Tuesday, November 18, 2008

10 mining to become rich on the Internet

For public causes

-creat a group and feder a lot of people around a cause.So to make part of this group u have to give some of money (what u want).If causes are good a lot of persons would like to participate.

-Ask to a famous poeple to invest hisself with the cause and give his image for it.If people are kind of him o just admire him, they would like to participate to the cause and give money
.

-Thanks to the Internet u can creat an add with less money than to the Tv for example.So the public cause can make some add and send them on the web to touch many persons and to make aware people who don't know the cause
.


For business

- You can creat a start up thanks to the internet.You can set a business without money to the very beggining.So if you are a geek and you make a famous site which never exist before u can earn a lot of money.But you have to be famous before, so to that you can send some pop up
or teasing!

-If your business already exist in order to earn money you can creat a network and employed people who work for you on the internet.Their aim will be to sell some things and recrute new poeple to sell the firm's product.So the firm promess them to give all time a part of the turn over that they sell.At the end u earn very much money.

-Today people live througt the Internet.Sometimes they prefer to buy things on than go to a shop.SO if you just have a physical business you can earn money but not so much than if you creat a site on the net.So have a site is become necessary to you.Notice that a site have the biggest turn over than all the other shops you have!thinking!


For yoursel

well,you juste discovered the Internet and you want to earn money.How do it?

- First thing : You can set a business on E-bay ; You spend your time to buy some cheap things or things which are sell in group ans you sell it with a highest price.In order to make a benefit.If you are gifted you can accumulate a lot of money!Good luck!

-Second thing : You go to play on Second live and you spend your all time inside you buy a lot of things(houses,bulding) don't be afraid its a new life which begin to you!

-Third thing : Exist some games on the internet as "world's poker" so you can play online and try to be the better.At the begining u will be a loser so bet little money but after some entrainements you can become a boss and earn money.

-Last thing : If you are very ambicious you creat a business on the net which the aim to help public causes and you play on second life :) !!!be creative


Tuesday, November 4, 2008

THE DANGERS OF THE INTERNET

There is some dangers on the internet.As all inovation internet is quite good that make the people life easier but undoubtly internet has its bad effects:

VIOLENT POSTS


by Caroline Innes, Liverpool Daily Post

INTERNET website YouTube is at the centre of a police crackdown after a Wirral teenager uploaded videos showing youngsters performing dangerous and violent stunts.
Officers have already shut down a website called Live Now Die Later run by 18-year-old Michael Davies from Rock Ferry, which hosted similar footage, amid fears they could influence other children to film copycat stunts.
Last night Lancashire Police revealed it had had a further five videos which it says Mr Davies posted, removed from the video sharing website YouTube.
But last night similar videos bearing the Live Now Die Later (LNDL) label were still available on the website, including footage filmed on mobile phones of teenagers setting each other on fire and jumping off garage roofs into conifer trees.

Others show children throwing themselves down stairs, stapling their skin, slapping each other across the face, and apparently forcing a homeless man to drink alcohol.
In one, a teenager appears to break his arm after jumping from a high wall, in another a youngster poses with a defibrillator which he mimics delivering an electric shock, beside a hospital bed.
The Home Office states it can be illegal to upload violent footage on to the internet, but to date no-one has been prosecuted for such an offence.

Angel Holland, a spokesperson for Wirral group Parentline Plus, last night called for increased security measures to control footage on websites.
She said: “We are all very worried about what we can do as parents to stop our children getting involved in this ever-popular trend and to help them escape the peer pressure which is often the reason they take part in such activities.

Police said currently no criminal charges were to be brought against Mr Davies, You Tube must now comply with their request to remove the footage which they say is not only having a “negative influence on society” but is also breaching the company’s own code of conduct.
Inspector Andrea Bradbury, of Lancashire Police, was responsible for the closure of the LNDL website, which was blamed for a number of incidents in the North West, including one where 11-year-old Joe Armstrong suffered horrendous burns after being set on fire during a filmed stunt.
Insp Bradbury has liaised with Lancashire police’s Computer Crime Unit and has written to the legal compliance team at Google,owners of YouTube, about the clips.

YouTube says it does not employ anyone to police what goes on the site and instead relies on users to “flag up” any inappropriate content.
The site claims pre-screening content is a form of censorship which is not the role of a private company. “Sadly, as with any form of communication, there is a tiny minority of people who try to break the rules,” a spokesman said.
But Deputy Chief Constable Brian Moore, of the Association of Chief Police Officers, said it was the responsibility of internet companies to search their sites for videos of violence and crime and to pass on details to police.

