SlideShare a Scribd company logo
Web 2.0 Principles and Best Practices, Fall 2006 where data is the core value of applications
Contents Pattern: Harnessing Collective Intelligence AKA Overview Practices Issues to solve Misconceptions Enterprise 2.0 Recommendations Examplars
Pattern: Harnessing Collecgtive Intelligence - AKA Harnessing Collective Intelligence are also known by: Architecture of participation Co-Creation Wisdom of Crowds
Pattern: Harnessing Collecgtive Intelligence - Overview WEB 2.0 is an architecture of Participation characterized by: Is user-centered Decentralized Collaborative One Architecture of Participation will succed following two principles:
Pattern: Harnessing Collecgtive Intelligence - Overview One Architecture of Participation will succed following two principles: Users add value Directly through content creation Indereclty through their actions Network Effects magnify this value Metcalfe’s Law – Utility value of networked devices grows proportonally to the square of the number of nodes in the network Facilitation the formation of sub-groups within the network can cause the utility value to grow according to Reed’s law
Pattern: Harnessing Collecgtive Intelligence - Overview Network Effects must magnify Value  added by users following Reed’s Law
Pattern: Harnessing Collecgtive Intelligence - Overview Harnessing Collective Intelligence have these three main benefits: Opens opportunities for rapid, large-scale, user driven growth Builds customer trust and loyalty Improves products as user base grows
Pattern: Harnessing Collecgtive Intelligence - Practices Pay the User first Minimize barriers to adoption Simplicity drives adoption
Pattern: Harnessing Collecgtive Intelligence - Practices Set network effects by default Try to set all user’s content public by default Have a strict Privacy Statement about user’s content Elaborate the terms and conditons to have the maximum user’s content public,  Attention:  content is directly created by user submital or indirectly, infered from his actions
Practices Envolves users explicitly and implicity Explicitly Help them to submit content (reviews, rating, posts, etc) Implicitly Collect data from their actions (what they see, where they go, what they read, with whom they talk, etc) and bring insights from that data through algorithms
Practices Provide a meaningful context for creation Invite users to participate Create a coherent, consistent context Create a subject matter or community context (or let the users create theirs) Provide a framework with mechanisms for: User’s identity and reputation Relationships among users Data identification (URLs, Tags, etc) Findability Aggregation Personalization
Practices
Practices Trust your users Provide a sufficiently open context to allow: Participation Interactions Transactions Share some control with users Automatically or socially fight abuses
Practices Design Software so that it improves as more people use it (not neccessarelly in functionality but in value to user) More reviews of products, sellers or people, create a better reputation management, for instance. – Grow data. More people in the network, and more interactions among them, increase the value of the software – Grow data.  Opening the platform for standards, like open social from Google, allow developers to create new functionality and provide it to other user – Grow functionality.
Practices Facilitate emergence Impose less up-front structure Minimize the number of hard-wire assumptions Let user’s behavior to influence product direction Let user’s actions to change interface navigation and page design
Practices Facilitate emergence Impose less up-front structure Minimize the number of hard-wire assumptions Let user’s behavior to influence product direction Let user’s actions to change interface navigation and page design
Issues & Debates Walled garden 2.0 Closed communities (locked by subject matter, for example) Ex: Linkedin, MySpace, Hi5
Issues & Debates Privacy and liability for individuals Mining of data derived from: Ratings Conversations Purchases Reviews Posts Location etc
Issues & Debates Privacy and liability for providers Violation of privacy laws Violation of terms and conditions
Issues & Debates Quality, not just quantity, matters Reward best members using: Money Reputation Ego Career advancement
Misconceptions An architecture of participation is the same as community Community with full control for sharing and participation are always a good thing.  Adding feature X makes it WEB 2.0
Enterprise 2.0 Reccomendations Leverage Web 2.0-s core tools and technologies  Use services from third party’s  Use RSS , Wikis, Blogs and other collaboration technologies Provide easier-to-adopt, scalable solutions to solve long-standing enterprise issues.
Enterprise 2.0 Reccomendations Facilitate low-cost, emergent collaboration Impose less structure User-driven emergence Ex: Users can use a facebook application to interact with the Enterprise 2.0; Some users can use box.net to interact with the enterprise 2.0’s documents and others can use similar services to accomplish the same goal, in a secure way.
Enterprise 2.0 Reccomendations Pay attention to IT decentralization WEB 2.0 is decentralized A different model from the centralized IT control structure Align IT goals with WEB 2.0 Strategy and define SMART objectives
Enterprise 2.0 Reccomendations Foster contribution According to culture, demographics, geographic, or other enterprise environmental factors find ways to have members provide content and have interactions with the network The small scale of an enterprise, compared with the Internet, create this challenge to Enterprise 2.0

