti
onar
y Mul
ti
l
ingual
dict
ionar
y di
cti
onary;a CCBY-
SA3.
0
Wiki
medi aproj
ect
3
Tabl
e1.
1.3cLi
stofWi
ki
sandt
hei
rFunct
ions

 
Pr
omi
nentExampl
esofSoci
alMedi
aSi
tes

Thesi
tesbelowar
etheusual
medi
asi
test
hatar
ecommonl
yvi
si
tedbyonl
i
ne
community.

Facebooki sapopul arf reesoci alnet wor kingwebsi tet hatal lowsr egistered
user st ocr eat epr of i
les,upl oadphot osandvi deo,sendmessagesandkeep
i
nt ouchwi thf ri
ends,f ami lyandcol l
eagues .Accor dingt ost atisti
csf rom t he
NielsenGr oup,I nter netuser swi thint heUni tedSt at esspendmor et i
meon
Facebookt hananyot herwebsi te.
Twi tt
eri saf reemi cr obl oggi ngser vicet hatal l
owsr egi steredmember sto
broadcastshor tpost scal l
edt weet s.Twi t
termember scanbr oadcastt weet s
andf oll
owot heruser s'tweet sbyusi ngmul ti
plepl atfor msanddevi ces.
Googl e+( pr onouncedGoogl epl us)isGoogl e'ssoci alnet wor kingpr oject ,
desi gnedt or eplicat et hewaypeopl ei nteractof fli
nemor ecl osel ythani sthe
casei not hersoci al net wor ki ngser vices .Thepr oject ’
sslogani s“ Real- l
i
fe
shar ingr ethoughtf ort heweb. ”
Wi kipedi ai saf ree,opencont entonl ineencycl opedi acr eat edt hrought he
collabor ativeef for tofacommuni t
yofuser sknownasWi kipedi ans .Anyone
regist er
edont hesi tecancr eateanar ti
clef orpubl icat ion;r egi strat
ioni snot
requi redt oedi tar ticles .Wi kipedi awasf oundedi nJanuar yof2001 .
LinkedI ni sasoci al net wor kingsi tedesi gnedspeci fi
cal l
yf ort hebusi ness
communi t
y.Thegoal ofthesi teistoal l
owr egisteredmember st oest ablish
anddocumentnet wor ksofpeopl etheyknowandt r ustpr of essional l
y.
Pinter estisasoci al cur ationwebsi t
ef orshar ingandcat egor i
zingi mages
foundonl i
ne.Pi nt erestr equi resbr iefdescr ipti
onsbutt hemai nf ocusoft he
sit
ei svi sual .Cli
cki ngonani magewi l
l t
akeyout ot heor iginal sour ce,so,f or
exampl e,i fyoucl i
ckonapi ct ureofapai rofshoes,youmi ghtbet akent oa
sit
ewher eyoucanpur chaset hem.Ani mageofbl ueber rypancakesmi ght
takeyout ot her eci pe;api ctur eofawhi msical birdhousemi ghtt akeyout o
thei nstruct i
ons.

Assi
sti
veMedi
a

Assistivemedi aisanI nter


net-basedaudior eadingservi
cef orpeopl ewithreadi
ng
i
mpai r ments.Thisopensuni queavenueofaccessi bi
li
tyforsaidindividualswi
th
visual,cognit
ive,andcommuni cat
iondisabil
it
ies.Hi
storydatesback1 996when
DavidEr dodyr esearchedt heavail
abil
it
yofaccessi bl
eaudi o-basedr eading
mat erial
sforhisfatherKennet hHar monEr dodywhoi ssuf
feringfrom diabeti
c
reti
nopat hy.Soonaf ter,hediscoveredthatlessthan5% ofU. S.publ i
cationswere
providedi nanalternativeaudioformat.

 
Thereisanexist
ingsitet
hatall
owsonet oaccesssomeoft heavai
labl
erecordi
ngs
(Cli
ckhere (
Linkstoanexternalsi
te.
)t
oaccesst hesi
te).Theservi
ceoffer
edbyt hi
s
sit
eisopenandf reeofcharge,andthereisnoneedf oranyonetosignupt o
downloadthedat a.Ther
eisalsonoverif
icat
ionneededi ft
heuserisunderreadi
ng
disabi
l
it
y.

1
.1.
4Educat
ional
Technol
ogy
Resear chfindingsshowthatICTcanleadt oi
mpr ovedstudentl
earni
ngandbet t
er
teachingmet hods.Ithasproveneff
ectiveincontr
ibut
ingto uni
ver
salaccessto
educat i
on,equi t
yineducat
ion,thedel
iveryofquali
tylear
ningandteaching,t
eacher
s’
professionaldevelopmentandmor eeffici
enteducati
onmanagement ,governance
andadmi ni
strati
on.

Advant
agesofI
CTf
oreducat
ion

1.Thr
ought heuseofI
CTtools,mentorsmaybeabl etousei magesthatwil
lal
l
ow
memor yret
enti
onandboostofinterestensuri
ngstudents'comprehensi
on
2.Thr
ought heuseofI
CTtools,mentorsmaybeabl etoexplaincompli
cated
i
nst
ructi
onsandbeabletoeasilyaccessr esour
cestoknowl edgebeingimpart
ed
tot
hestudents.
3.Thr
ought heuseofI
CTtools,mentorsmaybeabl etocreateanenvironment
makingthemodulesenj
oyable,whichcoul dimprovest
udentat t
endanceand
concent
rat
ion.

Di
sadvant
agesofI
CTf
oreducat
ion

1.Thetool
sshoul dbemadeavai l
ableduri
ngtheclass.I
twouldbeaburdenforthe
wholeclassift
heywi l
l beunabl et
oaccesst heresour
cesneededduetoslow
connect
ion,lossofinternetbandwi dt
h,orsuddenpowerout age.
2.Thetool
sar eexpensivet oafford-desktop/l
apt
opunits,l
i
censedsoft
ware,
rout
ers/
switches,LANcabl es,andsomanymor ecostmoret hanmar
ker
s,
whit
eboardsandboar der aser.
3.Teacher
sshoul
dhaveabr
oad 
exper
ienceandknowl
edgewheni
tcomest
oICT
tool
susage.

Thesucceedi
ngmodul
esdescr
ibeanddi
scussI
CTt
ool
sfocusi
ngoneducat
ion.

ht
tps
://
yout
u.be/
FAsdt
wj00Uo 
(Li
nkst
oanext
ernal
sit
e.)

1.
1.4.1Lear
ningManagement
Systems
Learni
ngManagementSyst
em (
LMS)i
sthemostcommonopt
ion/f
ormatf
or
teachi
ngonli
ne.Cl
i
ckt
heimagebel
owtopl
ayt
hevideocl
i
p,whichsummari
zest
he
purposeofLMS.

Lear
ningManagementSyst
em f
unct
ionssol
elyasanonl
i
necl
assr
oom wher
e
prof
essor
scan:

 di
scussmodulesonli
ne,
 upl
oadreadi
ngmat eri
als,
 pl
ayeducati
onalvi
deosandaudi
ofi
l
es,
 carryoutl
earningacti
vit
ies
,
 ma keannouncement s,
 assessandgr adestudentwor
k.

LMSsst oreanddel i
vermat erial
sdevelopedinavar i
etyofdi fferentformats—
everythingf r
om MSOf f
icedocument stovideosandt hi
rd- partyapplicati
ons.They
suppor tsynchronous(atthesamet ime)andas ynchronous( notatthesamet ime)
i
nteractionsbetweenf acultyandst udentsandst udentsandst udents.Onl i
ne
l
earningmanagementsyst emscanbehost edl ocal
ly(i.
e.,keptonaser verphysical
l
y
l
ocatedataneducat i
onalinstit
uti
on)orremot ely,“i
nthecl oud”wher eintheLMS
company( Moodl eRoomsoraMoodl epartner,DesiretoLear n,orBl ackboard)
managesal lserver
-rel
atedi ssues.Wherevert heyreside,LMSsdemandhi gh-speed
1
connect ivi
tyandstrongbandwi dt
h.

 
Essent
ial
l
yal
lLMSshave“
standar
d”ort
ypi
cal
anduni
for
mfeat
ures,i
ncl
udi
ng:

 Analyti
cs(wit
hvaryi
ngdegreesofqual
it
y)
 Apps
 Assignmentsubmissi
on
 Discussi
onforum
 Fi
leupload/downloadcapacit
y
 Grading
 I
nstantmessages
 Onlinecal
endar
 Onlinenewsandannouncement( i
nst
it
uti
onandcour
sel
evel
)
 Onlinequiz
 Wi
ki
 Wi
dget
sthatal
l
owconnect
ionst
osoci
almedi
a

 
Fi
gur
e1.
1.4aSampl
eScr
eenshotofa 
Col
l
abor
ati
onTool
forLMS

 
Her
eisaqui
ckover
viewofsomeoft
heset
ool
s:

 Di
scussi
onPages

Thedi scussionpagesal l
owtheinstruct
ortoconfermodulesthatarer el
atedtothe
topictobet aughtf orthespecif
icclasshours.Theyareveryusefulforanswering
gener alquest i
onsoft hewholeclass,all
owingstudent
sto'meet,'orhavingagr oup
dissertat
ion onat opicpresent
edbyt heinst
ruct
or. 
SomeLMS' sincludeanonl i
ne
boar dthatthepr ofessorcanuset owr i
tesomethingaboutt
hetopi cthatthest
udents
canvi ewonl ine.
 ChatRooms

Chatroomsar egreatforoff
icehour s.Studentsknowthatt
heycandr opinata
cert
ainti
meandf indtheiri
nstructort here.Li
keli
veoff
icehour
s,somet i
mesnoone
shows,butthosewhodocangetani mmedi ateanswertoaquest
ion,andthey
makeanot herconnecti
ontot heirinstructor.

 Thr
eadedDi
scussi
ons

Thesearedi scussionsthatal
l
owausert ofol
lowathread/theme.Thisi
sfoundtobe
mor eusefulinsmal lcl
assest
haninlar
geclasses.I
tisusefulfort
hosewhoar e
unabletojoi
nadi scussi
onwithi
ntheprovi
dedtimeframe,orf orsomediscussi
ons
thatar
ef oundt obebr oadandmaybedi scussedinaver ylongspanofti
me.

 Gr
oupPages

Grouppagesarear easwherestudentscancommuni catewithasub-setof


cl
assmates,cansharef i
l
es,andcanwor kcoll
aborat
ively.Normallyt
heprofessor
hastosetthegroupsup,givingaccesstotheproperstudents.Theythenhavea
pri
vatedi
scussi
onsection,agroupe- mail
,andapr i
vatefil
e-shari
ngspace.These
areveryusef
ulforsett
ingupcoll
aborati
veproj
ectsinonl i
neclasses.

