Archive | Case Study RSS feed for this section

Secure Identity for Bloggers

14 Sep

SamairSome people I met or some bloggers was really worried about their identity to be exposed if they are using some web 2.0 tools such as blogging… Coz what i heard it causes us a lot of troubles if our real world identity such as any bad habits we always be doing like partying and alcoholic drinking, revealed and found by our manager and there were cases they will get fired… Horrible!.. So this makes me thinking if there are ways how we could hide our identity online..I found a blog post of which i consider it is really great as it gives us good easy guides with his own case study how he would deal with a certain phenomena… The blog post was actually written by Ethan Zucker on December 2006 but he actually got the resouces from Global Voices Online….

In this blog post by Ethan Zucker, he referred a lady named Sarah who was working in government office as an accountant.. From the articles, the author mentioned about how Sarah aware of her boss who was deputy minister has take large amount of money from the government… She got intention to let other people’s know about this but she was worried she might lose her jobs if he finds out..so she planned her strategies by make herself anynomous…  some security measures that can be done to protect  identity according to what Sarah did using some of web 2.o technologies:

1. USE FREE WEBMAIL AND FREE BLOG HOST

She used free webmail such as hotmail, Yahoo mail and hushmail and DO NOT use any paid account for email or web hosting because the payment will link the account to paypal or credit card which could easily linked back to her. I agree with this because we have our profiles in our credit card/paypal… so this can be easily track by our boss..  Use free blog host provider such as blogger, wordpress, blogsome as well…

2. PUBLIC IP ADDRESS.

Use public IP address instead of IP address from office… So one way to do this is, go to internet cafe with internet connection” or anywhere that allows you to use any computer which has been used by lots of people… Then post the blog from there… Its pretty hard to track who is using the computer at a particular time since it is a public computer isn’t it… hehe.

3. SETTING UP AN ANYNOMOUS PROXIES

You can used public proxies out there for free. By using public proxies, we can leave behind IP address of that particular proxy server instead of the ip address of our home computer. This will make it hard for our boss to track and find us.. Brilliant isn’t it.. haha.. From the articles, he mentioned 3 public proxy server we can used:

Publicproxyservers.com

Samair

Rosinstrument Proxy Database

I havent use them but you can try…

If you are not sure how to change the proxy server “internet option” setup for our PC/laptop, You can read more here.

4. CIRCUMVENTORS

If you are a bit worried about what if the proxy administrator that you are using cannot be trusted which might reveal you identity… No worries.. You can ask help from any of your friends to  set up Circumventor in his/her system and we can use his proxy server instead of the public proxies… According to the author, Circumventors is actually one of the dozenof proxy servers a user can set up to allow people to use our computer as a proxy.

5. ONION ROUTING

If you still worried about this, You can also installing Onion routing system which works with proxy server… read more for more explaination here

It seems all my explaination above is simple… If you’re not a technical skill person, ask for help from IT people.. Im pretty sure they know bout this… So in this way, we can easily blogs with no reveals in identity.. But however some of these method might works…and this might not be the best solution for you, please drop me a comment if you have better ways how you secure your identity on the internet…I would like to hear your comments…

Advertisements

Case study on how QUT Library using Web2.0

4 Sep

Hi everyone, yesterday i was attending the Enterprise lecture and there was four QUT librarians explained more about how they attempts to move from the existing website to  Enterprise 2.0. Well, they called it as Library 2.0.. I just have this notion that any websites using web 2.0 will have “2.0” at the end of every words.. Others can be like Shopping 2.0… hehe.. Correct me if im wrong…

Okay, i tried to give you basic overviews about QUT Library 2.0.. Some of the points below reflects what i wrote notes during the lecture…

  • The QUT library 2.0 hosts outside of QUT : 
  • website allows widgets: e,g information about latest book being added to the library.. So this will get updated automatically.
  • Twiter accounts: Staffs has a responsibility  of updating twitter. They mentioned about getting it updated twice a week. It allows students and staffs to follow, ask question and leave feedback regarding books, research or any other issues.
  • QUT external blog –  Librarians have maintained this blog and update information for their personal used and it can also be used by students and staffs to look for some useful information about QUT library as well as commenting about any issues regarding any blog post they have submitted.
  •  RSS feed: they subscribed in feeds and the information will be updated automatically. This feed is embedded into the Library blog.
  • Google Scholar – QUT library also embedded google scholar onto the website. It provides a simple way to broadly search for scholarly literature. From one place, students can search across many disciplines and sources: peer-reviewed papers, theses, books, abstracts and articles.
  • QUT eprints – represents collection of QUT research repositories and digitised collections This can be used by QUT students, researchers as well as general public.
  • Multimedia – Library 2.0 also allows users to upload any multimedia assets such as Image, sound, video and other digital assets for academic purposes.
  • Improve Searching –  more flexible in searching books, articles, etc. They mentioned about they wanted to make search by subjects…
  • Tag – They used tag for easy access to information quicker and more efficient in searching specific data. .
  • Delicious – embedded into the website to bookmark websites whether it is in the form of articles or books, allows them to add tags easily for easy access by students, researcher, staffs as well as general public.
  • Second life – As an extra, qut library might implement sceond life,  3d chat but they are still deciding whether it will be useful or vice versa.In my opinion, it can be useful as well for students who are using secondlife if all important people such as QUT staffs are online at the same time so that students can asked questions about a particular subjects but the problem is, there will be niched of student or staffs will make used of this services  as students dont have time to play and take time searhing for the person of whom we wanted to talk to. More discussion about this would be needed.
  • Facebook – Still on discussion whether it should be implemented or not.

 

SOme of the risks having offsite platforms: What if some of the platforms such as Twitter and Facebook suddenly closing down and all the information will be lost?? mmmm…. What if there are no user participation? There might be alot of risks will be out there that we couldn’t identify in the first place..So therefore the requirements and some of the factors of paradigm shift to web 2.0 should be addressed and well planned web 2.0 structures would be needed.  Librarians staff should gain more knowledged in Web 2.0 and enterprise 2.0 implementation..

Therefore in the few weeks time, We will be developing business proposal that assesses QUT library web 2.0 requirements and propose implementation plan for web 2.o. The proposal is to emphasis the business goals, problems, issues and opportunities facing QUT linrary and suggest web 2.0 tools and concept and practices that meet those business needs  (i.e proposal should not solely focus on the tools themselves but to find an application for those tools within the business. In brief, to provide adoption of web 2.0 concept in strategic way.

To gain more useful information, you can read more about this on my friend’s blog, Nadisha…. Click here