More Related Content

PPT
Inclusive Social Tagging
PPT
Social Software in Knowledge Management of Organizations
PPT
Political Parties on Web 2.0
PPT
Social Networking and Scientific Gateways
PPT
Social Media and Government: The Big(ger) Picture
PPTX
Immersion Program Presentation Web2
PDF
Socially augmented software empowering software operation through social cont...
PDF
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Inclusive Social Tagging
Social Software in Knowledge Management of Organizations
Political Parties on Web 2.0
Social Networking and Scientific Gateways
Social Media and Government: The Big(ger) Picture
Immersion Program Presentation Web2
Socially augmented software empowering software operation through social cont...
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA

What's hot (20)

PDF
2012 Trends
PPT
Successful Enterprise 2.0 and Social Media
PPT
Advancing Science In A Collaborative Web 20 World
PPS
Making The Connection Part 2 (Government and Citizens)
PPT
Web 2.0 Challenges & Opportunities
PPT
Knowledge Sharing over social networking systems
PPT
Inter Lab06 Bebo White 1
PPT
Web 3.0 social media and semantic technology - primal fusion - jan-27-10-no...
PPT
Overview Clearvale - The Social Business Cloud
PPT
Clearvale Hlo En 2010 01 18
PDF
Introduction to cloud computing in government
PPT
Pilot Presentation
PPT
Facebook Groups for Generating Connections, Insights & Sales
PDF
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
PPT
Types of E business communities
PPT
Web 20 For Government Grow Call Latest Final
PDF
Ideate
PPT
Team Echo - Enhancing Cooperation
PPT
MIS Team Echo - Cooperation
PPT
Knowledge Management
2012 Trends
Successful Enterprise 2.0 and Social Media
Advancing Science In A Collaborative Web 20 World
Making The Connection Part 2 (Government and Citizens)
Web 2.0 Challenges & Opportunities
Knowledge Sharing over social networking systems
Inter Lab06 Bebo White 1
Web 3.0 social media and semantic technology - primal fusion - jan-27-10-no...
Overview Clearvale - The Social Business Cloud
Clearvale Hlo En 2010 01 18
Introduction to cloud computing in government
Pilot Presentation
Facebook Groups for Generating Connections, Insights & Sales
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Types of E business communities
Web 20 For Government Grow Call Latest Final
Ideate
Team Echo - Enhancing Cooperation
MIS Team Echo - Cooperation
Knowledge Management
Ad

Similar to Harnessing Collective Intelligence (20)

PPT
Getting Started with Enterprise Social Networking
PPT
Social Web Strategy Development
PPT
SMU CEHD Professional Development Webinar
PPT
Increasing access to professional development
PPT
Web 2.0 - Accelerator of a major shift
ODP
Web 2.0 Core Concepts, Applications, and Implications
PPT
Web 2.0 workshop
PPT
Web 2.0 Concepts
PPT
Acs Presentation Thinking Outside Of Inbox V2
PPT
PPT
Web2.0 and What it Means for Business
PPT
[MS PowerPoint 97/2000 format]
PPT
[MS PowerPoint 97/2000 format]
PPT
Web 20 For Technical Communicators
PPT
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
PPT
Telecomunicaciones eb dc
PDF
Global Redirective Practices: an online workshop for a client
PPT
Clearvale Overview October 2010
PPT
Exploration & Promotion: Implementation Strategies of Corporate Social Software
PPT
Principles of web 2.0
Getting Started with Enterprise Social Networking
Social Web Strategy Development
SMU CEHD Professional Development Webinar
Increasing access to professional development
Web 2.0 - Accelerator of a major shift
Web 2.0 Core Concepts, Applications, and Implications
Web 2.0 workshop
Web 2.0 Concepts
Acs Presentation Thinking Outside Of Inbox V2
Web2.0 and What it Means for Business
[MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format]
Web 20 For Technical Communicators
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
Telecomunicaciones eb dc
Global Redirective Practices: an online workshop for a client
Clearvale Overview October 2010
Exploration & Promotion: Implementation Strategies of Corporate Social Software
Principles of web 2.0
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
NewMind AI Monthly Chronicles - July 2025