 Onl
i
neTest
s

Studentsmayt aket heexamsonl inewi thanal l


ottedti
meframet ocompl et
eit.The
teachersmaysetwhent hetestcanbet aken,sot heymaydeci deiftheexam should
beanswer edeitherwi thintheschool premi seorwi t
hinthei
rhomes.Theexam t ypes
maybemul ti
plechoi ce,trueorfalse,identifi
cat
ion,orevenessayt ypeofexams.
Exceptf orthoset hatneedst heanal ysisoft heteachers,mostexamscanbe
checkedi mmedi atelybyt hesystem givent hattheteachersetsthecorresponding
answer sforeachpr oblem.Thest udentsmayal readyseetheirscoresandthe
correctanswer saf tertakingthetest.
 Gr
adebook

Teachersmayget f
ort
hestudents'gr
adewithouthavi
ngtocreat
easpreadsheetfi
l
e
usi
ngtheLMSast hecomputationofthef
inalgr
adebasedfrom t
hescoresofthe
st
udents'qui
zzesandappr
opriate 
for
mulatobeused isembeddedi
nthesystem. 

LMSsser vemanyf uncti


ons,buti ti
sbestt othinkoft hem asar epositoryorvehi cl
e
forlearning,nott helearningitsel
f.LMSsl ackf uncti
onalityi
nt hemostcr it
icalareas
ofteachi ng—cont entandi nstructi
on.AnLMSdoesnott eachanonl i
necour se—the
i
nst r
uctordoest hatthrought heLMS.AndLMSsdonotsuppor tcontentcr eati
onand
theirfunct i
onal
ityisusuallyli
mi t
ed. Rather,thepr of
essorwi t
haninstructional
designer ,orani nstr
uctionaldesigner, designscont ent,usingseparate,dedi cated
cont entaut hor
ingsof t
war e,andpl acescont entintheLMSandr unscl asses,
discussions,qui zzesthrought heLMS.

EachLMShasi tsstr
engthandweaknessesandt her earefartoomanyt odiscuss
here.Ifcostisanissue,Moodl eandSakai (especiall
ythelatterforuniversi
ti
es)are
fr
ee. D2L( formerlyDesir
e2Lear n,now Bri
ghtspace)hasgr eatanalyti
cs,anicedr ag
-and- dr
opi nter
faceandver ystr
ongcust omerser vice.Acatarhasabeaut i
ful
i
nterface,isdesignedforfl
ippedl ear
ning,andisgr oundedi nast r
ongpedagogi cal
fr
amewor k.Blackboardhashistoryandpr esence.Canvasi squi t
epopul arwith
universi
ti
esf ori
tslook-
and- f
eel,abil
it
ytocustomi zeandsi mplenavi gati
onstructure.

Si
ncet
heyar
esosi
mil
ar,t
hebi
ggestf
act
orsi
nconsi
der
ingLMSar
e(noti
nor
der
):

 Cost
 Easeofuse
 TheLMSs( andcompany’ s)maturi
tyandpr esence( along-est
abli
shedrecord
andapr esenceint heregion)
 Appearance( l
ookandf eel)
 Theabil
itytoint
egratewi thexist
ingSt udentI
nfor
mat ionSystems(SIS)/
Educati
on
Inf
ormationManagementSyst ems( EMI S)
 Suit
eofsuppor ts(hosti
ngt hecour se,coursedesign,helpwithupgrades,et
c.)
 Special
features(e.g.,Blackboard’
ssui teofappl
icati
ons ;Moodle’
sfi
lt
eri
ng
syst
em;D2L’ sportfol
iofeature)
 

MOOCs—Massivel
yOpenOnl i
neCourses—canbeconsi deredLMSs,justwritl
arge,
f
ort
housandsorhundredsoft
housandsoflear
ners.Oner eal
lyni
cefeatur
eof
MOOCsthatmoreandmor eLMSdesignersarecopying(forexampl
e,Acat ar)i
sthe
r
eal
l
ycleanuseri
nter
faceandsimplenavi
gati
onstruct
ureofaMOOC.  

1.
1.4.
2SocialMedi
aandPeer
-to-
PeerPlat
for
ms
BecauseFacebooki sthemostpopularsit
eont heWor l
dWi deWeb( oneofever y
sevenmi nutesspentonl
i
neisonFacebook) ,f
reesoci almedianetwor kscanbean
alt
ernati
vetoanLMS.Edmodo,f orexampl e,i
saf reeeducat i
onalsocialnet
wor ki
ng
appli
cati
on. Thi
stypeofappl
icat
ion 
isusedasanal t
ernati
vetoLMSsbyuni versit
ies
andMi nist
ri
esofEducati
onsandschoolsalloverthewor ldbecauseoft hefoll
owing
reasons:

 Cost:Iti
sfreeandavai l
abletoever yoneaslongasoneisconnect
edtothe
I
nternet.
 Educ ati
onalfocus:Educationalsocialnet
worki
ngappsaredesi
gnedforteacher
s
andst udentsandonlinelearni
ng.Itdoesnothaveorpromotecommer ci
al
cont
ent .
 Lessbandwi dt
hintensi
ve:Itsuppor t
slow-bandwi
dthcommunicat
ionsso
studentsandi nstructorscancar ryonsynchr onous( real
-t
imeorlive)and
asynchronous( delayed)conver sati
onswi thoutt heneedf oral
otofbandwi dth.
Additi
onal l
y,student sorinstr
uctorswi thsmar tphonescanaccesst heEdmodo
appand/ oraccesst hecour seviat heirphones,ver susacomput er.
 Servesasanonl i
necl assroom:Edmodomakesf oranexcell
entcoursesit
e,
al
lowingf orreadingst obehousedi nal i
brary,theformationofsmal l
groups,
discussionstobear chived,thir
d-par t
yapps ,andpost i
ngofphotosandvi deos.
 Fa mil
iarandeasyt ouse:Edmodomi mi csFacebooki nuseandst r
uctureand
shouldthusr equirever yli
ttl
etrai
ningt ouse.I tmi mi
csanappl i
cati
onwi t
hwhi ch,
manyi nstructorsandst udent saref amili
ar.

 
Fi
gur
e1.
1.4.
2aEdmodoasaSoci
alNet
wor
kingAl
ter
nat
i oLMS2
vet

Thereareotheropti
onsinthi
sspace,everythingfrom VoiceThreadt oTwitt
erchats
toonli
nelearni
ngcommuni ti
es,l
ikeClassr
oom 2. 0(nottechnical
lysocialmedia)or
Peer2PeerUniver
sit
ytoblogs(li
kethisone).Ift
heideaist ohavel earner
steaching
eachotherinanopenenvironment( ver
sust hetr
aditi
onalinst
ructorinthe“wall
ed
garden”ofanLMS) ,opt
ion2maybeagoodwayt ogo.

Tobeabletohaveagl
anceatwhatasoci
alnet
worki
ngcanbeusedasanonl
ine
educat
ional
tool
,cl
i
ckt
heimagebelowtoseethef
eatur
esandf
uncti
onal
i
tyof
Edmodo. er
nal
sit
e.)

1
.1.
4.3Conf
erenci
ngAppl
i
cat
ions
Onl
i
neMeet
ing

Oneal ter
nat ivetothest andar donlinecour se( viaanLMS)orasoci alnetworki
ngsite
sanonl
i i
neconf erencingsyst em thatall
owsf orwebi nars(semi narsconductedvia
theweb)andonl inemeet i
ngs .Webconf erencesmi mi ct
het radit
ionall
ectur
eone
fi
ndsinuni versi
tyorcl assroom- -t
hei nstr
uct orcanl ectur
e,shar enotesora
presentationandst udentscanevenvi r
tuall
yr aisetheirhandsandask
questions/communi catethroughvoi ceorchat .Thedangeri sthat,unl
essuniversi
ty
facul
tyar ehi ghl
ycr eativeanddet er minedt obedi f
ferent
,thiscanr eal
lypromote
veryinstr
uct or-l
ead,l ecture-basedi nstr
uctionwi thoutanyf ormal hands-onor
1
simplepr acticalappl i
cati
on.
 

Fi
gur
e 1
.1.
4.3aExampl
eofWebConf
er ng2
enci

Li
keLMSs,t herearenumer ous  onli
nemeet i
ng/ conf
er encingsyst emst ochoose
fr
om- AdobeConnectandWebexar
- etwopopul arcommer ci
alones.Ther ear
ef r
ee
opti
onsl ikejoin.
meorevenSkypeorGoogl ehangout s.Commer cialopti
onsare
prettystandardi nthattheyal
lowyout odovi deoconf erencing,shar eadesktop;dial
i
nwi thaphone;hol dl
ivechats;integratel
andlineaudi oconf erencing;conduct
poll
ing;shar efil
es;haveunlimitedwebi narspermont h;archivewebi nars;andall
providet echnicalsupport.
 Allaresimi l
art
ooi nthattheyi ncreasei npri
ceasyouadd
mor epar ti
cipants.Thebigdiff
er enceseemst obepr iceandt hecompl exit
yofwhat
youwi ll
wantt odo.

 
Two-
wayAudi
o

Afinalopti
onistousetwo-wayvideof orone- to-onecoachi ngandt utori
ng(for
example,SkypeorGoogleHangout s.Thi sisanext raordinari
lypowerf ulf
orm of
onli
nelearni
ngbecauseitcanprovidei ntensi
veone- t
o- one( orone-to-many)
i
nstruct
ionandsupportandmakee- l
ear ninglessi mpersonal andmor e“ f
ace-based.”
Andofcour se,seei
ngsomeoneandt alkingwi t
ht hem one- on- onei
ssoessent i
alto
developingrapport
—andwhenonl i
nel earnersdevel opar apportwit
ht hei
ronli
ne
i
nstruct
ortheyaremor el
ikel
ytopersi
sti nanonl inecour seofst udy.

1
.2Onl
i
neSaf
ety,Secur
it
y,Et
hicsandEt
iquet
te

Almostallpeoplesurft
hewebt ochecktheirblogsandemai l
s,downloadsongsand
videos,watchvideocli
ps,andsomanyot heronl i
neacti
vit
ies
.Accordi
ngt oJul
y
1
201 6stati
sti
cs,t
herearealr
eady3. 4BIl
l
ionInternetuser
swor l
dwide. Thi
smeans
thattherearesomanypeopl ewhoar ei
ntobr owsingovertheInt
ernetworldwi
de.
Theseuser sarepronetocertai
nattacks,mayi tbeonethatcausedamageorhacks
yoursystem togatheressenti
ali
nformati
on.

