SlideShare uma empresa Scribd logo
1 de 19
Human Flesh Search Engine and Internet Piracy Dongxiao Liu Binghamton University
Overview ,[object Object]
Human Flesh Search Engine
Internet Privacy
Government Policy,[object Object]
If a person is one step away from each person they know and two steps away from each person who is known by one of the people they know, then everyone is at most six steps away from any other person on Earth.
Internet Theory ,[object Object]
Wikipedia
Yahoo answers
SNS
Internet and Business
Twitter
Crowd sourcing
(Users Add Value)
Pay-Per link
New Media Marketing
Long Tail Vs Free
Convergence,[object Object]

Mais conteúdo relacionado

Mais procurados

Mais procurados (12)

Activism
ActivismActivism
Activism
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Polinter07
Polinter07Polinter07
Polinter07
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivism
 
Filtering Twitter
Filtering TwitterFiltering Twitter
Filtering Twitter
 
Should We Be More Social
Should We Be More SocialShould We Be More Social
Should We Be More Social
 
Polinter07
Polinter07Polinter07
Polinter07
 
Ralf Bendrath Privacy Activism 2.0
Ralf Bendrath Privacy Activism 2.0Ralf Bendrath Privacy Activism 2.0
Ralf Bendrath Privacy Activism 2.0
 
Understanding social media & free speech
Understanding social media & free speechUnderstanding social media & free speech
Understanding social media & free speech
 
Polinter13
Polinter13Polinter13
Polinter13
 
Polinter13
Polinter13Polinter13
Polinter13
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 

Semelhante a Internet search/HFSE

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
VDDI Rural Forum 8/2/2011
VDDI Rural Forum 8/2/2011VDDI Rural Forum 8/2/2011
VDDI Rural Forum 8/2/2011ray_stephens
 
Vintage Fashion Essay
Vintage Fashion EssayVintage Fashion Essay
Vintage Fashion EssayMartha Bush
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docxSONU61709
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
you have to respond to bellow paper I also give example of someo.docx
you have to respond to bellow paper I also give example of someo.docxyou have to respond to bellow paper I also give example of someo.docx
you have to respond to bellow paper I also give example of someo.docxlaquandabignell
 
Political Systems, Week01 07 2008
Political Systems, Week01 07 2008Political Systems, Week01 07 2008
Political Systems, Week01 07 2008Kathy Gill
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)Steven Clift
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyBill Densmore
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
From Meme To Social Fabric
From Meme To Social FabricFrom Meme To Social Fabric
From Meme To Social FabricIsaac Mao
 
Engaging Times 2017
Engaging Times 2017Engaging Times 2017
Engaging Times 2017Steven Clift
 

Semelhante a Internet search/HFSE (18)

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
VDDI Rural Forum 8/2/2011
VDDI Rural Forum 8/2/2011VDDI Rural Forum 8/2/2011
VDDI Rural Forum 8/2/2011
 
Vintage Fashion Essay
Vintage Fashion EssayVintage Fashion Essay
Vintage Fashion Essay
 
Essay Nodi
Essay NodiEssay Nodi
Essay Nodi
 
1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx1. Discussion Points (Use your browser to conduct research on the .docx
1. Discussion Points (Use your browser to conduct research on the .docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Polinter06
Polinter06Polinter06
Polinter06
 
Selina Rust Libel
Selina Rust LibelSelina Rust Libel
Selina Rust Libel
 
Socialisation Online
Socialisation OnlineSocialisation Online
Socialisation Online
 
you have to respond to bellow paper I also give example of someo.docx
you have to respond to bellow paper I also give example of someo.docxyou have to respond to bellow paper I also give example of someo.docx
you have to respond to bellow paper I also give example of someo.docx
 
Political Systems, Week01 07 2008
Political Systems, Week01 07 2008Political Systems, Week01 07 2008
Political Systems, Week01 07 2008
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparency
 
0804 Idlo Chennai
0804 Idlo Chennai0804 Idlo Chennai
0804 Idlo Chennai
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
From Meme To Social Fabric
From Meme To Social FabricFrom Meme To Social Fabric
From Meme To Social Fabric
 
Engaging Times 2017
Engaging Times 2017Engaging Times 2017
Engaging Times 2017
 

Internet search/HFSE