Group 6 5W@G Wikia
Advertisement

Symantec Web (Web 3.0)[]

10 Signs of a User-Focused Design - Web Design Ledger. (2008). Retrieved April 10, 2016, from http://webdesignledger.com/10-signs-of-a-user-focused-design/

3D Printer. (n.d.). Retrieved April 10, 2016, from https://www.flickr.com/photos/8114460@N08/9965243145/

3D Technology. (n.d.). Retrieved April 10, 2016, from http://www.3d-display-info.com/3d-technology

AJAX Tutorial. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/ajax/

Bonsor, K., & Fenson, W. (2007). How RFID Works. Retrieved April 10, 2016, from http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm

Brickley, D., & Guha, R. (1999, March 3). Resource Description Framework(RDF) Schema Specification. Retrieved April 10, 2016, from https://www.w3.org/TR/PR-rdf-schema/

Caroll, J. M. (1991). Human Computer Interaction - brief intro. Retrieved April 10, 2016, from https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/human-computer-interaction-brief-intro

Cherry, K. (2015, December 31). What You Should Know About Schemas. Retrieved April 10, 2016, from http://psychology.about.com/od/sindex/g/def_schema.htm

Coding in Ajax. What is AJAX Programming Anyway? (n.d.). Retrieved April 10, 2016, from http://www.softwareengineerinsider.com/programming-languages/ajax.html#context/api/listings/prefilter

Computer Hardware. (2007). Retrieved April 10, 2016, from http://computer.howstuffworks.com/computer-hardware-channel.htm

Data Visualization. (n.d.). Retrieved April 10, 2016, from http://mashable.com/category/data-visualization/

Extensible Markup Language (XML). (n.d.). Retrieved April 10, 2016, from https://www.w3.org/XML/

Garrett, J. J., & Moriville, P. (n.d.). User Experience Basics. Retrieved April 10, 2016, from http://www.usability.gov/what-and-why/user-experience.html

HTML and XHTML. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/html/html_xhtml.asp

Home | Usability.gov. (n.d.). Retrieved April 10, 2016, from http://www.usability.gov/

Institute for Human Centered Design (IHCD) | Institute for Human Centered Design (IHCD). (n.d.). Retrieved April 10, 2016, from http://humancentereddesign.org/

Java (programming language). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Java_(programming_language)

Matusky, R. (2015, April 03). Web 2.0 vs. Web 3.0 - What Really is the Difference? Retrieved April 10, 2016, from http://randymatusky.com/2015/04/03/web-2-0-vs-web-3-0-what-really-is-the-difference/

Microchip implant (human). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Microchip_implant_(human)

N-Triples. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/2001/sw/RDFCore/ntriples/

Notation 3 Logic. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/DesignIssues/Notation3

OWL Web Ontology Language Overview. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TR/owl-features/

R. (2002, February 10). RDF. Retrieved April 10, 2016, from https://www.w3.org/RDF/

RDF. (2004, February 10). Retrieved April 10, 2016, from https://www.w3.org/RDF/

RIF Overview (Second Edition). (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TR/rif-overview/

Rouse, M. (2006, June). What is HTTP (Hypertext Transfer Protocol)? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://searchwindevelopment.techtarget.com/definition/HTTP

Rouse, M. (2014, December). What is SOAP (Simple Object Access Protocol)? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://searchsoa.techtarget.com/definition/SOAP

Rouse, M. (2014, May 6). What is URI (Uniform Resource Identifier)? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://searchsoa.techtarget.com/definition/URI

Rouse, M. (2015, May). What is social media? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://whatis.techtarget.com/definition/social-media

Ruby. (n.d.). Retrieved April 10, 2016, from https://www.ruby-lang.org/en/

SKOS Simple Knowledge Organization System - Home Page. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/2004/02/skos/

SPARQL 1.1 Query Language. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TR/sparql11-query/

Strickland, J. (2007). How Virtual Reality Works. Retrieved April 10, 2016, from http://electronics.howstuffworks.com/gadgets/other-gadgets/virtual-reality.htm