Year I
nter
netUs
ers Penetr
ati
on Wor
ld Non-Users 1YUser1YUser World
(% ofPop)Populat
ion (
Int
ernet
less) Chang Change Pop.
e Chang
e
201
6*3,
424,
971
,237 46.
1% 7,
432,
663,
275 4,
007,
692,
0387.
5% 238,
975,
0821
.13%

Tabl
e1.
2aNumberofI
nter
netUs
ersovert
heTot
alWor
ldPopul
ati
onasofJul 61
y201

YourOnl
i
neandOf
fl
ineI
dent
if
y
Asmoretimeisspentonl
ine,youri
dent
it
y,bot
honlineandoff
li
ne,canaffectyour
l
if
e.Youroff
li
neident
it
yisthepersonwhoyourfr
iendsandfamil
yint
eractwithona
dail
ybasisathome,atschool,orwork.Theyknowyourper sonal
inf
ormati
on,such
asyourname,age,orwher eyoul i
ve.Youronl
ineident
ityi
swhoyouar ein
cyberspace.Youronl
inei
dentityi
showyoupr esentyoursel
ftoot
hersonli
ne.Thi
s
onli
neidenti
tyshoul
donlyrevealali
mitedamountofinformati
onaboutyou.
However ,duetoli
mit
edknowl edgeofwhatishappeningaround,mostpeople
neglectt
oconsidersecur
ingtheinfor
mat i
onvi
aonl i
ne.

Your onl
ineidenti
ty canal sobeconsider
edasanact ivelyconstruct
edpr esentati
on
ofoneself.Alt
houghsomepeopl echoosetouset heirreal namesonl i
ne,some
I
nternetuserspref ertobeanonymous ,i
dent
if
yingt hemsel vesbymeansof
pseudonyms,whi chr evealvar
yingamountsofper sonallyidenti
fi
ableinformati
on.
Anonl i
neidentit
ymayevenbedet er
minedbyauser '
sr elati
onshipt
oacer t
ainsocial
grouptheyar eapar tofonli
ne.Somecanevenbedecept i
veabouttheirident
ity.

I
nsomeonl inecont exts,i
ncl udi
ngI nt
ernetforums,onl i
nechat s,andmassi vel
y
mul t
ipl
ayeronli
ner ole-playinggames( MMORPGs) ,userscanr epresentthemselves
vi
sual l
ybychoosi nganavat ar,anicon-sizedgr aphi cimage.Avat arsareone-way
usersexpressthei ronl i
nei denti
ty.Throughint eracti
onwi t
hot herusers,an
establi
shedonlinei dent i
tyacqui r
esar eputation,whi chenabl esotherusersto
decidewhet herthei denti
tyi sworthyoftrust.Onl i
nei dent
iti
esar eassociat
edwi t
h
usersthroughaut hent ication,whichtypicall
yr equir
esr egist
rati
onandl oggingin.
2
Somewebsi tesalsouset heuser '
sIPaddr essort rackingcooki estoidenti
fyusers.

ApartofICTl
earni
ngistomakesuret
hati
ndivi
dual
sareawareoft heonli
nesecur
it
y
thr
eatsandal
lpossi
blemeasur
estocombatandpreventsuchat
tacks.The
succeedi
ngmoduleswil
lbeabl
etoassi
stt
hestudentsi
nsuchlearning.

 
1
.2.
1YourOnl
i
neDat
a
Dat
aandI
nfor
mat
ion

Anyinfor
mat i
onaboutyoucanbeconsi deredyourdata.Thi
spersonali
nformati
on
canuniquel
yi dent
if
yyouasani ndivi
dual.Thi
sdataincl
udesphotosandmessages
thatyouexchangewi t
hyourfamil
yandf r
iendsonl
ine.OtherI
nfor
mat i
on,suchas
name,socialsecuri
tynumber,dateandpl aceofbi
rth,ormother‘
smaidenname,i s
knownbyyouandusedt oi
denti
fyyou.Thef oll
owi
ngar esomeoft heareasthat
i
nvolveyouridenti
fi
cati
on:

 Medical
Recor ds-I nf
ormati
onpr ovi
dedt oyoubyyourdoct or,i
ncludingphysi
cal
andment alheal t
h,prescr
ipt
ionandot herper sonali
nfor
mationthatmaynotbe
medical
l
yr elated,isconsi
deredyourel ectr
oni cheal
threcor
ds( EHRs) .Besi
des
yourmedical hist
oryandper sonali
nformation,theEHRmayal soinclude
i
nformat
ionaboutyourf amil
y.Clini
caldatalikeheartrat
es,bloodpr essures
,and
bl
oodsugarl evelsthatmaybest or
edvi aunderacl oudplat
formisal so
consi
deredapar tofyourmedi calr
ecor d
Fi
gur
e1.
2.1
aSampl
emedi
cal
recor
dcont ai
ningper
sonal
inf
ormat
ionaboutt
he
pat
ient

 EducationRecords-Yourgradesandtestscores,youratt
endance,courses
taken,awardsanddegreesrewarded,andanydi sci
pli
naryreport
smaybei n
youreducationrecor
d.Thi
srecordmayal soincl
udecontactinfor
mati
on,healt
h
andimmuni zati
onrecor
ds,andspecialeducati
onrecordsincl
udingi
ndivi
duali
zed

educat
ionpr
ogr
ams(
IEPs)
.
Fi
gur
e1.
2.1
bSampl
eEducati
onalRecor
dcontai
ningthegr
adesoft
hesampl
e
st
udentfort
heenti
reschoolyear

 EmploymentandFi nancialRecords-Yourfi
nancialr
ecordmayinclude
i
nformati
onaboutyouri ncomeandexpendi t
ures.Taxrecor
dscouldincl
ude
paycheckstubs,cr
editcardstatements
,yourcreditr
ati
ngandotherbanking
i
nformati
on.Yourempl oymentinformati
oncanincludeyourpastemployment
andyourper f
ormance.
Fi
gur
e1.
2.1
cSampl
etempl
atet
ocont
aini
nfor
mat
iont
obef
il
l
edupbyanempl
oyee

TypesofOr
gani
zat
ional
Dat
a

Tr
adi
ti
onal
Dat
a

Corpor atedataincludeper sonnelinformation,i


ntel
lectualproper ti
es ,andf inancial
data.Per sonnelinf
ormat i
oni ncl
udeappl icati
onmat eri
als,payr oll
,of f
erl ett
ers,
empl oyeeagr eement s,andanyi nformat i
onusedi nmaki ngempl oymentdeci si
ons .
Int
ell
ect ualpropert
y,suchaspat ents,tr
ademar ksandnewpr oductpl ans,all
owsa
businesst ogaineconomi cadvant ageoveri t
scompet itor
s .Thi si
nt el
lectualproperty
canbeconsi deredat radesecr et
;losingthisinf
ormat i
oncanbedi sast r
ousf ort
he
fut
ureoft hecompany.Thef inancialdata,suchasi ncomest atement s,balance
sheets,andcashf l
owst atement sofacompanygi vesinsighti ntotheheal t
hoft he
company.

I
nter
netofThi
ngsandBi
gDat
a

Withtheemer genceoft heInternetofThi ngs( I


oT),thereisalotmor edatato
manageandsecur e.IoTisalar genet wor kofphysicalobjects
,suchassensor sand
equipmentthatext endbeyondt het r
adi t
ionalcomput ernetwork.Allt
hese
connecti
ons,pl usthef actt
hatwehaveexpandedst oragecapacityandst orage
ser
vicesthrought heCl oudandvi rtuali
zat i
on,l
eadt otheexponent i
algr owthofdata.
Thi
sdat ahascr eatedanewar eaofi nteresti
nt echnologyandbusi nesscalled“Bi
g
Data".Wit
ht hevel oci
ty,volume,andvar ietyofdat ageneratedbytheI oTandt he
dai
lyoperationsofbusi ness,theconf idential
it
y,int
egrityandavail
abili
tyofthisdat
a
i
svitalt
othesur vi
valoftheorgani zati
on.
1
.2.
2Onl
i
neSecur
it
yThr
eat
sand
At
tacks
Mal
i
ciouspr
ogr
ams

Wehavebeenhear ingwor ms,viruses


,andTr ojanhorses,butwecannot  usual
l
y
di
stinguishonef r
om theother.Mostoft heti
me,weevent r
eatallmal
icious
programsasvi rusesast hi
sisthemostcommont erm people know;t
het ermsare
usedi nt
erchangeablywhent heyf unct
ionunli
kelyfrom theother.Whateverthei
r
di
fferencesare,allofthem are cr
iti
calt
hreat
s thatcancertai
nlydamageourPC' sor
l
aptops.

Sour
cesoft
hreat
s

Thef
oll
owi
ngar
etheusual
sour
cesoft
hreat
sandmal
war
epenet
rat
ion:

 visit
ingsitesthatcont ainsdrive-byat t
ackcodes .Adr i
ve-byat tacki saway
wher eanexpl oi
tisbei ngmadewhi chall
owsanat t
ackert ogatheri nformati
on
from t heuserorembeddi ngamal war eintothesystem ashei saccessi ngthe
site.Thesesi t
esmaybeaccessedvi aanadver ti
sementoral i
nksentt othevia
user
 downl oadingmal i
cioussof twaredisguisedaskeygens,cr acks,and  patches
 downl oadingfil
esvia peer -
to-peer networks(forexampl e,torrents).
 downl oadingattachment sfrom emai l
ssentespecial
lyfrom unknownsour ces
 replyingt oemai l
sinvolvingyourcr edential
ssuchascr editcar dnumber s,soci
al
secur itynumber s,andf ewot herthings
 i
nst all
ingsoftwar eappl i
cati
onswi t
hbugs,gl it
chesandvul nerabil
it
ies
 pluggi nginremovabl emedi acontai ni
ngmal i
ciousprograms

CommonEf
fect
s ofMal
war
e
Damagef rom mal
war evar
iesfrom causi
ngmi norir
ri
tat
ion(
suchasbr owserpopup
ads),t
osteali
ngconfi
denti
ali
nformationormoney,destroyi
ngdata,and
compr omisi
ngand/orent
ir
elydisabl
ingsyst
emsandnet wor
ks.Thefoll
owing
1
specif
ical
l
yenumeratestheli
stofpossibl
eeffectsofmalwareatt
acks:

 sl
owingdownyouroper
ati
ngsyst
em,yourI
nter
netspeedort
hespeedofyour
appl
i
cati
ons.

 unexpect
edpop- ups 
appear
ingonthesyst
em;somet
imes
,theycomebundled
wit
hotherconcealedmalwar
ethreat
s,andwhi
chcoul
dbemor edest
ruct
ivef
or
oursyst
ems.

 syst
em crashesf
requent
lyorBSOD(
BlueScr
eenofDeat
h)i
sexper
ienced
regul
arl
y.

