Guidelines on How to Use Web 2.0 Use Case

Guidelines on How to Use Web 2.0
– for Public Administration Staff
Use Case
Civil Service 2.0
Version 1.0.0
Results of the PG
Short description
Basic principles for access and use of Internet services with
special emphasis on social networks
Employees working for government offices and organisations are
increasingly having to distinguish between private and official use of
Web 2.0 applications.
Web 2.0 applications are operated interactively on the Internet,
handling contents primarily made available by their users.
The present documentation was drawn up as a general guideline for
users and may serve as a draft structure for individual organisations
preparing their own guidelines. It does not include any rules concerning
their web presence in Web 2.0 media.
Authors:
Contributions by:
Daniel Medimorec (Federal
Project team / Working group
Chancellery)
Civil Service Web 2.0
Peter Parycek (Danube
University Krems)
Peter Pfläging (City of Vienna)
Andreas Gold (Federal Ministry for European and International Affairs)
Thomas Jöchler (City of Vienna)
Stephan Lauringer (Federal Chancellery)
Robert Lender (Federal Ministry of Economy, Family and Youth)
Ralph Osner (Federal Ministry of the Interior)
Michael Rederer (City of Vienna)
Thomas Skerlan-Schuhböck (City of Vienna)
Andreas Unterberger (Federal Ministry of Economy, Family and Youth)
Version … : 06-10-2010
rejected by:
Deadline: DD.MM.YYYY
(indicate name of rejecting province)
Subversion … : DD.MM.YYYY
Deadline: DD.MM.YYYY
(indicate name of rejecting province)
Detailed version … : DD.MM.YYYY
Released: DD.MM.YYYY
(details on release)
Civil Service 2.0-1.0.0
1 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
Contents
1
2
3
4
5
Web 2.0 Guidelines for Public Administration Staff ......................................................... 3
1.1 Web-2.0 Services – aspects of use ............................................................................... 5
I. Identification ................................................................................................................... 6
II. Content........................................................................................................................... 6
III. Role/Function ............................................................................................................... 6
IV. Platform ........................................................................................................................ 6
V. Time and Place .............................................................................................................. 7
Web 2.0 Scenarios .............................................................................................................. 7
2.1 Scenario I: “private only“............................................................................................. 8
2.2 Scenario II: “official only“ ........................................................................................... 9
2.3 Scenario III: “private with official content“............................................................... 10
2.4 Scenario IV: “official publication without legitimisation“ ........................................ 11
Useful Hints for Using Web 2.0 ....................................................................................... 12
3.1 Web 2.0 for private use .............................................................................................. 12
3.2 Web 2.0 for official use .............................................................................................. 13
Glossary............................................................................................................................ 15
Diagram as a template for individual use ......................................................................... 18
Civil Service 2.0l-1.0.0
2 / 18
20/08/2012
WG: Civil Service/ Web 2.0
1
Web 2.0 Guidelines for Administration Staff
Web 2.0 Guidelines for Public Administration Staff
The present Guidelines were prepared to assist public administration staff with official and
private use of Web 2.0 applications. They are based on the position paper “basic outlines for
access and use of various Internet services (e.g. social networks on the internet)“ which
provides a first general description 1.
“Web 2.0“ as a keyword comprises a number of different World Wide Web (WWW) services
designed to assist users in creating and managing their websites without specific web design
or programming knowledge. Communities like Facebook or XING in particular are gaining in
popularity. Quite evidently this is not a short-lived trend but a social development of
overriding significance. Unlike in the traditional Web where a minority of active authors
create sites for the majority of passive readers, in Web 2.0 everyone can become their own
author. This opens up a wealth of new opportunities for cooperating, informing,
communicating and linking with one another.
It is nevertheless important that those who avail themselves of these opportunities are
aware of the responsibility entailed. Now more than ever a distinction must be made
between the fleeting spoken word and the written one. Much of what used to be treated
flippantly in passing and in private is now increasingly spread through digital networks,
granting it wider reach and lastingness. Thorough removal of data in Internet services and
from the caches of search engine providers is virtually impossible – “The Internet remembers
relentlessly“.
As with all Internet utilisation it is important to draw a line between official and private
utilisation. Official utilisation is subject to specific framework conditions. At the federal level
these are specified in the “IKT-Nutzungsverordnung“ (ICT utilisation regulations) in the
version of March 17, 2010. Reference is made to the decree “Internet und elektronische
Kommunikation“ (Internet and electronic communication) issued by the City of Vienna in the
version of February 20, 2009 to exemplify regulations at provincial level. When using the
Internet and Web 2.0 services the following aspects should be taken into consideration:
•
•
•
Private Internet utilisation in principle is permitted to a “limited extent“ and/or “where
absolutely essential“ only,
Official secrecy and data protection must be respected, especially when passing on
and storing data.
