MS PowerPoint 97/2000 format
Download
Report
Transcript MS PowerPoint 97/2000 format
http://www.ukoln.ac.uk/web-focus/events/online/emerge-2008-04/
What If We’re Wrong?
Developing A Sustainable Approach to the
Use of Web 2.0
About This Talk
Many members of JISC Emerge community are active
in exploiting the potential of various Web 2.0
technologies and approaches
But what if the Web 2.0 sceptics are raising legitimate
concerns? How should we go about developing a
sustainable approach to use of Web 2.0?
IWR Information
Brian Kelly, UKOLN, University of Bath, Bath, UK
Professional
of the Year
Resources bookmarked using the ‘emerge-2008-04' tag
UKOLN is supported by:
by-nc-sa
This work is licensed under a
Attribution-NonCommercial-ShareAlike
2.0 licence (but note caveat)
Contents
Introduction
• About the speaker
• The need for caution
Amplified Events
• Personal case studies
Web 2.0
• The network as platform
• Openness and trust
What’s To Be Done?
• Reconceptualising the purposes
• Understanding risks and benefits
• Risk assessment & risk management
• Sharing and learning
Conclusions
2
Introduction
About The Speaker
Brian Kelly:
• UK Web Focus: a national Web advisory post
• Works at UKOLN – a national centre of expertise
in digital information management, located at the
University of Bath, UK
• Funded by JISC and MLA to support UK’s higher
and further education & cultural heritage sectors
• Involved in the Web since January 1993
• Active in promoting best practices for Web 2.0
Note not actively involved in e-learning - but there are
parallels with institutional implications for personal research
environments (PREs)
3
Introduction
The Need To Act Responsibly
In an unmoderated Web 2.0 social networking
environment:
• Need to act responsibility
• Be cautious
• Remember complexities of copyright
• Avoid possible legal pitfalls
• Libel, defamation …
• …
4
Introduction
The Need To Act Responsibly
In an unmoderated Web 2.0 social networking
environment:
• Need to act responsibility
• Be cautious
• Remember complexities of copyright
• Avoid possible legal pitfalls
• Libel, defamation …
• …
Graham Norton is gay
5
Introduction
The Need To Act Responsibly
In an unmoderated Web 2.0 social networking
environment:
• Need to act responsibility
• Be cautious
• Remember complexities of copyright
• Avoid possible legal pitfalls
Libel, defamation …
• …
“Graham Norton is gay” it has been alleged
6
Introduction
The Need To Act Responsibly
In an unmoderated Web 2.0 social networking
environment:
• Need to act responsibility
• Be cautious
• Remember complexities of copyright
• Avoid possible legal pitfalls
Libel, defamation …
• …
“Graham Norton is gay” it has been alleged
Warning – this joke breaks accessibility legislation
7
Amplified Events
Photography Is An Issue
http://efoundations.typepad.com/
efoundations/2007/11/jisc-cetis-conf.html
8
We’re taking photos at
events & sharing them on
Flickr, Facebook, …:
• Builds community
• Shared experiences
• Shared memories
• It’s fun
• …
But what about:
• Data protection
• Privacy
• Embarrassment
• …
How should we respond?
Amplified Events
Possibly A Big Issue
A recent item
published on BBC
News Web site
(17 April 2008)
http://news.bbc.co.uk/1/hi/magazine/7351252.stm
9
Amplified Events
10
Possibly A Big Issue
A recent item
published on BBC
News Web site
(17 April 2008)
Is photography
not only an issue
for our sector in
our context, but
have legal
implications?
Do we need:
• Formal
agreements
• Model T&Cs
•…
Amplified Events
What I Do
My approach (note IANAL):
• Be open
• Clarify what I mean by this:
CC licence on materials (title slides, handouts,
on Slideshare, …)
CC licence on talk
Permission to video / record / video
Warning that licence may be rescinded if
disasters happen!
• Invitation to others to take a similar approach
Approach described at Stargazing conf, Edinburgh Univ, Nov 2006.