 physi
caldi
skcont
inuest
oexhibitexcessi
veacti
vi
tyevenwhenyoudon’tuseit
andtherei
snoprogram ordownloadrunningatthatmoment
,thi
scoul
dbet he
ri
ghtti
metocheckyoursystem formalware.

 runni
ngoutofharddi
skspace;t
hereareanumberof 
mali
cioussoft
warewhich
usevariousmet
hodstof
il
lupall
theavail
abl
espacei
ntheharddriveandcauseit
tocrash.

 hi
ghnet
wor
kact
ivi
tyi
sbei
ngobser
vedevent
her
eisnocur
rentconnect
ioni
nthe
I
nter
net
.

 newhomepage,newtoolbar
sorunwant
edwebsi
tesbei
ngaccessedwi
thout
goi
ngther
emanuall
yusingyourbr
owser
s.

 pr
ogramsautomati
cal
l
yopenandclosewithoutuserint
ervent
ionandunusual
messagesseeni
nthedur
ingoraf
terthebooti
ngpr ocess

 sys
tem suddenl
yshut
sdownf
ornor
eason

 securi
tysolut
ioni
sdi
sabled-yourant
ivi
rusupdat
e i
sdi
sabl
edort
heant
ivi
rus
soft
wareitsel
fdoesnotwork

 st
rangemessagessentfr
om yourbl
ogsoremail
stoyourpeer
svi
aappl
i
cat
ions
i
nyoursyst
em thatyoudonothaveanycont
rol
of.
Fi
gur
e1.
2.2aSampl
escr
eenshotofBSOD

Cl
assesofMal
i
ciousSof
twar
e

Thecl
assesofmal
i
cioussof
twar
ear
edescr
i ow2:
bedbel

1.
 Vi
ruses

Acomput ervirusisat ypeofmalwar et hatpropagatesbyi nser


ti
ngacopyofi t
sel
f
i
ntoandbecomi ngpar tofanotherprogr am.Itspreadsfrom onecomput ert
o
another,l
eavi nginfecti
onsasittravel
s .Almostallvir
usesar eatt
achedtoan
executablef i
l
e,whi chmeanst hevi r
usmayexi stonasyst em butwil
lnotbeact i
veor
abletospr eadunt il
auserr unsoropenst hemal i
cioushostfil
eorprogram.When
thehostcodei sexecut ed,t
heviralcodei sexecutedaswel l
.Normall
y,thehost
program keepsf unct i
oningaft
eritisinfectedbyt hevir
us.However ,somevi r
uses
overwrit
eot herpr ogramswi t
hcopi esoft hems el
ves,whichdest r
oysthehost
program altogether. 

2.Wor
ms

Comput erwormsar esimil


artovi
rusesinthattheyreplicat
ef uncti
onal copiesof
themselvesandcancauset hesamet ypeofdamage.I ncontrasttoviruses,which
requir
ethespr eadi
ngofani nf
ectedhostfil
e,wor msar estandalonesof twareanddo
notrequireahostprogram orhumanhel ptopr opagate.Awor m entersacomput er
throughavulnerabi
li
tyi
nthesystem andtakesadvant ageoff i
l
e-transpor tor
i
nformation-t
ransportf
eatur
esont hesystem,al l
owingittotravelunaided.
 

3.Tr
ojans

ATrojanhorse i
sanothertypeofmalwarewhi
chf unct
ionedthesamewayasi twas
named: hi
stor
yf or
etel
lst
hattheGreeksgaveahugewoodenhor setothei
rfoes,t
he
Troj
ans;af
terthehorsewaswi thi
nthewall
soft
heircit
y,Greeksoldi
erscameoutof
theholl
owhor sebell
yandt heywereabl
etocaptureTroy.

I
tisaharmfulpieceofsof t
war ethatlooksl egiti
mate.User sar et ypicall
ytri
ckedinto
l
oadingandexecut i
ngi
tont heirsyst
ems .Af teriti
sactivated,i tcanachi eveany
numberofattacksont hehost,f r
om irr
it
atingt heuser( poppi ngupwi ndowsor
changi
ngdeskt ops)todamagi ngt hehost( deleti
ngf i
l
es,st ealingdat a,oractivat
ing
andspreadi
ngot hermalware,suchasvi ruses ).Tr
ojansar eal soknownt ocreate
backdoorstogi vemalici
oususer saccesst othesystem (a  backdoori san
undocumentedwayofaccessi ngasyst em,bypassi ngt henor mal authenti
cation
mechanisms). 

Unli
kevirusesandworms,Troj
ansdonotreproducebyinf
ecti
ngotherfi
l
esnordo
theyself
-repl
icat
e.Tr
ojansmustspr
eadthr
oughuserinter
act
ionsuchasopeningan
e-mailatt
achmentordownloadi
ngandrunningaf i
l
efr
om theInt
ernet
.

4.
 Bot
s

"Bot"i
sder i
vedf r
om thewor d"robot
"andisanaut omatedprocesst hati
nteracts
wit
hot hernetworkser vi
ces .Botsoft
enautomatetasksandpr ovi
dei nfor
mat i
onor
servi
cesthatwoul dother wi
sebeconduct edbyahumanbei ng.At ypicaluseofbot s
i
stogat herinfor
mat i
on( suchaswebcr awl
ers)
,orint
eractautomat i
call
ywi t
hinstant
messaging( IM),I
nternetRel ayChat(I
RC),orotherwebinter
faces.Theymayal sobe
usedtointeractdynami call
ywi t
hwebsites.

Bot scanbeusedf oreit


hergoodormal i
ciousintent.Amal ici
ousbotisself-
propagat ingmal war edesi
gnedt oinf
ectahostandconnectbackt oacent r
alserver
orser verst hatactasacommandandcont r
ol (
C&C)cent erforanenti
renet workof
compr omi seddevices,or"botnet.
"Withabot net,attackerscanlaunchbroad- based,
"remot e-cont r
ol,"f
lood-t
ypeat t
acksagainsttheirtarget(
s).Inaddi
ti
ontot hewor m-
l
ikeabi li
tytosel f
-propagate,botscanincl
udet heabi li
tytologkeyst
rokes,gather
passwor ds,captureandanal yzepackets,gatherfinanciali
nformati
on,l
aunchDoS
attacks,rel ayspam,andopenbackdoor sont heinfectedhost .

 
Phi
shi
ng

Phishi
ngist
heactofsendinganemailtoauserfal
selycl
aimingtobeanestabl
i
shed
l
egiti
mateenter
pri
seinanattemptt
oscam theuserintosur
renderi
ngpr
ivat
e
i
nformati
onthatwi
llbeusedfori
denti
tythef
t.

Phi
shi
ngemai lwi
ll
typi
cal
lydirecttheusert
ovisitawebsitewher et
heyar easkedto
updat
epersonali
nformat
ion,suchasapasswor d,credi
tcard,soci
alsecuri
ty,or
bankaccountnumbers,t
hatthelegiti
mateorganizat
ionalr
eadyhas.Thewebsi t
e,
however,i
sbogusandwi l
lcaptureandstealanyinformati
ontheuserentersont he
page.

Thewor disausedasahomophonet o fi


shingduet othesimil
ar i
tyofusingabai tin
anatt
emptt ocatchavi cti
m.Communi cationspur porti
ngtobef rom popularsocial
webs i
tes,aucti
onsi tes,banks,onlinepaymentpr ocessorsorITadmi nist
ratorsare
commonl yusedt olur eunsuspectingvi cti
ms .Phishingemai l
smaycont ainli
nksto
websi
test hatareinfectedwi t
hmal war e.Phishingi stypi
call
ycar ri
edoutbyemai l
spoof
ingori nst
antmes saging,andi tof tendirectsuser st
oent erdetail
sataf ake
websi
tewhosel ookandf eelarealmosti denticaltothelegit
imat eone.Phishingisan
exampleofsoci alengineeringtechni quesusedt odecei veuser s,andexploitsthe
3
poorusabili
tyofcurrentwebsecur itytechnol ogies . 

Exampl
esofPhi
shi
ngScams

2003sawt hepr ol
if
erati
onofaphi shi
ngscam inwhi chusersrecei
vedemai l
s
supposedlyf rom eBayclai
mi ngthattheuser'
saccountwasaboutt obesuspended
unlesshecl i
ckedont heprovidedemai l
li
nkandupdat edthecredi
tcardi
nformati
on
thatthegenui neeBayalreadyhad.Becausei tisrelati
velysi
mpletomakeawebsi te
l
ookl ikealegiti
mateorganizati
on'ssitebymimickingt heHTMLcode,t hescam
count edonpeopl ebeingtri
ckedi ntothi
nki
ngtheywer eactual
lybei
ngcontactedby
eBayandwer esubsequentlygoingt oeBay'
ssitetoupdat ethei
raccount
3
i
nformat i
on. 
1
.2.
3Cyber
secur
it
y
 

Whati
sCyber
secur
it
y?

Theconnect edelectronicinformati
onnet workhasbecomeani nt egral par
tofour
dai
lyli
ves.Allt
ypesofor ganizati
ons,suchasmedi cal,fi
nancial,andeducat ion
i
nsti
tut
ions,usethisnet workt ooperateeffecti
vely.Theyut i
l
izet henet workby
col
lect
ing,processing,storing,andshar i
ngvas tamount sofdi gitalinformati
on.As
moredigit
alinfor
mat ionisgat heredandshar ed,thepr otect
ionoft hisinfor
mat i
oni
s
becomingevenmor evitaltoournationalsecuri
tyandeconomi cst abili
ty.

Cybersecur i
tyi
stheongoi ngeff
ortt
opr otectthesenetwor kedsystemsandal loft
he
datafrom unauthori
zeduseorhar m.Onaper sonallevel,youneedt osafeguard
yourident
ity,yourdata,andyourcomput i
ngdevi ces.Att hecor por
atelevel,i
tis
everyone’
sr esponsi
bili
tyt
oprotectt
heor ganizati
on’
sr eput ati
on,data,and
customers.Atthestatelevel
,nati
onalsecurit
y,andthesaf etyandwel l
-beingofthe
ci
ti
zensar eatstake.

Cybert
hreat
s

Youronlinecredent i
alsarevaluable.Thesecr edenti
alsgivethethi
evesaccesst o
youraccount s
,whi chint ur
nwi l
lgivethem accesst othemoneyyoust or ei
nyour
accounts.Acr i
minal couldalsotakeadvant ageofyourr elati
onshi
ps .Theycould
accessyouronl i
neaccount sandyourr eputationtotri
ckyoui nt
owi ri
ngmoneyt o
yourfri
endsorf ami l
y.Thistri
ckwhi chiscoinedassoci alengineer
ingal lowscri
minal
tosendmessagesst at
ingthatyourf amil
yorf ri
endsneedyout owi r
et hem money
sotheycangethomef rom abroadaf t
erlosi
ngt hei
rwal l
ets.Thi
stechni queisal
so
usedbyt hesecr i
minalst omanipulatepeopl eint
omaki ngt hem t
hinktheyar eclosed
fr
iends,buttheyact uall
yhavehi ddenintenti
onsbehi ndthis.

