Although this did not have a major effect on U.S. cyber-security, the ease with which these servers could be exploited was troubling. Since the attack, President Barack Obama has committed greedfall coin guard merchandise to creating a new post for a head of cyber-security in the government. Nowhere has this cross-examination and cross-listing of sources been more widespread than with Wikipedia.

Much has been said about the influence of social networking and its effect on the way people live their lives. Facebook, LinkedIn, Twitter, and YouTube have shifted the paradigm from a world of static web pages to a world of interactivity. Quick response codes have also gained in popularity after first being introduced in European and Asian mobile markets. Acting as a visual hyper-link to a page, QR codes enable users to jump to a mobile optimized offer page. Companies recognized the technology as a very powerful tool for initiating consumer engagement at a time when the marketing message is likely triggering its most emotional response — the impulse moment — for the end user.

Doing so will help you build on what you’ve already achieved, identify mistakes that need to be fixed, and discover things that have changed. According to the same survey, 95.9% of US police forces now employ social media in their investigations, with 80.4% of those claiming that social media had aided in the resolution of a crime. A simple example that highlights the distinction between these two orientations toward community content is the difference between browsing a community website and building a community website .

However, weighing these sources against one another has become easier than ever before. The concept of the cloud takes into account all the applications that are hosted on external machines and viewed on a user’s computer. A netbook does not need the processing power required to run Microsoft Word; as long as it has a web browser, it can run the Google Docs word processor and leave all of the processing to the cloud. Because of this evolution of the Internet, computers can be built less like stand-alone machines and more like interfaces for interacting with the larger system in the cloud. As technology has improved, it has become possible to provide software to users as a service that resides entirely online, rather than on a person’s personal computer.

Wikipedia contributors, for example, are more likely than non–contributors to identify their ‘real me’ as being located on the Internet, suggesting that online participation may be central to their self–image (Amichai–Hamburger, et al., 2008). Yang and Lai demonstrated the enhancement of self–image is a significant motivator for Wikipedia contributors, who value the opportunity to enhance their sense of self–efficacy by publicly demonstrating their knowledge and expertise in Wikipedia postings. It is not surprising, therefore, that ‘reverts’ are powerfully demotivating for new editors, since they suggest to a UGC producer that their contributions are not valued by the community (Halfaker, et al., 2011). Among contributors to open source software projects, contribution is influenced by personal identification as a contributor (Hertel, et al., 2003).

Data may also be collected for law enforcement and governmental purposes, by social media intelligence using data mining techniques. There have been many cases in which young persons especially, share personal information, which can attract predators. It is very important to monitor what you share and to be aware of who you could potentially be sharing that information with. Teens especially share significantly more information on the internet now than they have in the past. Teens are much more likely to share their personal information, such as email address, phone number, and school names. Studies suggest that teens are not aware of what they are posting and how much of that information can be accessed by third parties.

It is necessary to adapt and stress the users’ training, which must go from the use of buttons to be focused on making them understand the structure and objective of a catalogue; it is required to study the real adaptation of automatic corrections or helps. In the same way we must assess the 2.0 services, measure the participation and re-use of the information, work in the users ‘profiles’ and in the identification modes. The recent report from OCLC (Cahoun et al., 2009) emphasises the first-order importance that users give to data enrichment.