Media spokespersons or persons in charge of public relations only are entitled to
publish official information. All other administration staff, as in the case of the City of
1
Sources: „Wien spricht anders …auch im Internet“ (Vienna speaks a different language – on the
Internet too), MA 53- Press and Information Services for the City of Vienna.
Erlass „Internet und elektronische Kommunikation“ (decree “internet and electronic communication)
http://dvs.wienkav.at/md/client/dv_detail.asp?ID_DV=2345 (internal link)
Federal government regulation on government employees’ private utilisation of government
information and communications technology infrastructure (IKT-utilisation regulation – IKT-NV) in the version
of March 17, 2010 http://www.ris.bka.gv.at/
Civil Service 2.0l-1.0.0
3 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
Vienna amongst others, may contribute posts in external electronic discussion
forums, guest books or similar sites only in the course of their official duties, stating
their name and function.
Administration staff using their private Internet access to participate in a community must
also bear in mind that in their role as public service employees they act on behalf of the
Austrian administration:
•
Once a profile makes reference to an official agency that person’s activities are no
longer considered private.
•
No harm must be done to the official agency’s reputation.
Civil Service 2.0l-1.0.0
4 / 18
20/08/2012
WG: Civil Service/ Web 2.0
1.1
Web 2.0 Guidelines for Administration Staff
Web-2.0 Services – aspects of use
As mentioned in the introduction above activities on social platforms are subject to specific
ground rules. Users must take into account the role they are in when accessing the Internet.
The following diagram illustrates how public service employees using Web 2.0 platforms
I.
II.
III.
IV.
V.
Identify in different ways,
Publish private or official content,
Assume different roles and functions,
Use different platforms,
Log in at different times in different places.
The closer to the centre the relevant descriptions in any single category the more employees
need to realize their actions are no longer private but official.
Civil Service 2.0l-1.0.0
5 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
The following scenarios are intended as guidance only and do not provide a final
assessment, as the dimensions and levels do not allow for clear distinctions and also because
individual organisations have different legal frameworks and organisational cultures all of
which need to be taken into account for final assessment.
I. Identification
The environment “identification” defines how users want to be recognized by others in Web
2.0. There is a range of different ways to identify:
1. anonymous, i.e. without indication of identification whatsoever,
2. anonymous account, e.g. using a nickname,
3. personalised user, e.g. using a personal account stating one’s own name,
4. official user, linked to an official account and the relevant department.
II. Content
This defines the content made available by users in Web 2.0. Content may be anything from
purely private to fully official:
1. private content without official context, e.g. cooking recipes;
2. private content with official context, e.g. personal opinion on department’s decisions;
3. official content;
4. official content with binding character, e.g. created by an official agency’s bodies.
III. Role/Function
The third environment defines a user’s role and function in Web 2.0. Again there is a wide
range of functions from private to official:
1. private;
2. private in an organisation, e.g. as a member of an association;
3. as a person in official service, maintaining and updating “fan sites“ e.g. on Facebook;
4. in an official function, publishing binding content in that role.
IV. Platform
“Platform“ refers to the channel of access users choose for Web 2.0 services. It is important
to understand that published content may also be used as content by other platforms.
Multiple use of content is one of the Web’s distinguishing features, a fact which makes it
difficult to distinguish clearly between individual platforms. Content created by a person may
be spread on other Internet sites without that person knowing. This is true in particular for
social networks like Facebook or Xing where content may be passed on by “friends” despite
Civil Service 2.0l-1.0.0
6 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
restricted privacy settings. Status messages related to employers or superiors are frequently
cited as examples.
Platforms are accessed through:
1. private sites (private blogs, forums, blog commentaries …),
2. networks (e.g. Facebook, Twitter …),
3. business networks (e.g. LinkedIn, XING …),
4. official sites (e.g. Intranets, BKA-Wiki, “reference servers“ www.ref.gv.at, etc.)
V. Time and Place
This environment identifies where and when Web 2.0 services are used, distinguishing
between private and official IT equipment employed for the purpose. To better understand
Web 2.0 it is important to note that “time and place” in principle are irrelevant. The Internet
allows access any time any place. Public administration staff roughly speaking may choose
among the following constellations:
1. at home using private equipment,
2. at home using official equipment,
3. at place of employment in off duty time,
4. at place of employment in the service.