Thecri
minal
sarever
yimaginat
ivewhentheyaretr
yingtot
ri
ckyouint
ogivi
ngt hem
money.Theydonotj
ustst
ealyourmoney;theycoul
dalsosteal
youri
denti
tyandruin
yourl
i
fe.

Ther
ear
etwot
ypesofsecur
it
ythr
eat
s.At
tacksor
igi
nat
ingf
rom wi
thi
nan
organi zationorf r
om out sideoft heor ganizat i
oni sknownasani nter nal threat.An
i
nt ernal user,suchasanempl oyeeorcont ractpar t
ner ,canacci dent all
yor
i
nt entionallymi shandl econf i
dent i
aldata,thr eat entheoper ati
onsofi nter nalservers
ornet wor ki nf
r astructuredevices ,f
acili
tateout sideat tacksbyconnect i
ngi nfected
USBmedi aintot hecor por at
ecomput ersyst em,acci dentall
yinvit
emal war eont othe
net wor kthroughmal i
ciousemai lorwebsi tes .Whent hement ionedat tacksi sdone
from t heout sidet hef acil
it
y,thisisconsider edt obeanext er
nalthreat s.I nternal
threatsal sohavet hepot enti
al t
ocausegr eat erdamaget hanexter nal threats,
becausei nternal user shavedi rectaccesst ot hebui ldingandi tsinfrast ructure
devi ces.Empl oyeesal sohaveknowl edgeoft hecor por atenetwor k,i t
sr esour ces,
andi t
sconf i
dent i
al data,aswel lasdifferentl evel sofuseroradmi nistr
at ivepr i
vil
eges.

TypesofAt
tacker
s

Att
ackersarei
ndi
vi
dualsorgroupswhoat
tempttoexploi
tvul
nerabi
li
tyforper
sonal
orfi
nancial
gai
n.Att
ackersar
einter
est
edi
neverythi
ng,fr
om credi
tcardstoproduct
desi
gnsandanythi
ngwi t
hval
ue.

Amat eur
s–Thesepeopl ear esometimescal l
edScriptKi
ddies.Theyareusual l
y
att
ackerswit
hlit
tl
eornoski ll
,of
tenusingexisti
ngtoolsorinst
ruct
ionsfoundont he
I
nternett
olaunchattacks.Someoft hem arejustcuri
ous,whileother
sar etryi
ngto
demonstrat
etheirski
ll
sandcaus eharm.Theymaybeusi ngbasictools,butthe
resul
tscansti
l
lbedevas tat
ing.

Hacker s–Thi sgroupofat t


acker sbreakintocomput ersornet wor kst ogainaccess.
Dependi ngont heintentoft hebr eak-i
n,theseattackersarecl assifi
edaswhi t
e,gray,
orblackhat s.Thewhi tehatat tackersbreakintonetwor ksorcomput ersyst
emst o
discoverweaknessessot hatthesecur it
yofthesesystemscanbei mpr oved.These
break- i
nsaredonewi thpr i
orper missi
onandanyr esult
sar erepor tedbackt othe
owner .Ont heotherhand,bl ackhatat t
ackerstakeadvant ageofanyvul ner
abil
it
yfor
i
ll
egal personal,f
inancialorpol i
ti
calgain.Grayhatat t
acker saresomewher e
betweenwhi t
eandbl ackhatat tackers.Thegrayhatat t
acker smayf inda
vulnerabil
i
tyinasyst em.Gr ayhathacker smayr eportthevulner abili
tytotheowner s
ofthesyst em i
fthatact i
oncoi ncideswi t
htheiragenda.Somegr ayhathacker s
publishthefactsaboutt hevul nerabil
it
yont heInter
netsot hatot herat t
ackerscan
exploiti
t.
OrganizedHacker s–Thesehacker sincl
udeor gani zationsofcybercr iminals
,
hackti
vists,ter
rori
sts,andst ate-sponsoredhacker s.Cybercr i
mi nalsareusually
groupsofpr of
essional cri
minalsfocusedoncont rol ,power ,andweal t
h.The
cri
minalsar ehighl
ysophi sti
catedandor ganized,andt heymayevenpr ovi
de
cybercri
measaser vicet oothercr i
minal
s.Hackt ivistsmakepol iti
calstatementsto
createawar enesst oissuest hatareimportanttot hem.St ate-sponsor edattackers
gatherintell
i
genceorcommi tsabotageonbehal foft heirgover nment .These
att
acker sareusual l
yhighl ytr
ainedandwel l-funded,andt hei
rat tacksar ef
ocused
onspeci fi
cgoal st
hatar ebenef i
cialt
othei
rgover nment .

TheConsequencesofaSecur
it
yBr
each

Topr ot
ectanor ganizat
ionfrom everypossi
blecyberat
tackisnotfeasi
ble,foraf ew
reasons.Theexper t
isenecessarytosetupandmai ntainthesecurenetworkcanbe
expensive.Attacker
swillal
wayscont i
nuetofindnewwayst otar
getnetwor ks.
Eventuall
y,anadvancedandt arget
edcyberattackwil
lsucceed.Thepr i
ori
tywi l
lt
hen
behowqui ckl
yyoursecur i
tyteam canrespondt ot
heat t
acktominimizethel ossof
data,downt i
me,andr evenue.

Bynowyouknowt hatanythingpost edonl


inecanliveonl i
nefor ever,eveni fyou
wereabletoer aseal lt
hecopi esinyourpossession.Ifyourser verswer ehacked,t he
confi
denti
alpersonnel informationcouldbemadepubl ic.Ahacker( orhacki ng
group)mayvandal izet hecompanywebsi tebypost i
ngunt rueinformat i
onandr ui
n
thecompany’sr eputati
ont hattookyear st
obuil
d.Thehacker scanal sotakedown
thecompanywebsi t
ecausi ngthecompanyt ol
oser evenue.Ift hewebsi teisdown
forl
ongerperiodsoft ime,t hecompanymayappearunr el
iabl
eandpossi bl
yl ose
credi
bil
i
ty.I
fthecompanywebsi teornetworkhasbeenbr eached,t hiscoul dleadto
l
eakedconf i
dent i
aldocument s,reveal
edtradesecrets,andst olenintel
lectual
propert
y.Thelossofal l t
hisinf
or mati
onmayi mpedecompanygr owt hand
expansi
on.

Themonet arycostofabreachismuchhi gherthanjustr


eplacinganyl ostorst
olen
devi
ces,invest
inginexi
sti
ngsecur i
tyandstr
engtheningthebuilding’sphysical
secur
it
y.Thecompanymayber esponsi
blef
orcontacti
ngalltheaf fectedcustomers
aboutthebreachandmayhavet obepreparedforl
iti
gat
ion.Wi thallthistur
moil
,
employeesmaychooset ol eavethecompany.Thecompanymayneedt ofocus
l
essongr
owi
ngandmor
eonr
epai
ri
ngi
tsr
eput
ati
on.

Legal
Issuesi
nCyber
secur
it
y

Cybersecuri
typrofessionalsmusthavet hesameskill
sashackers,especi
all
ybl
ack
hathackers,i
nor dertopr otectagai
nstatt
acks.Onediff
erencebetweenahacker
andacyber securit
ypr ofessi
onalist
hatthecybersecuri
typr
ofessi
onalmustwork
wit
hinlegalboundar i
es.

Per
sonal
Legal
Issues

Youdonotevenhavet obeanemployeet obesubjectt


ocybersecuri
tylaws.I
nyour
pri
vateli
fe,youmayhavet heopportuni
tyandskil
l
st ohackanotherperson’
s
computerornetwor k.Ther
eisanoldsaying,“
Justbecauseyoucandoesnotmean
youshould.”Keept hi
sinmind.Mosthackersl
eavetracks,whet
hertheyknowi tor
not,andthesetrackscanbef ol
l
owedbackt othehacker.

Cybersecuri
typr
ofessional
sdevelopmanyskil
l
swhi
chcanbeusedforgoodorevil
.
Thosewhouset heirskil
l
swi t
hint
helegal
syst
em,t
oprot
ecti
nfr
ast
ruct
ure,net
works,
andprivacyareal
waysi nhighdemand.

Cor
por
ateLegal
Issues

Mostcountri
eshavesomecyber secur
it
ylawsinpl
ace.Theymayhavet odowith
cri
ti
cali
nfr
astr
uctur
e,networ
ks,andcorporat
eandindi
vidual
pri
vacy.Busi
nessesar
e
requi
redtoabidebythesel
aws.

I
nsomecases,ifyoubr eakcyber
secur
ityl
awswhiledoi
ngyourj
ob,iti
sthe
companyt
hatmaybepuni shedandyoucouldloseyourj
ob.I
nothercases,you
coul
dbeprosecuted,f
ined,andpossi
blysent
enced.

I
ngeneral,i
fyouareconfusedaboutwhetheranact
ionorbehavi
ormightbeill
egal
,
assumethatiti
sil
l
egalanddonotdoi t
.Yourcompanymayhaveal egaldepart
ment
orsomeoneinthehumanr esourcesdepar
tmentwhocanansweryourquestions
befor
eyoudosomet hi
ngi l
l
egal.

I
nter
nat
ional
LawandCyber
secur
it
y

Theareaofcyber
securi
tylawismuchnewerthancybersecur
it
yit
sel
f.Asment
ioned
bef
ore,mostcountr
ieshavesomelawsinpl
ace,andtherewil
lbemor el
awsto
come.

I
nternat
ionalcybersecuri
tylawissti
l
lqui t
enew.TheInt
ernati
onalMulti
l
ateral
Part
nershipAgainstCyberThr eats(
IMPACT)i st
hefi
rst
,int
ernat
ionalpubli
c-pri
vate
part
nershipthati
sf ocusedoncybert hreats
.IMPACTisaglobalpart
nershipofwor l
d
governments,industri
es,andacademi adedicat
edtoimprovi
ngglobalcapabili
ti
es
whendeal i
ngwi thcyberthreats
.

Whati
sCyber
war
far
e?

Cyberspacehasbecomeanot heri mpor tantdimensionofwar f


are,wher enations
cancar r
youtconfli
ctswit
houtthecl ashesoft radi
ti
onal t
roopsandmachi nes.This
all
owscount r
ieswit
hmi ni
mal mil
itarypr esencet obeasst r
ongasot hernationsi n
cyberspace.Cyberwarfar
eisanI nternet -basedconf l
ictthati
nvolvesthepenet rati
on
ofcomput ersyst
emsandnet wor ksofot hernat i
ons.Theseat t
ackershavet he
resourcesandexperti
setolaunchmassi veInternet
-basedat t
acksagai nstother
nati
onst ocausedamageordi sruptser vices,suchasshut t
ingdownapowergr i
d.