“Legal issues are important” said Charlotte Waelde “and Brian’s
demonstrated lightweight ways of addressing such issues”
11
Amplified Events
12
When I’m An Organiser
Approaches taken at recent “amplified events”:
• IWMW 3-day events since 2006
• Exploiting Potential of Wikis and Exploiting
Potential of Blogs & SNs 1-day workshops
We:
• Published an AUP and risk assessment details
• Notified speakers that event would be videoed &
broadcast & sought permission
• Provided guidelines for session chairs: informing
audience of remote audience, repeating
permissions from speakers
• …
Being open about issues has proved fine (so far)
Amplified Events
When I’m In The Audience
Participant at Oxford Beyond Digital Natives conf, April:
• Asked speaker for permission to record:
OKish, but reconfirm after talk. Subsequent request not to
publish – no problem
• Asked fellow debates for permission – fine
• Student panel. No opportunity to seek prior
permission so videoed 10 mins & then told them:
Students were happy
Two students were 6th formers
Sought them (all) out & gave card and asked for
agreement (they need to opt in)
Organiser & participant asked me not to publish /
told me it was illegal; head’s permission needed; …
No email received, so video not published
What should be done? Are there lightweight approaches?
13
Amplified Events
What If Things Go Wrong?
Speaker doesn’t want to be recorded?
Things go wrong in live presentation?
Speaker changes mind afterwards?
Father Jack is in the audience?
Gun-toting member of audience goes beserk?
14
Amplified Events
15
What If Things Go Wrong?
Speaker doesn’t want to be recorded?
• That’s fine (and avoid pressuring speaker)
Things go wrong in live presentation?
• Accept it: that’s life & audience normally supportive
Speaker changes mind afterwards?
• That’s fine – use of lightweight approaches help
Father Jack is in the audience?
• Don’t worry, it probably won’t happen. And accept it
if it does.
Gun-toting member of audience goes beserk?
• Don’t worry, it probably won’t happen.
Amplified Events
16
What More Can Be Done
More can be done to enhance Amplified Events:
• Photos will be uploaded to closed area of Flickr
for a week, before photos made public
• Learning from experiences on live chat, back
channels, etc. at events
• Managing the physical space – noisy typists and
geeks to left of lecture theatres (where power
sockets are located)
• Understanding our own personal preferences to
avoid information overload:
• Taking responsibilities: mastering applications;
knowing how to disable sound on laptops; how to
configure WiFi; …
Jumping The Shark
‘Jumping the shark’ – the moment
a popular TV series is passed its
peak
17
Some questions:
• Which Web
applications are
depicted?
• What are the
implications of
blue’s decline
• Will red be
tomorrow’s
winner?
• What should we
make of purple?
• How should we
respond to such
consideration?
Jumping The Shark?
18
Some responses:
• Web server
software (data
from Netcraft)
• Have you
predicted
Apache’s demise?
• Does the future lie
We need to be able to spot and
with Microsoft?
prepare responses to trends.
But let’s not use trends to reinforce • What should we
make of Google’s
prejudices?
emergence?
Web 2.0
The Web 2.0 Picture
Gartner hyper curve
Rising expectations
VLE
CMS
Service plateau
PLE
Web 2
Early
adopters
19
Chasm
Enterprise
Failure to go beyond developers
software
& early adopters (cf Gopher)
Large
Need for:
budgets
• Advocacy
Trough
…
• Listening to users
of despair
• Learning from experiences
• Addressing concerns
We need to look at ways of
• Deployment strategies jumping the chasm, minimising
• …
inflated expectations &
avoiding despair
Web 2.0
Challenges of Web 2.0
What Is Web 2.0?
Marketing term (derived from observing 'patterns') rather
than technical standards - “an attitude not a technology”
Web2MemeMap, Tim O’Reilly,
20 2005
Characteristics Of Web 2.0
• Network as platform
• Always beta
• Clean URIs
• Remix and mash-ups
Syndication (RSS)
• Architecture of participation
Blogs & Wikis
Social networking
Social tagging
(folksonomies)
• Trust and openness
Network as Platform
21
Sustainability Problems
Web 2.0
• It’s another bubble
• The companies aren’t sustainable
Initial Response
What’s the odd one out:
• UMIST
• Lotus
• WebCT
• Yahoo!
Network as Platform
22
Sustainability Problems
Web 2.0
• It’s another bubble
• The companies aren’t sustainable
Initial Response
What’s the odd one out:
• UMIST
• Lotus
• WebCT
• Yahoo!
