LOTS OF DISCUSSION, NOT SO MANY "FACTS"
C.4.1 - Discuss how the web has supported new methods of online interaction such as social networking.
(Students should be aware of issues linked to the growth of new internet technologies such as Web 2.0 and how they have shaped interactions between different stakeholders of the web. Emerging technologies are modifying users’ behaviour.)
"..social networking establishes interconnected Internet communities (sometimes known as personal networks) that help people make contacts that would be good for them to know, but that they would be unlikely to have met otherwise." ( WhatIs )
For example: Facebook - LInkedIn - Twitter
How social networking works - HowStuffWorks
Security Issues for Web 2.0 - Chartered Institute for IT
Benefits if Internet and Social Media - reachout.com
C.4.2 - Describe how cloud computing is different from a client-server architecture.
(Students should address the major differences only. LINK - Networks.)
It’s worth noting that this comparison is not about two opposites. Both concepts do not exclude each other and can complement one another. For the most part, because client- server is a software paradigm and cloud computing is a hosting abstraction, they are independent concepts. Keeners, however will realise that cloud computing implies business, data stores, and other resources are remotely hosted, which necessitates that any application running within a "cloud" is part of a client-server application.
Cloud computing still relies on the client-server architecture, but puts the focus on sharing computing resources over the internet.
The 5 essential characteristics of cloud computing - www.annese.com
Cloud computing and client-server architecture - computer science wiki
3.4.3 - Discuss the effects of the use of cloud computing for specified organisations.
( To include public and private clouds. Cloud computing could potentially conflict with privacy.)
There are different models for deploying a cloud computing service and they affect organisations in different ways.
In a private cloud model a company owns the data centres that deliver the services to internal users only.
In a public cloud services are provided by a third party and are usually available to the general public over the Internet.
The idea of a hybrid cloud is to use the best of both private and public clouds by combining both. Sensitive and critical applications run in a private cloud, while the public cloud is used for applications that require high scalability on demand. As TechTarget explains, the goal of a hybrid cloud is to “create a unified, automated, scalable environment that takes advantage of all that a public cloud infrastructure can provide while still maintaining control over mission-critical data”.
Assignment: Private vs Public vs Hybrid cloud (Google Doc)
Top 6 cloud computing trends for 2022 - TechGenix
C.4.4 - Discuss the management of issues such as copyright and intellectual property on the web.
(Students should investigate sites such as TurnItIn and Creative Commons).
As information becomes publicly available on the web, it is important to specify how this information can be used. The most standard way to protect intellectual property is through specifying copyright.
However, as sharing information becomes more important, there are various licenses available.
C.4.5 - Describe the interrelationship between privacy, identification and authentication.
Privacy
Defined as the seclusion of information from others. In the context of the web this can relate to healthcare records, sensitive data from financial institutions, residential/geographic records, criminal justice investigations/proceedings. For such information it is essential to prevent unauthorised access.
Defined as the process of claiming of an identity. This process is important for privacy and is required once per authentication process.
Process of proving/confirming one’s identification. Most usually done through a username-password combination, but other methods such as two-factor authentication (video) are becoming more prominent on the web. A common form of two-factor authentication requires the user to enter a code received by SMS, in addition to the conventional password.
The pros and cons of passwordless authentication - Infosec Insights March 2021
C.4.6 - Describe the role of network architecture, protocols and standards in the future development of the web.
LINK: Networks.
Develop an appreciation that the future development of the web will have an effect on the rules and structures that support it.
The future development of the web can only be guessed at; however, one trend is to make data more meaningful in order to create a semantic web . This will certainly require some new standards, but the ideal is that established network architectures, protocols and standards can still be used. It is therefore important for these to be secure enough, to be extensible and scalable. Scalability is also important as the web grows and cloud applications are deployed on very large scales. As new web applications emerge and more sensitive data are handled, security also plays a very important role. The transition from SSL to TLS is a good example of how some protocols will probably need to be replaced by newer ones - be it because of security flaws or because design restrictions.
The Future of the Internet - IPv6
What is the Internet of Things? - Wired - Feb 2018
The web of things architecture - webofthings - 2017
C.4.7 - Explain why the web may be creating unregulated monopolies.
(The web is creating new multinational online oligarchies).
An unregulated monopoly has control over something and can do just about whatever it likes.
For a true monopoly to be in effect, each of the following characteristics would typically be evident:
A sole provider of a viable product or service.
A lack of any close substitutes for consumers to choose from.
High barriers to dissuade the entry of any potential competitors.
Sir Tim Berners-Lee describes today’s social networks as centralized silos, which hold all user information in one place. This can be a problem, as such monopolies usually control a large quantity of personal information which could be misused commercially or stolen by hackers.
Sir Tim Berners Lee the man who created the web has some regrets - Vanity Fair - 2018
C.4.8 - Discuss the effects of a decentralised and democratic web.
(The web has changed users’ behaviours and “removed” international boundaries).
The decentralised web - The blockchain hub - web3
What is Ethereum? - Investopedia - May 2022
Decentralisation: the next big step for the world wide web - the Guardian - Sept 2018
The people pushing for a decentralised web - thenewstack - Aug 2018
Blockchain will usher in the era of decentralised computing - blog bigchaindb - 2016
Blockchain Tutorial: Learn Blockchain Technology (Examples) - guru99
The Premise, the Promise, and the Pitfalls of Decentralisation - in Mozilla's latest IRL podcast episode (Feb 2019)