Anexampl eofastate-sponsoredat tackinvolvedtheStuxnetmalwar


et hatwas
designedtodamageI ran’snuclearenr i
chmentpl ant.St
uxnetmalwar
edi dnothij
ack
tar
getedcomput er
st osteali
nformat i
on.Itwasdesi gnedtodamagephysi cal
equipmentthatwascont rol
l
edbycomput ers,andusedmodul arcodi
ngt hatwas
programmedt operform aspeci fi
ctaskwi t
hinthemal ware.I
tusedst
olendigit
al
cert
ifi
cat
essot heatt
ackappear edlegit
imatet othesystem.

 
Fi
gur
e1.
2.2.
bSt
uxnetat
tackwhi
chdisr
upt
edI
ran'
scent
ri
fugef
orur
ani
um
enri
chment

Cl
ickthef
oll
owi
ngl
i
nk 
(Li
nkst
oanext
ernal
sit
e.)
tol
eadyout
oavi
deoaboutSt
uxnet
at
tack.

 
Themainpur
poseofcyber
warfar
eist
ogai
nadvant
ageoveradver
sar
ies,whet
her
t
heyar
enati
onsorcompeti
tor
s.

Anat i
oncancont i
nuous l
yinvadeot hernati
on’sinf
rastr
ucture,stealdef
ensesecrets,
andgat heri
nfor
mat i
onaboutt echnologyt onarrowthegapsi ni t
sindust
ri
esand
mil
itar
y.Besidesi
ndust r
ialandmili
tari
sti
cespionage,cyber warcansabot aget
he
i
nfrast
ructur
eofothernat i
onsandcostl ivesinthetargetednations.Forexample,an
att
ackcancauset hef ol
lowing:

 disr
uptthepowergr i
dofamaj orcit
y.
 traf
fi
cwouldbedi sr
upted
 theexchangeofgoodsandser vicesishal
ted
 pati
entscannotgetthecareneededi nemergencysi
tuat
ions
.
 accesstotheInt
ernetmayalsobedi srupt
ed.
Furthermore,compromisedsensi
ti
vedatacangivetheatt
acker
stheabil
i
tyto
blackmailpersonnel
withi
nthegovernment.Theinf
ormati
onmayall
owanat tacker
topretendtobeanaut hori
zedusertoaccesssensi
ti
veinf
ormat
ionorequipment.

I
fthegovernmentcannotdefendagai nstt
hecyberat
tacks
,thecit
izensmaylose
confi
denceinthegovernment’
sabili
tytoprot
ectthem.Cyberwarf
ar ecandest
abil
ize
anati
on,disr
uptcommer ce,andaffecttheci
ti
zens’f
ait
hinthei
rgovernmentwithout
everphysi
call
yinvadi
ngthetarget
ednat i
on.

Conf
ident
ial
i
ty,I
ntegr
it
y,andAvai
l
abi
l
it
y

Confi
dent i
ali
ty,i
ntegrit
yandavai l
abil
ity,knownast heCIAt r
iadisaguidel
inefor
i
nformationsecur i
tyforanor ganizat
ion.Confidenti
ali
tyensuresthepri
vacyofdata
byrestr
icti
ngaccesst hroughauthenticati
onencrypti
on.Integri
tyassur
esthatthe
i
nformationisaccur ateandtrustworthy.Avail
abil
it
yensurest hatt
heinfor
mationis
accessi
bletoaut horizedpeople.

Fi
gur
e1.
2.2aCI
ATr
iadasgui
del
i
nef
orsecur
ingyouri
nfor
mat
ion

Conf
ident
ial
i
ty

Anothert
ermforconf
ident
ial
i
tywouldbepri
vacy.Companypol
ici
esshouldr
est
ri
ct
accesstothei
nfor
mationt
oauthor
izedper
sonnelandensur
ethatonl
ythose
authori
zedindivi
dualsviewt hi
sdat a.Thedat amaybecompar tment al
izedaccording
tothesecurityorsensit
ivi
tyleveloftheinformation.Forexampl e,aJavapr ogram
developershouldnothavet oaccesst otheper sonali
nfor
mat ionofal lemployees.
Further
mor e,employeesshoul dr ecei
vet r
aini
ngt ounderstandt hebestpr acti
cesin
safeguardi
ngsensi t
iveinfor
mat i
ont oprotectthemselvesandt hecompanyf rom
att
acks.Met hodstoensur econfidential
i
tyincludedataencr yption,usernameI Dand
password,twof actorauthenti
cation,andmi nimizi
ngexposur eofsensi ti
ve
i
nformation.

I
ntegr
it
y

I
ntegri
tyisaccuracy,consistency,andtrustworthi
nessoft hedataduringit
sentir
e
l
if
ecycle.Datamustbeunal teredduringtransi
tandi snotchangedbyunaut hori
zed
enti
ti
es.Fil
epermissionsanduseraccesscont r
olcanpr eventunauthori
zedaccess.
Versi
oncont r
olcanbeusedt opreventaccidentalchangesbyaut hori
zeduser s
.
Backupsmustbeavai l
abletor est
oreanycor rupteddata,andchecksum hashi ng
canbeusedt over i
fyint
egr i
tyofthedatadur i
ngt ransf
er.

Achecksum i susedt overi


fytheint
egri
tyoffil
es,orstri
ngsofchar acters,af
terthey
havebeent ransfer
redfrom onedevicet oanotheracrossyourl
ocal networ korthe
I
nternet.Checksumsar ecalculat
edwi t
hhashf uncti
ons.Someoft hecommon
checksumsar eMD5,SHA- 1,SHA-256,andSHA- 512.Ahashf unctionusesa
mathemat icalalgori
thm t
otransformthedat ai
ntof i
xed-l
engthvaluet hatrepresent
s
thedata.Thehashedval ueissimplythereforcompar i
son.From thehashedval ue,
theori
ginal datacannotber etri
eveddir
ectl
y.Forexampl e,i
fyouf orgotyour
passwor d,yourpasswor dcannotber ecoveredf r
om thehashedval ue.The
passwor dmustber eset.

Avai
l
abi
l
it
y

Avai l
abili
tyi sbestensur edbyr igor ouslymai nt
ai ni
ngal lhardwar e,per f
orming
hardwar er epai r
si mmedi atelywhenneededandmai nt
aini
ngacor r
ectlyfunctioni
ng
oper ati
ngsyst em environmentt hatisf r
eeofsof twareconf li
cts.It
’salsoimpor tantto
keepcur rentwi thallnecessar ys ystem upgr ades.  Providi
ngadequat e
communi cat i
onbandwi dt
handpr eventingtheoccur renceofbot tl
enecksar eequal l
y
i
mpor tant.Redundancy,f ailover,RAI Devenhi gh- avail
abil
i
tycl usterscanmi ti
gat e
seriousconsequenceswhenhar dwar eissuesdooccur .Fastandadapt ivedisaster
recover yi sessent i
alforthewor stcasescenar ios;thatcapaci tyisreli
antont he
existenceofacompr ehensi vedi sasterrecover yplan( DRP) .Safeguar dsagai nst
datal ossori nterrupti
onsi nconnect ionsmusti ncludeunpr edictableeventssuchas
natural disast ersandf ir
e.Topr eventdat alossf rom suchoccur r
ences,abackup
copymaybest or
edinageographi
call
y-i
sol
atedl
ocati
on,perhapsevenina
fi
reproof,wat
erpr
oofsaf
e.Ext
rasecuri
tyequi
pmentorsoftwaresuchasfir
ewall
s
andpr oxyser
verscanguar
dagainstdownti
meandunr eachabledatadueto
malici
ousacti
onssuchasdeni
al-of
-servi
ce(DoS)at
tacksandnet worki
ntr
usi
ons.

 
1.2.
4Fi
ght
ingagai
nstsecur
it
y
t
hreat
s
BestPr
act
icesf
orCombat
ing 
Mal
war
eThr
eat
s

Oneshoul
dal
wayssecuret
heirsyst
em from mal
war
eat
tacks.Thef
oll
owi
ngst
eps
ar
erecommendat
ionsf
orcybersecuri
ty.
 

 Ensur et hatyouroper atingsyst em i supt odat e.Thi smeanst hatyoumust


regular l
yappl ythemostr ecentpat chesandf i
xest hatisr ecommendedbyt he
OSvendor .
 Instal
l anant i
- vi
russof twar einyourPC' s.Al so,assur et hattheyar eal ways
updat ed.Thi scanpr eventt hreat sl i
keviruses,Tr ojanhor sesandmal war esf r
om
causingdamagei ntoyoursyst em.Thei nst all
edsof t
war eshoul dbeemai lt
oscan
e-mai l andfil
esast heyar edownl oadedf rom t heI nternetort ransferredf r
om
external medi a.
 Firewal lshouldal waysbeenabl ed.Af i
rewal lis asetofr el
atedpr ogr ams ,
l
ocat edatanet workgat ewayser ver,thatpr ot ect sther esourcesofapr ivate
1
net wor kfrom usersf rom ot hernet works.
 Assur et hatthef i
letobedownl oadedi ssaf e.Emai l
susual lyhaveat tachedf i
les
whi chmayt endt obeunsaf easi tmaycont ainvi rusesandTr ojanhor ses.Assure
thatyourmai li
ngsi t
ehasant i
- virusext ensi onsenabl ed.Inaddi t
ion,downl oad
attachment sonlyf r
om known  trust edsender s( andatl eastver i
fyfrom the
senderi fhehasr eallysentanemai lornot ).
 Becaut i
ous accept i
ngoragr eei ngt opr ompt s.Whenpr ompt edt oinstallany
progr am oradd- on,makesur et or eadandunder standt heagr eementbef ore
cli
ckingont heOkbut ton.Ifyoudonotunder st andt heagr eementorf eeli
tisnot
necessar ytoinstallt
hepr ogram,cancel orcl oset hewi ndow.  Additi
onal l
y,when
i
nst al
linganypr ogram,wat chf orany  checkbox  
thatasksi fit'sokt oinstallathi
rd
-par t
ypr ogr
am,t oolbar ,etc.Thesear eneverr equi r
edandof tencausemor e
i
ssuest
hangood.Leavet
heseboxesunchecked.