Some Internet sites save their users’ IP addresses which enables them to associate a person
with the department they are employed at. Members of staff using official equipment should
therefore be careful which websites they access, especially with regard to websites
prohibited under criminal law or websites otherwise unlawful due to their pornographic or
racist content. Sites obligating the employer to make payments or likely to contain malware
are also potentially risky.
The above environments occur in various patterns depending on the level of administration.
The scenarios listed below may be assessed in different ways by individual organisations.
Their aim is not to provide a final assessment but to show up the risks members of staff are
potentially exposed to.
2
Web 2.0 Scenarios
The environments described provide a basis for illustrating potential scenarios. Their purpose
is to show members of staff what they need to look out for when accessing Web 2.0 services
by raising their awareness and understanding of the subject matter.
Civil Service 2.0l-1.0.0
7 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
The lightening symbol in the diagrams was used to point out the critical levels in scenarios
III. and IV.
2.1
Scenario I: “private only“
Here is an example of entirely unproblematic private use: a person acting in private from
their home, using private equipment and a personal account to access a network, such as
eBay, and state their own opinion.
Civil Service 2.0l-1.0.0
8 / 18
20/08/2012
WG: Civil Service/ Web 2.0
2.2
Web 2.0 Guidelines for Administration Staff
Scenario II: “official only“
The following pattern illustrates unproblematic official use: a person acts in an official
function, at their place of employment in the service, using official equipment to access an
authority site, such as BKA-Wiki, for the purpose of working on a document with official
content.
Civil Service 2.0l-1.0.0
9 / 18
20/08/2012
WG: Civil Service/ Web 2.0
2.3
Web 2.0 Guidelines for Administration Staff
Scenario III: “private with official content“
The following scenario, because it involves social networks like Facebook or Xing, is a mix of
private and official spheres.
A member of IT staff in her private time, albeit in the office, with her personal user account
accesses a social network where she is linked with or friends with systems house XY
members of staff. The content is private (e.g. personal opinion of software products) yet has
official connotations (e.g. whether or not these products are also used in the workplace).
Several months previously the user had added systems house XY to her profile by clicking
the “like it“ function available on Facebook .
The scenario thus created, in particular the “like it“ function, may turn into a problem in
connection with a public tender which the relevant authority has launched and which
systems house XY has also joined as a bidder. Should systems house XY be awarded the
contract competitors might suspect a close relationship between the member of IT staff and
systems house XY.
Members of staff using Web 2.0 services must bear in mind that contents made available are
difficult to remove if at all.
The new networks, unlike traditional business contacts, highlight such contents and any
relevant communication. No precedents have been set so far.
Civil Service 2.0l-1.0.0
10 / 18
20/08/2012
WG: Civil Service/ Web 2.0
2.4
Web 2.0 Guidelines for Administration Staff
Scenario IV: “official publication without legitimisation“
The scenario described below should be avoided at all costs: in this case a member of staff is
using their official account in the service and in their place of employment to publish officially
binding contents in a business network without having been authorized to do so. This is
unacceptable by the general legal framework, including distribution of tasks, licences, or the
regulations and decrees pertaining to ICT. Problem areas existing independently of
communication media are only aggravated by ICT.
Clearly in this case a diagram alone would not provide sufficient assessment.
Civil Service 2.0l-1.0.0
11 / 18
20/08/2012
WG: Civil Service/ Web 2.0
3
Web 2.0 Guidelines for Administration Staff
Useful Hints for Using Web 2.0
As the previous chapter aptly describes activities in Web 2.0, in social media and in social
networks (Internet forums, mailing lists, Blogs, Vlogs, Podcasting, Wikis, Social Communities,
etc.) feature as “private” or “official” or somewhere in between, depending on role, function,
content, context, time, place and the equipment used. There are many different ways of
making content, such as texts, photographs, audio and video files available in the web. The
use of social networks like Facebook or Xing has virtually exploded in the past two years.
These changes in the use of Internet services are challenging administrations and
administration staff concerned with issues of use and with the difficulties of distinguishing
between private and official activities. The following hints are to provide a basis for private
and official use of social media and networks.
3.1
Web 2.0 for private use
Social media and networks permit companies, colleagues, customers and citizens in general
to exchange information on a wide scale. As a rule it is important that you draw a line
between Internet activities you perform as a private person and those of an official nature.
