 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
Acceptance of
truth in some cases:
|
|
|
|
• |
Yes, Blogs are
used by the vain
|
|
|
|
• |
IM can be
disruptive
|
|
|
|
• |
You may receive
spam, spim, Skim(?)
|
|
|
|
• |
Wikis may be
vandalised
|
|
|
|
• |
Blog comments
may get full of Viagra spam
|
|
|
But recognition
that it's not always true:
|
|
|
|
• |
Many Blogs have
valuable information
|
|
|
|
• |
You can normally
configure applications (switch
|
|
|
off alerts; hide
identity & presence; …)
|
|
|
|
• |
You can manage
potential hacks: require
|
|
|
authentication;
disable features; use in a trusted
|
|
environment such
as on Intranet; …
|
|