Poi
ntst
oPondert
oSecur
eyourOwnDat
a

Yourper sonaldat
acanbeaccessedanywher e.Iti
suptoyouhowyousecur ethi
s
i
nformationfrom t
hecyberatt
ackers.Nooneissafefr
om t hesethreat
s,soiti
supt o
youtosecur eyourdataandperform appr
opri
atemeasurest oassuresafet
yand
securi
ty.Remembert hatthei
nformati
onmaybeusedagai nstyouinanywayan
att
ackercan,sopr ecaut
ionsmustbeputintoconsi
derat
ion.

 Usebr owsersi napr i


vatemanner ,especi al
l
ywhensur f
ingi
nani nter
netcaf eor
usingotherslaptops/desktops .Otherbrowser ster
mt sasI
hi nPri
vatebrowsingor
i
ncognitomode.  
Thismodeal lowst hesystem nottostoreanyinformati
on
enteredbytheuserwhi l
eusi ngt hebr owser.All
oftheinputvalueswill
total
lybe
erasedoncet heusercl osest hebr owser .However,keepinmi ndthatbrowser
needst obecl osedafterusingi t
;it
sf eaturewil
lbemeani ngl
essifthedeviceis
l
eftopenedwhi l
eyouar est i
lll
oggedi n.
 Yous houldtakecar ewhenchoosi ngauser nameoral i
asforyouronlineidenti
ty.
Theuser nameshoul dnotincludeanyper sonalinf
ormat ion.I tshouldbe
somet hi
ngappr opri
ateandr espect ful.Thisusernameshoul dnotl eadst r
angers
tothi
nkyouar eaneasyt argetforcyber cr
imesorunwant edat t
ention.
 Choos eyourpasswor dswisely.Asmuchaspossi ble,chooseapasswor dwi t
ha
combi nati
onofupper case,lower case,numer i
c,andspeci al characters.Never
usepasswor dsthatwi l
li
ncludeanyper sonalinfor
mat i
onl ikeyourbi rt
hdayorf ul
l
name.I naddit
ion,neverstoret hem inawayt hati
saccessi blebyanyone.
 Bec arefulwhenshar i
ngdocument s,pi ct
ures,andot heronl ineresour cesvia
blogsoremai l
s.Oncef il
esaredownl oadedf r
om apubl iccomput ershop,make
surethatthefi
lesarer emovedf r
om t hesystem bef oreleavi ngyourt ermi nal
.
 Beawar eofshoul
dersurf
ing.Thi
sisanactoflooki
ng"
pastyourshoulder
"
anythi
ngthatyouar
etypi
ngf r
om thekeyboar
doronyourcell
ularphonesand
tabl
etswit
houtyounot
ici
ng.

 Verifydat aisencr ypt ed.Whensendi ngconf i


dent ial informat i
onovert heI nternet ,
suchasuser names,passwor ds,orcr editcar dnumber s,onlysendi tsecur ely.To
veri
fyt hi
s,lookf orasmal l l
ock  i
nt hebot tom r i
ghtcor nerof
your browser  window  ornextt ot he  addr essbar . Ifvi sibl
e,thislockshoul dal so
beint hel ockedpos iti
onandnotunl ocked.  
Weal sosuggestmaki ngsur e
the URL  beginswi th https.  
Whi l
et hel ocki sint hel ockedposi ti
on,dat a
i
s encr ypted,whi chhel psanyonef rom under standi ngt hedat aifit'sinter cept ed.
Whennol ockisvi sibleori nt heunl ockedposi t
ion,al linformationi s plaintext and
couldber eadifinter cept ed.I fa webpage  i
snotsecur e,suchasanonl inef or um,
useapasswor dyouwoul dn' tusewi thpr otectedsi tes,suchasyouronl i
ne
bankingwebsi te.
 Bea war eofsoci alengi neer i
ng.Thi si sapsychol ogi cal manipulationof
peopl e i
ntotri
ckingot herpeopl e unt i
l t
hevi cti
m di vulgei ntoshar ingconf i
dent ial
i
nformat ion.
 Us etwo- factoraut hent icationi fitisavai lable.Two- factorauthent i
cation  adds
additionalprotectionbyr equi ri
nganaddi tional stepi nver i
fyingal ogi n.Typi cal ly
withtwo- factoraut hent i
cat ion,af terver if
yingyourpasswor d,iftheser vicedoes
notrecogni zeyourcomput er ,i
tsendsyourphoneat extmessagewi tha
veri
ficati
oncode.I fs omeonehadyourpass wor dbutdi dnothaveyourphone,
evenwi t
haval idpasswor d,theycannotaccessyouraccount .
 Whenc onnect i
ngvi aWi - Fi,logont oasecur enet wor kusingWEPorWPA;t hi
s
maypr eventnear byuser sfrom i nter ceptingandr eadi nginformat iont hathas
beens enttoandf rom yourPC.
1
.2.
5Net
iquet
teandI
nter
netChat
Rooms
Neti
quett
e,acolloqui
alt
ermf or
 networketi
quet
teorInt
erneteti
quett
e,i
sasetof
soci
alconvent
ionsthatf
aci
li
tateint
eract
ionovernet
works.Int
eract
ionmaybeinthe
for
m of:

.Emai
1 l

Elect
roni
cmail(
e-mail
)isacommonwayofcommuni cat
ingf
ormallywit
hpeopleas
youareabletoputi
nyourmessagetowhom t
hemessageisfor(i
tmaybean
i
ndivi
dualoragroupofpeople)
,asummar
yofthemessageintheSubjectf
iel
d,and
somecr i
ti
cal
inf
ormati
onofthesender
.Whencomposinganemail
,youusuall
yfil
lup
thefol
lowi
ngcomponents:

*To:f
iel
d:t
hemai
nreci
pientoft
hemessage;i
tmaycont
ainmor
ethanoneemai
l
addr
esses

*CC:fi
eld:t
hismeanscar
boncopy.Thismayincl
udeemailaddr
essesthatyouwi
sh
t
ohavethecopyoft hemail
thatyouar
egoingtosendbutarenotyourdi
rect
r
eci
pient
s.

*BCC:fi
eld:t
hismeansbl
i
ndcarboncopy.Thi
sist
hesamewithCCfi
eldexceptthat
t
hishi
desthedetai
l
softhi
sreci
pientf
rom t
heot
her
swhowil
lrecei
vet
hisemail.Thi
s
meansthatt
her
eci
pient
sfrom t
heTo:andCC:
fiel
dswi
l
lnotknowt
hatt
her
eci
pient
f
rom t
heBCC:hasr
eceivedthesameemail
.

*Subj
ect
:Thi
sport
ionshoul
dcont
ainabr
iefdet
ail
ofwhatt
hemessagei
sal
labout
andi
sconsi
deredt
heti
tl
eoftheemail
.

*Body:Thi
scont
ainst
hemessageoft
hesender
.

*Signature:Thi
sisseenatt
hebott
om porti
onofthe 
emai
land cont
ainsi
nformat
ion
aboutthesender-JobTitl
e,WorkAddress,Cont
actNumber,andmanyot her
s,t
o
nameaf ew.

2.
 Chatr
ooms

Thi
sisthequickestwayofsendingamessagetotherecipi
entandar eusual
ly
embeddedi nmostblogsit
es.Ital
soshowsthest
atusofthereceiverwhi
chwi l
lgi
ve
youahinti
fhei savai
l
abletoreadthemessageornot.Thereceivermayreply
i
mmedi at
elytothemessageast houghhe/
sheisconversi
ngwi t
ht heot
herina
tel
ephone.

 3. 
Usenet

Usenetisabul l
eti
n-t
ypeofser vi
cecontai
ning newsgroupswheretheuser scan
postmessagesandt hesepostedmessagesar edist
ri
butedviaUsenetserver
s.The
messagespost edwi l
ll
astonl
yf orali
mit
edamountoft meknownasr
i etenti
on
ti
me.  
Usenetuserscurrent
lyl
oggedi nmaybeabl etoseeandr epl
ytoanyoft he
postsgiventhesamechannel .SomeUsenetpr ovidersalsoal
l
ow usersto
upload/downloadfil
esfrom t
hesite.

Li
kethenetworkit
self,t
hesedevel
opi
ngnormsremaininast
ateoff
luxandvar
y
fr
om communitytocommuni ty.
Thepoi
ntsmostst
rongl
yemphasi
zedabout
neti
quet
teoft
eninclude:

 usi
ngsi
mpl
eel
ect
roni
csi
gnat
ures
;thi
scanbedonei
ntheset
ti
ngsoft
hemai
l
ing
sit
e.
 avoidingmul ti
post ing,cross- posting,of f-topicpost ing,hi jackingadi scussi on
thread,andot hert echni quesusedt omi nimi zet heef for trequi redt or eadapost
orat hread.
 useofunabbr eviatedEngl ishwhi leuser sofi nst antmessagi ngpr otocol slike
SMSoccasi onallyencour agej ustt heoppos i
te,bol ster inguseofSMSl anguage.
However ,manyonl i
necommuni t
iesf r
ownupont hispr act i
ce.
 avoidf l
amewar sandspam
 avoidt ypinginal lcapsorgr ossl yenl argingscr iptf oremphasi s,whi chis
consi deredt obet heequi val entofshout i
ngoryel l
ing.
 Othercommonl yshar edpoi nt s,suchasr emember i
ngt hatone' spost sar e( or
caneasi lybemade)publ i
c,ar egener all
yi ntuit
ivelyunder stoodbypubl isher sof
Webpagesandpost erstoUsenet ,al thought hisr ulei ssomewhatf lexible
dependi ngont heenvi r
onment .Onmor epr ivatepr otocol s,however ,suchase-
mai landSMS,someuser st aket hepr ivacyoft hei rpost sf orgr ant ed.One- on-
onecommuni cations,suchaspr i
vat emess agesonchatf or umsanddi rectSMSs,
maybeconsi der edmor epr ivatet hanot hersuchpr ot ocol s ,buti nfamous
breachessur roundevent heser elativelypr ivatemedi a.
 Beyondmat tersofbasi ccour tesyandpr ivacy,e- mai l synt ax( def inedbyRFC
2822)al lowsf ordi fferentt ypesofr ecipient s.Thepr i
mar yr ecipient ,def i
nedby
theTo:l i
ne,canr easonabl ybeexpect edt or espond,butr eci pi
ent sofcar bon
copiescannotbe,al thought heyst i
llmi ght .Likewi se,mi suseoft heCC:f unct i
ons
i
nl i
euoft radi
tional mai li
ngl i
st scanr esul tinser ioust echni cal i
ssues.

