Folksonomy is a method of categorizing and classifying using keywords, also known as hashtags.
Rich User Experience is a feature of web services that are dynamic and responsive to user's input.
UserParticipation is a feature where others are able to placecontentoftheirown.
Long tail is a business model where services are provided ondemand, subscribing to a data plan that charges for the amount of time spent in the internet.
Software as service is a business model where services are subscribed to only whenneeded, rather than purchased.
Mass Participation is a feature of web services that allow for diverse information sharing through universal access.
Convergence is a trend in ICT, referring to technological advancement.
Social Media is a trend that involves creating, co-creating, modifying and exchanging generated content.
Social Networks are sites that allow you to connect with other people.
Bookmarking sites are used to store and manage links to various websites.
Tagging others is a feature of social media.
Social News
Post their own news items or links to various websites. Create a tag to others
Media sharing
Upload and share media
(Twitter and purk)
Micro-blogging
Short updates
Blogs and Forums
Allow user to post their content
Mobile technology
Smartphones, tablets, 4G LTE Networking
Assistive media
Help people with visual and reading impairments
IOS
Apple devices
Blackberry os
Blackberry devices
Windows phone OS
Closed source and propriety
Symbian os
Nokia, original smartphone OS
Web OS
Smart TV
Windows mobile OS
Smartphones and pocket pc’s
Public cloud
Allows systems and services to be easily accessible to the general public
Private cloud
Accessible with in the organization
Community cloud
Accessible by group of organizations
Hybrid cloud
Mix of public and private cloud
Internet safety
Online security/safety of people and their info
Confidentiality
Data confidentiality
Integrity
Data integrity
Availability
System integrity
Unauthorized Disclosure
Not authorized entity gains access to data
Exposure
Sensitive data to unauthorized entity
Interception
Unauthorized entity accesses data b/w authorized sources and destinations
Inference
Unauthorized entity indirectly accesses sensitive data by reasoning from by products of communication
Disruption
Prevents correct operation of system services and functions
Deception
authorized entity receiving false data and believing it to be true
Intrusion
Unauthorized entity gains access to sensitive data by circumventing a system’s security protection
Incapacitation
Prevent/interrupts system operation by disabling a system component
Obstruction
Interrupts delivery of system services by hindering system operations