All in Web 2.0

In my article Web 2.0 and Maintaining the Integrity of Online Intellectual Property I discussed what happens when information flowing through the Internet can change between the time it is created and the time it is consumed. This can be both good and bad. Good aspects include the addition of new information and the resulting rich functionality and utility that can be created. Bad aspects include the possible loss of control over quality and authority as information "morphs" in ways that may have been unintended by the information's originators.
"Web 2.0 and Maintaining the Integrity of Online Intellectual Property - Is 'Meta-Information' the Answer?" is a Sys-Con "Web 2.0 Journal" article, published March 3, 2006, that addresses what happens when individual writings become modified and changed -- sometimes accidentally, sometimes on purpose -- through the collaborative and transformative functionality of content-oriented Web 2.0 applications.
I've been experimenting with NetVibes, an online tool that lets you build a re-usable and bookmark-able central page where you can load a variety of services. I've added my Yahoo! Mail link (you can add a link for Google mail if you like), RSS feeds for various Web 2.0 and Yahoo! Groups I'm active in, as well as the feeds for various blogs I check regularly. Since I move around several computers during the day this tool could provide a great service, if only I could figure out a way to tie in my Eudora email that resides on my main machine and the custom Access database I use for contact tracking!
If I write something that is likely to be changed by the distribution system or by the actions of collaborating authors, what do I own? What if, when I write a blog article I come back and regularly change, update, and correct the original, and add comments? Do I have a way of knowing if people who read the original will know that I've made corrections or changes? These are difficuly questions, and one way to help answer them is to develop registration systems to help identify and describe works and their owners (or creators).
Part of the evolving Web 2.0 environment is the collection and redistribution of original content and conversations as well as meta-information (tags etc.) relating to that content. What we are seeing are not only the easy creation of online content and media but also the sharing of that content and associated information and conversations. Functions such as aggregation of feeds and mash-up of application services are examples of operations that take place where original content and functionality may be combined and recombined in new, unique, and potentially powerful ways. We need to make sure, though, that in the process we don't destroy the integrity of the intellectual property we now find it so easy to copy and manipulate.
Significant opportunities to meet market and customer needs are emerging as corporations harness the next generation of “Web 2.0” tools and applications. Many business units recognize this and want to move quickly. But are corporate I.T. (Information Technology) departments ready — and willing — to provide the needed support? This article discusses how business units and corporate I.T. departments can work together to leverage emerging “Web 2.0” applications.
For a given technology-based application, system, or service, it's critical for a company to define who owns and is responsible for developing, managing, and running it. Failure to do so can result in "orphan" applications and systems that sit uncomfortably between business and IT, all the while consuming resources (storage space, updates, maintenance, communication costs, infrastructure costs, governance costs, etc.). Even blogs and podcasts can turn into "orphan applications" if we're not careful.

Who Controls Personal Data?

Back in the Day, my favorite Latin quote was an example of the Ablative Absolute: “Eo Imperium Tenente, Eventum Timeo.” Loosely translated, this means, “Because he holds the power, I fear the outcome.” In some ways, fear and uncertainty exist today since, in many cases, people don’t understand, or even know, who has the “power” over how their personal data are used.

Proposed: A Choice-Based Approach to Controlling the Commercial Exploitation of Personal Data

Today significant commercial trafficking occurs in personal information. Credit bureaus, research companies, insurance firms, and corporations regularly buy and sell personal information. While much of this trafficking may be benign, most is either unknown to, or beyond the control of, the individuals this personal information describes.