SlideShare una empresa de Scribd logo
1 de 44
Everything 2.0 The Blogger's Guide to the Social Media Universe Charles Mok  莫乃光 Chairman, Internet Society Hong Kong 2009.09.24
乜都 2.0
1998 –  2007
 
 
 
 
 
User-created content
 
Top Blogs
 
What are the most popular  subjects for bloggers?
 
 
 
 
 
How do people find your blog?
 
 
 
 
 
When bloggers meet social media...
 
 
 
 
 
 
 
Social media campaign ...for a cause
Blog
 
 
 
 
One thing leads to another...
If there is any takeaways from this...
Five Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hong Kong, 2009.11.07-09
[object Object],[object Object],[object Object],[object Object]
 

Más contenido relacionado

Destacado

Destacado (13)

Power of social influence, crm and customer perception
Power of social influence, crm and customer perceptionPower of social influence, crm and customer perception
Power of social influence, crm and customer perception
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
前海:IT業發展與機遇
前海:IT業發展與機遇前海:IT業發展與機遇
前海:IT業發展與機遇
 
Startup 2 0 Hkbu
Startup 2 0 HkbuStartup 2 0 Hkbu
Startup 2 0 Hkbu
 
Big Data
Big DataBig Data
Big Data
 
Hp high potential
Hp high potentialHp high potential
Hp high potential
 
Internet Society Hong Kong -- Chapter introduction
Internet Society Hong Kong -- Chapter introductionInternet Society Hong Kong -- Chapter introduction
Internet Society Hong Kong -- Chapter introduction
 
Transformation of ICT Industry in Hong Kong
Transformation of ICT Industry in Hong KongTransformation of ICT Industry in Hong Kong
Transformation of ICT Industry in Hong Kong
 
Cwmc2009
Cwmc2009Cwmc2009
Cwmc2009
 
Presentation to Canadian companies about HK ICT
Presentation to Canadian companies about HK ICTPresentation to Canadian companies about HK ICT
Presentation to Canadian companies about HK ICT
 
Intellectual Property & User Rights in Digital Environment
Intellectual Property & User Rights in Digital EnvironmentIntellectual Property & User Rights in Digital Environment
Intellectual Property & User Rights in Digital Environment
 
Brave New World 2 0 Pt 1
Brave New World 2 0 Pt 1Brave New World 2 0 Pt 1
Brave New World 2 0 Pt 1
 
Personal data protection and information security
Personal data protection and information securityPersonal data protection and information security
Personal data protection and information security
 

Similar a Everything Social 2 0

Using Web 2.0 Tools to Build and Maintain a Personal Learning Network
Using Web 2.0 Tools to Build and Maintain a Personal Learning NetworkUsing Web 2.0 Tools to Build and Maintain a Personal Learning Network
Using Web 2.0 Tools to Build and Maintain a Personal Learning Network
egregory
 
To find and be found social recruitment jan 22 2013
To find and be found social recruitment jan 22 2013To find and be found social recruitment jan 22 2013
To find and be found social recruitment jan 22 2013
John Rose
 
Building a successful open source business model - Joomla!Days NL 2010 #jd10nl
Building a successful open source business model  -  Joomla!Days NL 2010 #jd10nlBuilding a successful open source business model  -  Joomla!Days NL 2010 #jd10nl
Building a successful open source business model - Joomla!Days NL 2010 #jd10nl
Joomla!Days Netherlands
 

Similar a Everything Social 2 0 (20)

Beyond the Buzz: Designing a MOOC for behavior change
Beyond the Buzz: Designing a MOOC for behavior changeBeyond the Buzz: Designing a MOOC for behavior change
Beyond the Buzz: Designing a MOOC for behavior change
 
The Future of Moodle and How Not to Stop It
The Future of Moodle and How Not to Stop ItThe Future of Moodle and How Not to Stop It
The Future of Moodle and How Not to Stop It
 
Using Web 2.0 Tools to Build and Maintain a Personal Learning Network
Using Web 2.0 Tools to Build and Maintain a Personal Learning NetworkUsing Web 2.0 Tools to Build and Maintain a Personal Learning Network
Using Web 2.0 Tools to Build and Maintain a Personal Learning Network
 
Lesson 2 introduction into blogs
Lesson 2 introduction into blogsLesson 2 introduction into blogs
Lesson 2 introduction into blogs
 
Why Online Communities?
Why Online Communities?Why Online Communities?
Why Online Communities?
 
Social Media for Science
Social Media for ScienceSocial Media for Science
Social Media for Science
 
Social Media Building Blocks
Social Media Building BlocksSocial Media Building Blocks
Social Media Building Blocks
 
Grade 10 Computer Lesson 5: What is Blogging?
Grade 10 Computer Lesson 5: What is Blogging?Grade 10 Computer Lesson 5: What is Blogging?
Grade 10 Computer Lesson 5: What is Blogging?
 
To find and be found social recruitment jan 22 2013
To find and be found social recruitment jan 22 2013To find and be found social recruitment jan 22 2013
To find and be found social recruitment jan 22 2013
 
Social Media for Micro Enterprise
Social Media for Micro EnterpriseSocial Media for Micro Enterprise
Social Media for Micro Enterprise
 
How why a k 12 mooc learning 2.0
How why a k 12 mooc learning 2.0How why a k 12 mooc learning 2.0
How why a k 12 mooc learning 2.0
 
Got Tech? (blog)
Got Tech? (blog)Got Tech? (blog)
Got Tech? (blog)
 
Social Media: Making It Work for You
Social Media: Making It Work for YouSocial Media: Making It Work for You
Social Media: Making It Work for You
 
Social media training workshop – Day 1
Social media training workshop – Day 1Social media training workshop – Day 1
Social media training workshop – Day 1
 
Session 26 emarketing - 23 nov 10
Session 26   emarketing - 23 nov 10Session 26   emarketing - 23 nov 10
Session 26 emarketing - 23 nov 10
 
Making your blog social
Making your blog socialMaking your blog social
Making your blog social
 
Maximize Demosphere XX - Blogging
Maximize Demosphere XX - BloggingMaximize Demosphere XX - Blogging
Maximize Demosphere XX - Blogging
 
Building a successful open source business model - Joomla!Days NL 2010 #jd10nl
Building a successful open source business model  -  Joomla!Days NL 2010 #jd10nlBuilding a successful open source business model  -  Joomla!Days NL 2010 #jd10nl
Building a successful open source business model - Joomla!Days NL 2010 #jd10nl
 
Navigating User Generated Content
Navigating User Generated ContentNavigating User Generated Content
Navigating User Generated Content
 
Blogs
BlogsBlogs
Blogs
 

Más de Charles Mok

Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 

Más de Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Everything Social 2 0