ORGANISE CRIME


Crime is inevitably a reflection of the time in which it is committed. 'Organised crime' has existed since man first discovered the benefits of living in organised communities and the target for such criminal activity has been where vulnerability in the protection is perceived. In the 19th and 20th Centuries, the physical movement of money or bullion was an essential element in greasing the wheels of economic activity. Money was, in the main, well protected in major banks but more at risk when in transit.

Organised crime recognised this weakness and progressed from robbing stagecoaches a la Wells Fargo to holding up armoured bullion vans. Society, recognising this as a serious threat to commercial and economic well being, responded by the imposition of long custodial sentences. The banks responded by a huge investment in technology and physical security measures. The threat was largely obviated.

However, in the digital age in which we now live, the vast majority of global finance is conducted in the virtual world and necessity for the physical move of money is reduced. Cyber-criminals have responded by moving into the cyberspace where the perception is that assets are less well protected and the sentencing of perpetrators, when caught, is relatively light.

Where are we then in the ever-developing battle with organised crime? The whole basis of the digital economy is one of trust. If we lose trust in the safety of conducting business in cyberspace then the way we now conduct business could itself collapse - it certainly will not develop as quickly as it ought to, or enable us to reap the benefits. It is against this background that we must gauge not only how well we are protected but what data requires protection and, to understand that, we need to understand the threats themselves.

Everyone accepts the phrase that 'we live in the information age' - but what does that actually mean? In many ways the most valuable thing that we now possess is information in all its various facets. Whist we cannot always put a value on information in the way we can on bullion bars, the accidental or deliberate release of information or distrust in its integrity, or the non-availability of it when required can have a devastating effect on business. Information then, is perhaps the most prized and most useful asset for any organisation in the 21st century.
What, therefore, are the threats in the information age? Protecting ourselves against the 16-year-old hackers utilising downloaded tools from the internet is now not so much a problem. The computer industry looks at the same hacker sites and moves quickly to block any new tool posted on those sites. The common perception is that these 16 year olds pose the greatest problem. Yes, they pose the most visible problem and on a percentage basis the overwhelming majority of malicious activity. But, the real threat from organised crime in the digital world comes from the perpetration of fraud, and the commission of commercial espionage.


Groups who feel compelled to forward their extreme agendas, whatever they may be, are also an emerging risk in the digital world as we now spot the advent of cyber terrorism. Cyber terrorism is not necessarily targeted against governments but against the components of society, the majority of which are the commercial enterprises. We are also at risk from the use of these tools by a range of activities from investigative journalists through dedicated single interest group activists to, disconcertingly, governments themselves who have been identified using their resources to obtain commercial advantage for their own industries - and yes, this has been going on within the EU.

We have to recognise that we are not well protected against the various threats and the major problem has been in identifying how major these threats really are. The psyche of the 16 year old hacker requires that he waves a 'digital flag' to show everyone how clever he has been. Organised Crime has the opposite motivation รข€“ they hide where they have been and what they have done and it requires sophisticated tools to spot what is happening. Disappointingly, all the major surveys still show that the overwhelming management perception of the problem is that the major threat is from viruses and overt hacking and defacement.

CYBER ADDICTION


Cybersexual, cyber-relationship and telephone chatline addictions.


Just as alcohol intake or food consumption can 'get out of hand', so the Internet has become an unhappy addiction for thousands of people.
Engaging in cybersexual and cyber-relational activities seems exciting when you first start. These forms of communication and entertainment allow you to develop whole new personalities depending on your mood and desire. You can be taller, smaller, thinner, more muscular, blonder, darker. Your online/phone hours seem like an escape from your real life - which could feel lonely, depressing and full of anxieties, or marked by marital discord, work-related stress or financial problems.
However, rather than being a genuine escape from these difficulties, chatrooms and chatlines tend to mask or amplify your real-life problems.

IDENTITY THEFT


Identity fraud is where someone steals your personal details to con you out of
money. It can happen when you're not using the internet, for example, if you
lose important documents such as your passport or driving licence. But if you
aren't careful with your personal details when you go online, you could easily
become the victim of identity fraud. For example, a fraudster could get hold of
your credit card details and use them to buy things over the internet or
withdraw money from your account. Or they could get hold of your address
and bank details and use them to borrow money.