Answer:
• UMIST was taken over by Manchester University
• Lotus was taken over by IBM
• WebCT as taken over by Blackboard
• Yahoo! hasn’t been taken over (yet)
Lesson: IT companies and public sector institutions may
also not be sustainable. This is not a new issues
Network as Platform
23
Slideshare Example
I use Slideshare to (a) maximise exposure to my ideas
(b) solicit feedback (c) allow content to be easily
embedded elsewhere and (d) measure impact
Note evidence
which shows
impact of
presentation.
This wouldn’t
have happened
otherwise
Slideshare Example (2)
What happens if
Slideshare goes down –
and it has happened!
Does this demonstrate
that you can’t trust
externally-hosted
services?
24
Slideshare Example (2)
What happens if
Slideshare goes down –
and it has happened!
Does this demonstrate
that you can’t trust
externally-hosted
services?
But local services also go
down – as this example
from the Open University
shows
25
Slideshare Example (2)
What happens if
Slideshare goes down –
and it has happened!
Does this demonstrate
that you can’t trust
externally-hosted
services?
But local services also go
down – as this example
from the Open University
shows
And note prompt
response from
Slideshare
26
Performance Problems
It’s not just Slideshare & the OU:
downtime, DOS attacks, … can
happen to all services
We need to understand reasons why:
• Skype unavailable (Microsoft OS
upgrades)
• BUCS air conditioning failure
And explore ways of (a) identifying
problems and (b) minimising risks
Can we really think that problems will only happen ‘out
there’ and that our servers will be available 24x7x365?
27
Spotting Possible Problems
Are there ways of
spotting potentially
flaky services?
• Netcraft server
uptime statistics
28
Network as Platform
29
Spotting Possible Problems
Are there ways of
spotting potentially
flaky services?
• Netcraft server
uptime statistics
• whois++ service
(partly available via
Google – see Phil
Bradley’s post)
Spotting Possible Problems
Are there ways of
spotting potentially
flaky services?
• Netcraft server
uptime statistics
• whois++ service
(partly available via
Google – see Phil
Bradley’s post)
• Company profiles,
statistics, etc. from
Techcrunch,
Wikipedia, etc
30
Spotting Possible Problems
Are there ways of
spotting potentially
flaky services?
• Netcraft server
uptime statistics
• whois++ service
(partly available via
Google – see Phil
Bradley’s post)
• Company profiles,
statistics, etc. from
Techcrunch,
Wikipedia, etc
31
Network as Platform
32
It’s The Way We Use Services
What do the following have in common?
• Paper
• PDF
• An iPhone (partly) • Facebook (partly)
but not Twitter
Network as Platform
33
It’s The Way We Use Services
What do the following have in common?
• Paper
• PDF
• An iPhone (partly)
• Facebook (partly)
but not Twitter
Answers
They are all popular
We can regard them all as destinations rather than a
part of a workflow
The data can:
• Be created there & not be usable elsewhere
• Be created elsewhere and views there
Network as Platform
34
Accessibility and Web 2.0
Common response “It’s AJAX; it’s inaccessible”
But:
• Is this using accessibility as a way of stifling change?
• Is assertion backed up by evidence?
• Is it using WCAG 1.0 as ‘evidence’ of inaccessibility?
Note:
• Acceptance of failures of WCAG 1.0 to response to
innovation by WAI staff
• WGAG 2.0 and ARIA
W4A 2008 paper on “One World, One Web .. But Great
Diversity”
• Facebook as tool which users may choose (PLE)
• Not providing podcasts may be the inaccessible option
Network as Platform
35
Avoiding Walled Gardens
The dichotomy:
• Don’t use Facebook, it’s a walled-garden
• Don’t use Slideshare, you might lose your
data
• Do use Facebook and Slideshare, it’s
where the users are & they seem to like it
A resolution:
• Have master copy in managed and
reusable environment
• Use remote service as an interface
(possibly part of a user’s PLE or PRE)
• Provide user education
Network as Platform
Slideshare Example
I use Slideshare to (a) maximise exposure to my ideas
(b) solicit feedback (c) allow content to be easily
embedded elsewhere and (d) measure impact
Note:
• Slides can be
downloaded
• URI for master
provided on slide
& in the metadata
• Accessibility
benefits
36
Openness and Trust
Inappropriate User Content
Spam
Akismet has protected your site
from 195,127 spam comments.
