This is my social graph
1: <rdf:RDF 2: xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" 3: xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" 4: xmlns:foaf="http://xmlns.com/foaf/0.1/" 5: xmlns:admin="http://webns.net/mvcb/"> 6: <foaf:PersonalProfileDocument rdf:about=""> 7: <foaf:maker rdf:resource="#me"/> 8: <foaf:primaryTopic rdf:resource="#me"/> 9: <admin:generatorAgent rdf:resource="http://www.ldodds.com/foaf/foaf-a-matic"/> 10: <admin:errorReportsTo rdf:resource="mailto:leigh@ldodds.com"/> 11: </foaf:PersonalProfileDocument> 12: <foaf:Person rdf:ID="me"> 13: <foaf:name>Taka Medo</foaf:name> 14: <foaf:title>Mr</foaf:title> 15: <foaf:givenname>Taka</foaf:givenname> 16: <foaf:family_name>Medo</foaf:family_name> 17: <foaf:nick>Takama</foaf:nick> 18: <foaf:mbox rdf:resource="mailto:kema@gmail.com"/> 19: <foaf:homepage rdf:resource="takama.com.au"/> 20: <foaf:phone rdf:resource="tel:042612354"/> 21: <foaf:workplaceHomepage rdf:resource="mamata.edu.au"/> 22: <foaf:workInfoHomepage rdf:resource="Teacher"/> 23: <foaf:schoolHomepage rdf:resource="www.holyground.com"/> 24: <foaf:knows> 25: <foaf:Person> 26: <foaf:name>bubu</foaf:name> 27: <foaf:mbox rdf:resource="mailto:bubu@gmail.com"/></foaf:Person></foaf:knows> 28: <foaf:knows> 29: <foaf:Person> 30: <foaf:name>kaka</foaf:name> 31: <foaf:mbox rdf:resource="mailto:kaka@gmail.com"/></foaf:Person></foaf:knows> 32: <foaf:knows> 33: <foaf:Person> 34: <foaf:name>totot</foaf:name> 35: <foaf:mbox rdf:resource="mailto:totot@yahoo.com"/></foaf:Person></foaf:knows></foaf:Person> 36: </rdf:RDF>
Recent years, Social graph is becoming more familiar idea to many people that depicts personal relationship between internet users. It bring to us so many opportunities not only in the development of the internet in general but also specific in social media. Although the advantages of this new concept such as easy to share broad range of information, stay connect with other users and so much more. However, privacy and securities are visible weaknesses that I would like to discuss below.
Pros
1. This technology evolves the way information being used. As now information can be shared in a blink of eyes. Moreover, the information not just go faster but also can be transfer cross programs, website and OS.
2. It also created a connection between each individual in an organized manner which used to be very confused and untidy in both real life and in the internet.
3. Born a new generation of social network.
Cons
1.Since the information was too easy to access that become harmful to personal identity as well as security. That means every one can go and translate your information and use it as well as steal it from you.
2. In order to secure these personal information become harder because the door into this source was to big and that cause much more efforts to secure it.
Pros
1. This technology evolves the way information being used. As now information can be shared in a blink of eyes. Moreover, the information not just go faster but also can be transfer cross programs, website and OS.
2. It also created a connection between each individual in an organized manner which used to be very confused and untidy in both real life and in the internet.
3. Born a new generation of social network.
Cons
1.Since the information was too easy to access that become harmful to personal identity as well as security. That means every one can go and translate your information and use it as well as steal it from you.
2. In order to secure these personal information become harder because the door into this source was to big and that cause much more efforts to secure it.
No comments:
Post a Comment