To avoid being caught out by identity fraud, be careful about which companies
you give your email address to online. Before you buy or sign up to anything
online, check out the privacy policy of the company and make sure they
won't send your details to other companies if you don't want them to. Also, be
careful about the passwords you choose. Don't use whole words because
these are easier for a fraudster to find out. It's safer to use a combination of
letters and numbers

FRAUD

If you use the internet, you're at risk from internet fraud.
The internet is a cheap and easy way for fraudsters to con people out of
money. This fact sheet tells you about some of the most common types of
internet fraud (scams). But there are many others. If you suspect an email or
something on a website is a con, you're probably right. If something sounds
too good to be true, it probably is. Read on to find out how to spot internet
fraud and what you can do about it

ROGUE TRADERS

Rogue traders are untrustworthy or dishonest traders who sell goods or
services. When selling something online, it's common for a rogue trader:
• to advertise goods that don't exist
• to make untrue statements about the things they are selling
• to sell dangerous goods
• not to tell you about import or transport costs
• to send you different goods to the ones they advertised
• not to deliver on time
• not to deliver at all
PHISHINGS
Phishing is where you get emails pretending to come from a genuine
company. They often look like they come from your bank. This is a scam to
trick you into giving personal information that can be used for fraud. If you get
an email and you're asked to type in a password or type in personal details,
this is probably a scam as banks never ask you to do this.
To avoid phishing scams, log into your online accounts regularly – the more
often you check your accounts, the quicker you'll spot any problems. If you
check your bank and credit card statements regularly, you'll spot fraud more
quickly

VIRUS



A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.

Wednesday, October 15, 2008

collaborative websites


Definition

What is a collaborative site.

a Collabarative website is a website that is built upon a community of end users

What is community.

communities can be neighborhoods, churches, schools, classrooms, social friends and friends at work people that feel they have something in common, work together, have similar needs. a good example that i can relate to is classrooms study areas like a librarys. both of these i use weekly and as students we all have the same things in common. this is a great platform for discussion, thoughts and exchang of ideas with one another

a collabarative site aka a community site is the same thing as lets say a classroom. but the only difference is the platform its presented on. the actual learning environment as we know it such as a classroom is the four walls or the building we are studing in. as apose to the internet the, environment will be the web site. to take it futher the internet is also an environment of its own and also a community that house's millions off users that access it every day of the year. so in a way it not just a website that can be a community the internet as a whole is a community in its self.


Types of website genre's

Buying and selling.

These types of websites are built to help the retailers expand their sales and busness on line. by having this platform their users signing up are bound in a community


Educational

education is what makes the world evolv its the most valuable thing humans can value because it equals to knowlege that equals to power. it is even more important that this knowlege gets handed down the human race for every generation that is born.


Health and lifestyle

Health sites can range from cooking, eating well, general body health. Lifestyle can also range from what people do in their spare time like going on holiday. theirs so meny holidy snap shot sites where people take snaps of places they have been.


Historical

these sites are generally community based


Artistic

Searchhing engine sites

Love and dating networking.

These are the sites where their are large amounts of people in one community. with this genre people are willing to get into the community because its known to network people together from different parts of the country and world.



What is this?

The potential learning benefits of the Web are diminished due to the complexity of creating interactive, collaborative Web-based applications. The CoWeb is a collaborative website which allows users to create collaborative applications with great flexibility. The CoWeb facilitates open authoring where any user can edit any existing page or creating new pages. Using the CoWeb, both teachers and students have created a wide variety of educational applications. For teachers, the CoWeb is empowering. For students, the CoWeb can lead to a cultural change where they take on higher levels of agency. The CoWeb can be used to providing dynamic scaffolding, where the source of support is distributed across people and media and where the support changes over time. The paper describes the CoWeb and some of the applications that teachers and students create with an open authoring environment

Example

Tuesday, October 14, 2008

User generated content (UGC)


Definition

User generated content (UGC, often hyphenated), also known as Consumer Generated Media (CGM) or User created Content (UCC),refers to various kinds of media content, publicly available, that are produced by end-users.The term entered mainstream usage during 2005 having arisen in web publishing and new media content production circles. Its use for a wide range of applications including problem processing, news, gossip and research reflects the expansion of media production through new technologies that are accessible and affordable to the general public. All digital media technologies are included, such as question-answer databases, digital video, blogging, podcasting, mobile phone photography and wikis. In addition to these technologies, user generated content may also employ a combination of open source, free software, and flexible licensing or related agreements to further reduce the barriers to collaboration, skill-building and discovery. Sometimes UGC can constitute only a portion of a website.
For example on Amazon.com the majority of content is prepared by administrators, but numerous user reviews of the products being sold are submitted by regular visitors to the site. Often UGC is partially or totally monitored by website administrators to avoid offensive content or language, copyright infringement issues, or simply to determine if the content posted is relevant to the site's general theme.