Potential problems:
• Spam: comment
spam, link spam,
twitter follower spam,
tag spam, …
• Flame wars
• Illegal comments
• Rude words
• Uploading of
pornography, etc
My blog: initially lots of spam comment - but most stopped by
Akismet spam filter. And now only handful posted overnight
37
Openness and Trust
Uploading Dodgy Content
http://connect.educause.edu/blog/
38
Twitterers noticed:
• Porn videos posted
to Educause blog
on Sun 20 April
• Deleted a few hours
later
Thoughts:
• Would email be
allowed if released
today? (most email
is spam).
• Need for rapid
response to
problems
Openness and Trust
39
Information Overload
What if we’re too open, sharing
everything?
What if we’re too trusting,
thinking every tweet is valuable?
Need for:
• Better understanding of role
of tools, managing them, etc.
• Confidence to ‘throw things
away’
Surely this is nothing new?
Network as Platform
40
The Fundamental Question
Big question for future isn’t whether we provide blogs,
wikis, etc but how they are provided.
Do we:
1. Build alternatives to Slideshare, YouTube, etc, inhouse. We can be more responsive, we care
about our users and we’re more reliable!
2. Just use the remote services – they’re better,
more functional; and Web 2.0 sceptics are
typically just looking after their own jobs!
What do you think?
Which view are you more closely aligned with?
Network as Platform
41
A Blended Approach
We need:
• Both approaches
• Information literacy (new media literacy,
transliteracy)
• Clearer understanding of our purposes
• Sharing of experiences – successes & failures
• Risk assessment and risk management
strategies
• Application of risk approaches to in-house
services
• …
Embracing 3rd Party Services
What will happen when student
leave (as they do)?
Casey Leaver has documented
experiences in migrating her
blog from Warwick:
• The blog has been delete
• Not all data could be migrated
(pictures & comments are
also lost)
Thoughts: institutional blogs
aimed at staff; support provided
for students using 3rd party
blogs
42
Deployment Challenges
The Challenges
Areas of concern:
Institutional inertia, vested interests, power
struggles, …
Applicable for any significant change
Sustainability, reliability, interoperability
The technical challenges
Privacy, copyright, …
The ethical challenges
Finding time, finding resources, expertise, …
The deployment challenges
See “Web 2.0: Addressing the Barriers to Implementation in a
Library Context” for example of barriers in a Library context
43
Deployment Challenges
44
Addressing The Concerns
Some approaches to addressing these
concerns:
• Risk assessment
• Data migration
• Being user-focussed
• Institutional transformation
• Working collaboratively
• Guidelines for use of social networking
services (e.g. Facebook)
Risk Assessment (1)
Risk
Assessment
Management
Loss of service (e.g.
company bankrupt,
closed down, ...)
Implications of sudden or
gradual loss of service
Use for non-critical
services; have
alternatives available ...
Data loss
Likelihood of data loss.
lack of export capabilities
Non-critical use; testing
of export, ....
Performance
problems or
unreliable service
Automated monitoring
…
Lack of
interoperability
User education
User education
See “Risk Assessment For Use Of Third Party Web 2.0 Services”
QA Focus briefing document
45
Risk Assessment (2)
46
47
University of Oxford
Risks Revisited
Are these risks scary?
Remember to include:
• Risks of doing nothing
• Risks associated with
using existing services
Case Study
Open Source Software
can also fail to be
sustainable. The
ROADS software was
developed in UK to
support academic
subject gateways – but
is now no longer
supported.
48
Risk Assessment
Risk assessment
summaries
provided for
events which
embed 3rd party
services
Audit kept of
incidents (1 to
date)
49
Data Migration
When useful
information is
stored on a 3rd
party wiki the
data is copied
to a managed
environment
50
Deployment Challenges
51
Personal Audit
Personal audit:
• There’s a need for responsible Web 2.0
enthusiasts to carry out their own risk audit
Departmental audit:
• There’s a need for own risk audits for
services used by others (cf. my events)
Institutional audit:
• Should institutions (& funders) require selfassessment audits to protect their
investment?
Conclusions
To conclude:
• E-Learning 2.0 and Web 2.0 are here and
won’t go away
• Institutions need to engage with Web 2.0
• There are many issues which need to be
addressed
• Solutions are available
• Probably the most important is
collaborative working with one’s peers
52