Turtle - Terse RDF Triple Language. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TeamSubmission/turtle/

Unicode Consortium. (n.d.). Retrieved April 10, 2016, from http://unicode.org/

Web service. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Web_service

XML Schema Tutorial. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/XML/schema_intro.asp

XML Tutorial. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/xml/

Yukihiro Matsumoto. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Yukihiro_Matsumoto

Filter And Search Bubbles[]

Filter Bubble: Breaking Out of the Over-Personalised Internet! (2015, January 12). Retrieved April 10, 2016, from http://perspectiveix.com/blog/2015/01/filter-bubble-over-personalised-internet/

Filter bubble. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Filter_bubble

Gross, D. (2011). What the Internet is hiding from you. Retrieved April 10, 2016, from http://www.cnn.com/2011/TECH/web/05/19/online.privacy.pariser/

How to Burst the "Filter Bubble" that Protects Us from Opposing Views. (n.d.). Retrieved April 10, 2016, from https://www.technologyreview.com/s/522111/how-to-burst-the-filter-bubble-that-protects-us-from-opposing-views/

Pariser, E. (2011, March). Beware online "filter bubbles" Retrieved April 10, 2016, from http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles

Shelly, A. (n.d.). Book review of Eli Pariser’s The filter bubble: What the Internet is hiding from you | Shelley | First Monday. Retrieved April 10, 2016, from http://firstmonday.org/ojs/index.php/fm/article/view/4100/3268

Stray, J. (2012, July 11). Are we stuck in filter bubbles? Here are five potential paths out. Retrieved April 10, 2016, from http://www.niemanlab.org/2012/07/are-we-stuck-in-filter-bubbles-here-are-five-potential-paths-out/

Privacy And Tracking[]

Madrigle, A.C. (2012). I'm being followed: how Google—and 104 other companies—are tracking me on the web. The Atlantic. Retrieved from http://www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758/

Paul, I. (2012). Firefox add-on Collusion shows who's tracking you online. PCWorld. Retrieved from http://www.pcworld.com/article/250986/firefox_add_on_collusion_shows_whos_tracking_you_online.html

Rainie, L., Kiesler, S., Kang R., and Madden, M. (2013). Anonymity, privacy, and security online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/

Rouse, M. (2013). data privacy (information privacy). TechTarget. Retrieved from http://searchcio.techtarget.com/definition/data-privacy-information-privacy

Schell, W. (2016). Metadata experiment. Retrieved from http://moxie.cs.oswego.edu/~wschell/coursework/isc110/metadata_experiment.pdf

Schell, W. (2016). Metadata questions and answers. Retrieved from http://moxie.cs.oswego.edu/~wschell/coursework/isc110/metadata_q&a.pdf

Anonymity & Avatars[]

Anonymous (group). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Anonymous_(group)

Avatar (computing). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Avatar_(computing)

Catfishing. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Catfishing

Dr. Phil.com - Advice - Online Dating Red Flags: Warning Signs of a Catfish. (n.d.). Retrieved April 10, 2016, from http://www.drphil.com/articles/article/720

Golden, P. (2015, April 24). Online Avatars May Be Part of Our Developmental DNA. Retrieved April 10, 2016, from http://www.huffingtonpost.com/paula-golden/online-avatars-may-be-par_b_7122320.html

Palmer, R. (2013, January 17). Where Does 'Catfish' Come From? Online Hoax Movie Inspired By Fisherman's Lore. Retrieved April 10, 2016, from http://www.ibtimes.com/where-does-catfish-come-online-hoax-movie-inspired-fishermans-lore-1022374

Rainie, L., Kiesler, S., Kang R., and Madden, M. (2013). Anonymity, privacy, and security online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/

Raza, A. (2016, January 13). 8 Most Awesome Hacks Conducted By Anonymous Hackers. Retrieved April 10, 2016, from https://www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/

Advertisement