eading commercial copyright owners (“Copyright Owners”) and services providing user-uploaded and user-generated audio and video content (“UGC Services”) have collaborated to establish these Principles to foster an online environment that promotes the promises and benefits of UGC Services and protects the rights of Copyright Owners. In this context, UGC Services are services such as Soapbox on MSN Video, MySpace, Dailymotion and Veoh.com, and not other technologies such as browsers, applets, email, or search services. While we may differ in our interpretation of relevant laws, we do not mean to resolve those differences in these Principles, which are not intended to be and should not be construed as a concession or waiver with respect to any legal or policy position or as creating any legally binding rights or obligations. We recognize that no system for deterring infringement is or will be perfect. But, given the development of new content identification and filtering technologies, we are united in the belief that the Principles set out below, taken as a whole, strike a balance that, on a going-forward basis, will result in a more robust, content-rich online experience for all.

In coming together around these Principles, Copyright Owners and UGC Services recognize that they share several important objectives: (1) the elimination of infringing content on UGC Services, (2) the encouragement of uploads of wholly original and authorized user-generated audio and video content, (3) the accommodation of fair use of copyrighted content on UGC Services, and (4) the protection of legitimate interests of user privacy. We believe that adhering to these Principles will help UGC Services and Copyright Owners achieve those objectives.


What is a "crowdsourcing"


Definition
Crowdsourcing is a neologism for the act of taking a task traditionally performed by an employee or contractor, and outsourcing it to an undefined, generally large group of people, in the form of an open call. For example, the public may be invited to develop a new technology, carry out a design task (also known as community-based design and distributed participatory design), refine an algorithm or help capture, systematize or analyze large amounts of data (see also citizen science). The term has become popular with business authors and journalists as shorthand for the trend of leveraging the mass collaboration enabled by Web 2.0 technologies to achieve business goals. However, both the term and its underlying business models have attracted controversy and criticism.

Pro-crowdsourcing
In some cases, the labor is well compensated. In other cases, the only rewards may be kudos or intellectual satisfaction. Crowdsourcing may produce solutions from amateurs or volunteers working in their spare time, or from small businesses which were unknown to the initiating organization
Furthermore, interest in knowing how, why, and when certain crowdsourcing applications are successful involves understanding the motivations of the crowd to participate in this problem–solving. Uses and gratifications theories suggest that individuals in the crowd are drawn to crowdsourcing applications for a number of reasons and that they are gratified in various ways through participation. Where open source models emphasize the common good (Bonaccorsi and Rossi, 2003, 2004; Lancashire, 2001) and hobbyist (Ghosh, 1998a, 1998b; 2005) interest in the success of certain applications, crowdsourcing models add to these factors the existence of a bounty and a more explicit encouragement of the learning of new skills for entrepreneurship. The bounty can sometimes consist of cash and prizes, but it also includes cultural capital and can help people learn skills and develop their portfolios for future work and entrepreneurship (Mack, 2006). Again, the problem with this kind of theorizing about what motivates the crowd to participate in crowdsourcing applications is a lack of research. What moves the crowd to participate in this form of distributed, collective problem–solving?

Against-crowdsourcing

Some reports have focused on the negative effects of crowdsourcing on business owners, particularly in regard to how a crowdsourced project can sometimes end up costing a business more than a traditionally outsourced project.

Some of the pitfalls of crowdsourcing include:

  • Added costs to bring a project to an acceptable conclusion.
  • Increased likelihood that a crowdsourced project will fail due to lack of monetary motivation, too few participants, lower quality of work, lack of personal interest in the project, global language barriers, or difficulty managing a large-scale, crowdsourced project.
  • Below-market wages., or no wages at all. Barter agreements are often associated with crowdsourcing.
  • No written contracts, non-disclosure agreements, or employee agreements or agreeable terms with crowdsourced employees.
  • Difficulties maintaining a working relationship with crowdsourced workers throughout the duration of a project.
  • Susceptibility to faulty results caused by targeted, malicious work efforts.

Where do you find out about new things on the internet?