Cor
eRul
esofEt
iquet
te

Rul
e1:Remembert
heHuman

Rul
e2:Adher
etot
hesamest
andar
dsofbehavi
oronl
i
net
hatyouf
oll
owi
nreal
li
fe

Rul
e3:Knowwher
eyouar
eincyber
space

Rul
e4:Respectot
herpeopl
e'st
imeandbandwi
dth

Rul
e5:Makeyour
sel
flookgoodonl
i
ne

Rul
e6:Shar
eexper
tknowl
edge
Rul
e7:Hel
pkeepf
lamewar
sundercont
rol

Rul
e8:Respectot
herpeopl
e'spr
ivacy

Rul
e9:Don'
tabuseyourpower

Rul
e10:Bef
orgi
vi
ngofot
herpeopl
e'smi
stakes

1
.3Cont
ext
ual
i
zedOnl
i
neSear
ch
andResear
chSki
l
ls
Whenyourt eacherasksyout odoyourhomewor kandyoucannotf i
ndtheanswers
fr
om yourtext
books,your esortt
odoi ngyourresearch.Thisact
ivit
ymayi nvol
ve
eit
her,i
fnotall
,ofthefol
l
owi ng:l
ookingfortheneededar ti
clesf
r om yourschool
l
ibrar
y,fr
om refer
encesboughtf rom schoolsupplystores
,orsurfingtheInt
ernet
.

Resear chi
sani ntegralpartofst
udent s
'li
fei
ncr eati
ngpresentat
ions,solvi
ng
sci
ent i
fi
cproblems ,andsear chi
ngf ort
hedefini
tionofanunknownt er
m,butt here'
s
moret otheseact i
vit
iesthanwhatt hestudent
susual l
ydo.Forprofessional
sand
academi ci
ans,ar esearchassist
sthem indevelopingnewt heori
es,proposinganew
sol
utiontoanexi sti
ngpr oblem,oranalyzi
nghistori
cali
nfor
mat i
ont odeterminethe
ori
ginsofacer tai
nper son,objectoranevent.

Theeasi
estwayforst
udent
stoper
formt
heirr
esearchi
stodoitonl
ine.The
fol
l
owingsi
xstr
ategi
escanhel
ponli
nest
udentspr
oducestr
ongerresearch1.

1
.Contactali
brar
ianbef
oregetti
ngstucksi
fti
ngthr
oughpil
esofonl
i
ne
i
nfor
mati
on:A201 6Pr
ojectI
nformat
ionLi
teracyf
oundt
hatonl
y9percentof
respondentscitedli
brar
iansasago- tolearni
ngsource,whi l
e88per centsaid
theyreli
edmai nlyonsearchengines.Manyuni versi
tyli
brarywebsit
eshavea
l
ibrari
anchatfeat ur
eandot herwaystor emotel
ycont actalibr
ari
an.Reaching
outatthebegi nningofaprojectt
oclarif
ythetopic,r
esear chquesti
ons,
met hodologi
esandbestpot enti
alsourceswill
maket her esearchprocessand
projectbett
er.

2.Considerthatwheni ndoubt ,i
t'
swi sertoover -
citesourcest hanri
skplagiari
sm:
Manyl ear
ningmanagementsyst emsempl oyplagiari
sm detecti
onfeat
ur esthat
fl
agsuspiciouslanguagef ortheinstruct
ortofurtherinvest
igate.I
t’
sbestt o
provi
decitati
onsorquot ephr asestakenf r
om Internetsources;onli
nestudents
canusef r
eepl agiari
sm checkerssuchasPl agScanorTur nit
in t
oensurean
assi
gnmentcompl ies.

3.UseGoogl eandWi ki
pediaatthebeginningofar esearchpr ocess,nott
heend:
Thef i
rstfewpagesofsear chenginer esult
sar egenerall
ythemostpopul arand
commer ciali
nformati
onsources,whichar en'tnecessari
lythemostscholarl
yor
authorit
ative.I
t'
sbesttothi
nkofWi ki
pedi aasat ableofcont entsofpopul
ar
sourcesaboutani dearat
herthanthesinglemostdef i
nit
ivesour ce.Thel
i
nksat
thebot t
om ofaWi ki
pediaentr
yareusef uljumping-offpoints.

4.Don' tthinkt hatt


heWebi syouronl ysour ceofinformati
on:Onlinestudent
scan
accesspr emium databasest hatar enotavai labletothepublicsuchasProQuest,
EBSCO,JSTOR,NaxosandEl sevier.Thesedat abasescontainelectr
oni
caccess
topubl ishedj ournal
s,magazi nes,newspaper s,books ,r
eports,documents,
disser t
ations,imagecol lect
ions ,f
il
ms,vi deos,cur at
edarchi
vesandaudi o
recor dings .Thediff
erencebet weensear chi
ngt hesecol
lect
ionsandt heenti
re
webi sthatt hesesour cesarepeer -
reviewedandundercopyr i
ght,anddonot
contai ncommer cialresult
s.

5.Under st
andt heprofessor
'sexpectati
onsf
orci
tat
ionfor
mat:Befor
eusinga
scholarl
yreferencecit
ati
ontoolsuchasCit
eULi
ke,Zoter
o,orBibDesk,
understandthataprofessor'
srequir
ementsmaydiff
erfr
om t
hedef aul
tset
ti
ngsi
n
thesetools.

6.Underst
andwhyprof
essorsst
il
lassi
gnresearchproj
ect
s:Resear
chisn'
tbusy
workoranout
dat
edvesti
geofhighereducati
on.Resear
chandtheinfor
mati
on
l
it
eracyneededt opr oducei tr
emai
nsought -aft
erjobskil
ls.Onli
nest udentsmust
beabl etoaccur at
elysear chandsourcescholarl
yinformation,evaluateit
,
contextual
izeit;t
hink,speak,andwr it
ecri
ti
call
yabouti t
;andsynt hesizeitt
o
i
nform opinionsanddr i
vegooddeci si
ons.Graduateswhohavehonedt hese
abi
li
tieswil
l qui
cklyriseast hemostvaluedinthewor kpl
ace.I ft
heseski l
l
saren'
t
bei
ngdevel oped,thent heonli
nestudenti
smi ssi
ngsomet hing.

Asonlinestudentsabsorbnewknowl edge,compet enciesandskill


sinpursuitofa
degreeorcer ti
fi
cat
e,sif
ti
ngt hr
oughthecopiousamount sofusefulanduseless
i
nformationshouldbeviewedasaspeci alski
llinneedofdevel opment.Seeki ngthe
onli
neassistanceofresearchandrefer
encelibrari
ansisanessent i
alpr
actice,and
onli
nestudentsmustwor kt odevel
ophealt
hyi nfor
mation-seekingandschol arl
y
ci
tati
onhabi t
s.

1
.3.
1Sear
chEngi
nes
Searchengi nesarepr
ogramst hatbrowsedocumentsforspeci
fi
edkeywordsand
retur
nsal i
stofthedocument swherethekeywordswerefound.A sear
chengi neis
reall
yagener alcl
assofprograms;however,t
hetermisoftenusedtospecif
icall
y
describesystemsli
keGoogl e,BingandYahoo!Sear
chthatenableuserst
osear ch
fordocument sontheWor ldWi deWeb.

WebSear
chEngi
nes

Typi
call
y,Websearchenginesworkbysendingoutaspidertof etchasmany
documentsaspossi
ble.Anotherpr
ogram,caledani
l ndexer
,thenr eadst
hese
documentsandcreat
esani ndexbasedonthewor dscont
ainedi neachdocument
.
Eachsearchengi
neusesapr opri
etar
yalgor
it
hm tocreat
eit
si ndicessuchthat
,
i
deall
y,onl
ymeaningfulr
esult
sareretur
nedforeachquery.
Asmanywebsiteownersr
elyonsearchengi
nestosendt
raf
fi
ctothei
rwebsi
te,and
enti
rei
ndust
ryhasgrownaroundt
heideaofopti
mizi
ngWebcontentt
oimprove
yourpl
acementinsear
chenginer
esult
s.

CommonTypesofSear
chEngi
nes
I
naddi
ti
ontoWebsear
chengi
nesot
hercommont
ypesofsear
chengi
nesi
ncl
ude
t
hefol
l
owing:

 Local (
oroffli
ne)SearchEngine:Desi gnedt obeusedf oroff
linePC,CDROM or
LANsear chingusage.
 Met asearchEngine:Asearchengi net hatqueriesothersearchenginesandthen
combi nestheresult
sthatar
er eceivedf rom all
.
 BlogSear chEngine:Asearchengi nef orthebl ogosphere.Blogsearchengi
nes
onlyindexandpr ovi
desearchr esult
sf rom blogs(Webl ogs).

Googl
eistheworl
d'smostpopul
arsear
chengi
ne,wit
hamar ketshar
eof67.
49
per
centasofSept
ember,2015.Bi
ngcomesinatsecondpl
ace.

Thewor
ld'
smostpopul
arsear
chengi
nesar
e:

Sear
ch Mar
ketsharei
nSept
ember
engi
ne 2015
Googl
e 69.
24%  
Bi
ng 1
2.26%  
Yahoo! 9.
19%  
Bai
du 6.
48%  
AOL 1
.11

Ask 0.
24%  
Lycos 0.
00%
1
.3.
2Howt
oSear
cht
heI
nter
net
Thefol
l
owingar
est
epsyouneedt
oconsi
deri
nsear
chi
ngf
orawor
dorphr
asei
nthe
I
nter
net:

1.Selectasear chengi ne.Att hetopofanypageonyourcomput er,typet he


phrase“sear chengi nes ”int
ot heSear chBart oat t
ainaccesst osever aldifferent
i
nternetsitest hatspeci fical
lyaidinsear ching.
2.Type inwhat everyouwantt osear chont heal lott
edt extbox.
3.Chooseaf ewoft hemostspeci fi
corr elevantkeywor dsorphr asest odescr ibe
yourtopic.Ut ili
zesynonyms .Gener al
ly,capi t
alizati
onandpunct uat i
onar enot
needed.Sear chengi nesusual lydisregar dmi norwor dssuchas" the,and,t o,etc.
1.I fyouar et osear chf oraser iesofwor ds,ther esult
sgivent oyoui ncludeweb
pageswher ethesewor dsar epr esent .
 Ifyouwi sht obespeci ficwi t
ht he
sequence  ofthewor dsasyout ypet hem,encl oset hewor dsi nsidedoubl e
quotes.
2.Lookf ortheadvancedopt i
onsoft hesi t
eyouar eusi ngifyouwi shtohavea
Verbatim sear chori fyouwi sht orest ri
ctyoursear chaccor dingt osome
point
sl ikedat esandmost lyviewedl inks.
4.Cli
ckSear chorpr esst heEnt erkeyonyourkeyboar d.
5.Assessyourr esul t
s.Sear chthroughyourl i
stofwebpagest opi npoi nt
i
nformation.  
Cl i
ckt helinksoft hesi t
esshownt oyou.Ofcour se,youmustbe
carefuli
nchoosi ngassomemayl eadyout o cyberthr eat
sment ionedbef ore.

You might also like