Harnessing Collective Intelligence

  • 1. Web 2.0 Principles and Best Practices, Fall 2006 where data is the core value of applications
  • 2. Contents Pattern: Harnessing Collective Intelligence AKA Overview Practices Issues to solve Misconceptions Enterprise 2.0 Recommendations Examplars
  • 3. Pattern: Harnessing Collecgtive Intelligence - AKA Harnessing Collective Intelligence are also known by: Architecture of participation Co-Creation Wisdom of Crowds
  • 4. Pattern: Harnessing Collecgtive Intelligence - Overview WEB 2.0 is an architecture of Participation characterized by: Is user-centered Decentralized Collaborative One Architecture of Participation will succed following two principles:
  • 5. Pattern: Harnessing Collecgtive Intelligence - Overview One Architecture of Participation will succed following two principles: Users add value Directly through content creation Indereclty through their actions Network Effects magnify this value Metcalfe’s Law – Utility value of networked devices grows proportonally to the square of the number of nodes in the network Facilitation the formation of sub-groups within the network can cause the utility value to grow according to Reed’s law
  • 6. Pattern: Harnessing Collecgtive Intelligence - Overview Network Effects must magnify Value added by users following Reed’s Law
  • 7. Pattern: Harnessing Collecgtive Intelligence - Overview Harnessing Collective Intelligence have these three main benefits: Opens opportunities for rapid, large-scale, user driven growth Builds customer trust and loyalty Improves products as user base grows
  • 8. Pattern: Harnessing Collecgtive Intelligence - Practices Pay the User first Minimize barriers to adoption Simplicity drives adoption
  • 9. Pattern: Harnessing Collecgtive Intelligence - Practices Set network effects by default Try to set all user’s content public by default Have a strict Privacy Statement about user’s content Elaborate the terms and conditons to have the maximum user’s content public, Attention: content is directly created by user submital or indirectly, infered from his actions
  • 10. Practices Envolves users explicitly and implicity Explicitly Help them to submit content (reviews, rating, posts, etc) Implicitly Collect data from their actions (what they see, where they go, what they read, with whom they talk, etc) and bring insights from that data through algorithms
  • 11. Practices Provide a meaningful context for creation Invite users to participate Create a coherent, consistent context Create a subject matter or community context (or let the users create theirs) Provide a framework with mechanisms for: User’s identity and reputation Relationships among users Data identification (URLs, Tags, etc) Findability Aggregation Personalization
  • 13. Practices Trust your users Provide a sufficiently open context to allow: Participation Interactions Transactions Share some control with users Automatically or socially fight abuses
  • 14. Practices Design Software so that it improves as more people use it (not neccessarelly in functionality but in value to user) More reviews of products, sellers or people, create a better reputation management, for instance. – Grow data. More people in the network, and more interactions among them, increase the value of the software – Grow data. Opening the platform for standards, like open social from Google, allow developers to create new functionality and provide it to other user – Grow functionality.
  • 15. Practices Facilitate emergence Impose less up-front structure Minimize the number of hard-wire assumptions Let user’s behavior to influence product direction Let user’s actions to change interface navigation and page design
  • 16. Practices Facilitate emergence Impose less up-front structure Minimize the number of hard-wire assumptions Let user’s behavior to influence product direction Let user’s actions to change interface navigation and page design
  • 17. Issues & Debates Walled garden 2.0 Closed communities (locked by subject matter, for example) Ex: Linkedin, MySpace, Hi5
  • 18. Issues & Debates Privacy and liability for individuals Mining of data derived from: Ratings Conversations Purchases Reviews Posts Location etc
  • 19. Issues & Debates Privacy and liability for providers Violation of privacy laws Violation of terms and conditions
  • 20. Issues & Debates Quality, not just quantity, matters Reward best members using: Money Reputation Ego Career advancement
  • 21. Misconceptions An architecture of participation is the same as community Community with full control for sharing and participation are always a good thing. Adding feature X makes it WEB 2.0
  • 22. Enterprise 2.0 Reccomendations Leverage Web 2.0-s core tools and technologies Use services from third party’s Use RSS , Wikis, Blogs and other collaboration technologies Provide easier-to-adopt, scalable solutions to solve long-standing enterprise issues.
  • 23. Enterprise 2.0 Reccomendations Facilitate low-cost, emergent collaboration Impose less structure User-driven emergence Ex: Users can use a facebook application to interact with the Enterprise 2.0; Some users can use box.net to interact with the enterprise 2.0’s documents and others can use similar services to accomplish the same goal, in a secure way.
  • 24. Enterprise 2.0 Reccomendations Pay attention to IT decentralization WEB 2.0 is decentralized A different model from the centralized IT control structure Align IT goals with WEB 2.0 Strategy and define SMART objectives
  • 25. Enterprise 2.0 Reccomendations Foster contribution According to culture, demographics, geographic, or other enterprise environmental factors find ways to have members provide content and have interactions with the network The small scale of an enterprise, compared with the Internet, create this challenge to Enterprise 2.0