The rise of blogosphere

Blogs (short for web logs) are regularly updated journal published on the Web. According to Technorati, there are about 112.8 million blogs on the Web right now, with 175,000 new blogs added every day. That’s about 122 new blogs a minute or 2 blogs a second!
Today, blogs have become mainstream - newspapers have ‘em, corporations have ‘em - and heck, even politicians have ‘em
.

YouTube

The YouTube we all know and love got started when former Paypal employees Chad Hurley, Steve Chen, and Jawed Karim wanted to share some videos from a dinner party only to realize that the video clip was too huge for email. Posting the video online wasn’t easy either - since video websites back then accept some but not all video clip formats.

So the trio went to create YouTube in 2005 - and a little over a year later, the website streamed 100 million videos per day and got 70,000 videos uploaded per day (roughly 1 per second). It was the fastest growing website in the history of the Internet. It was estimated that in 2007, YouTube consumed as much bandwidth as the entire Internet in 2000

The Rise of Social Networking and Social Media

In a way, the Web is a big social network. Even before there was the Web, BBSes served as online communities where people chatted and collaborated. But the term “social networking” became a buzzword when it was reported in 2005 that MySpace had more pageviews than Google

On the other side of the new Internet are social media websites. The term “social media” is kind of a hodgepodge (Wikipedia, blogs like Neatorama, and videosharing websites like YouTube can all be classified as social media). But all of them have one thing in common: they encourage active interaction and participation of their users.

n interesting subset of the social media websites are social news sites like Digg, reddit and Mixx. These user-driven websites let people discover and share content on the Internet in a social way: users submit and vote on others’ submissions to determine which links get featured prominently on the websites’ front pages.

Newspapers
We have recently completed the 2007 study of America's top 100 newspaper websites, entitled "American Newspapers and the Internet; Threat or Opportunity?". As the newspaper industry continues to suffer declines in readership and circulation, using the Internet to expand a newspaper's reach is becoming more and more important

Conclusion
  • The use of RSS increased in 2007 by 21 percent since 2006. Now 96 of the papers we researched are using this technology. Within this group, 93 papers offer partial text feeds, while three offer full text RSS feeds. No papers have begun embedding advertisements in their RSS feeds.
  • Ninety-two percent of America’s top 100 papers now offer video on their websites. This represents a significant jump from 2006, where just 61 percent offered video. In this group, there is a mixture of local, Associated Press, and original content available on newspaper websites. Thirty-nine papers offer original content, 26 use AP video streams, 13 offer video content from local news outlets, four papers use all three technologies, and 10 papers use a mixture of two different types of video.
  • The number and quality of reporter blogs also improved in 2007. Now, 95 percent of papers offer at least one reporter blog. Ninety-three percent (88 papers) of these blogs allow comments. In 2006, 80 percent of the papers offered blogs, with 83 percent (67 papers) allowing comments.
  • One-third of newspapers now allow comments on articles. This represents a 14% improvement on 2006 statistics, when only 19 percent of papers allowed comments on articles.
  • The number of papers requiring registration increased by six percent from last year’s results. Twenty-nine percent of the nation’s top 100 papers now require users to register before gaining full access to their website. Of this group, three papers required a paid subscription, while 26 papers required free registration.

RSS


RSS

is a family of Web feed formats used to publish frequently updated works – such as blog entries, news headlines, audio, and video – in a standardized format.An RSS document (which is called a "feed", "web feed",or "channel") includes full or summarized text, plus metadata such as publishing dates and authorship. Web feeds benefit publishers by letting them syndicate content quickly and automatically. They benefit readers who want to subscribe to timely updates from favored websites or to aggregate feeds from many sites into one place. RSS feeds can be read using software called an "RSS reader", "feed reader", or "aggregator", which can be web-based or desktop-based. A standardized XML file format allows the information to be published once and viewed by many different programs. The user subscribes to a feed by entering the feed's URI into the reader or by clicking an RSS icon in a browser that initiates the subscription process. The RSS reader checks the user's subscribed feeds regularly for new work, downloads any updates that it finds, and provides a user interface to monitor and read the feeds. The initials "RSS" are used to refer to the following formats: "Really Simple Syndication (RSS 2.0)", "RDF Site Summary (RSS 1.0 and RSS 0.90)", or "Rich Site Summary (RSS 0.91)". RSS formats are specified using XML, a generic specification for the creation of data formats. Although RSS formats have evolved since March 1999,[4] the RSS icon ("") first gained widespread use in 2005–2006.[citation needed]


Example