Below is a list of useful hints to bear in mind when you use social media as a private person:
1. Make a note of who has access to your social media and networks (Internet forums,
mailing lists, Weblogs, Podcasting, Vlogs, Wikis, Social Communities, etc.) and bear in
mind that electronic content is easily passed on to other platforms. Choose the
information you want to disclose and the language you avail yourself of accordingly.
Be mindful of your own reputation.
2. Design your postings as you see fit for the content. Make it clear, where necessary,
that you are posting your own personal views and thoughts only and that you are not
writing on behalf of your authority. This is particularly important when using business
networks (XING, LinkedIn, etc.).
3. Never use private blogs, Wikis, virtual worlds, social networks and others to discuss
content related to your authority or to communicate with work colleagues. Resort to
means of communication created for that purpose inside your authority.
4. Do not post differences of opinion with your work colleagues in public media.
5. Respect the privacy of others. Ask for permission if you want to publish other
people’s photographs or conversations. Never publish confidential information.
6. Respect copyrights, etc. When making a reference create a link to the source if you
can or use content explicitly permitted for use.
Civil Service 2.0l-1.0.0
12 / 18
20/08/2012
WG: Civil Service/ Web 2.0
3.2
Web 2.0 Guidelines for Administration Staff
Web 2.0 for official use
Listed below are a number of useful hints for using social media and networks in official
environments, including, amongst others, the guidelines “Wien spricht anders …auch im
Internet“ 2 prepared by the City of Vienna.
In any event attention must be paid to the relevant authority’s terms of use and to the
federal and provincial decrees regulating private and official Internet use as well as the use
of IT infrastructure.
As a public service employee you are vested with valuable professional competences you
draw on in the context of social media and networks to comprehensibly convey pertinent
information to the public.
Social media and networks also allow you to exchange information with colleagues and
establish useful contacts.
Before you venture forth into this communication realm we recommend you pay heed to the
following:
1. Participate in Internet activities only which your employer has granted permission for.
Make sure you only publish information within your sphere of competence or which
you are authorized to publish.
2. Remember to maintain official secrecy before creating or publishing information.
3. Use your brain and not your guts when creating your profile.
4. Never make your official profile too personal. Respect your own privacy and that of
others (who may be in your photographs, etc.). Do not disclose personal details
about yourself or your colleagues beyond what is absolutely necessary.
5. Using social media and networks is public relations work to some extent, which
means that you as a member of staff act as a “press office” for communicating your
department’s information.
6. Make sure you have understood the rules users must comply with for some Web 2.0
applications before getting started.
7. “Less is more“ – always consider your information’s usefulness before making it
public.
8. When posting comments always state your professional position and the department
you represent.
9. Make sure that any comments you make on behalf of your authority concerning that
authority’s activities are appropriate, politically correct and in keeping with your role
and function in that authority.
10. Bear in mind that postings on the Internet are permanently available and may be
copied by other media. Respect your privacy in your blogs etc.: once published they
will remain in the web for a long time. Be clear about how much personal detail you
want to disclose.
2
Sources: „Wien spricht anders …auch im Internet“ (Vienna communicates clearly and efficiently – on
the Internet too), MA 53 – Press and Information Services for the City of Vienna. These include recommendations
on optimising online communication.
Civil Service 2.0l-1.0.0
13 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
11. In consultation with the relevant authorities correct any inaccuracies or incorrect
information, hard facts such as spelling mistakes or closed-down departments, which
you come across in your work in Web 2.0.
12. Try to answer any questions users may have concerning your authority’s work or
published information within your sphere of competence.
13. When handling questions or discussions and where possible and practical make a
reference to your authority’s/authorities’ official information site/s.
14. Respect copyrights, etc. When making a reference create a link to the source if you
can or use content explicitly permitted for use.
15. Consider licensing the material you have processed through Creative Commons (CC) 3
to simplify further use and exchange. 4
16. Try to use content explicitly permitted for use, e.g. look out for CC licensed
photographs on Flickr 5; there is no guarantee, however, that the provider is also the
author.
17. Keep an eye on future developments, their technical aspects as well as their social
consequences. Maintain a healthy dose of scepticism – you don’t have to use each
and every technical innovation.
3
http://www.creativecommons.at/ (29.09.2010).
Source: “Social Media Guidance for Agencies and Staff – Guidance for staff using social media official
use” from the Commissioner for Public Sector Employment - Office for Ethical Standards and Professional
Integrity. Government of South Australia, Department of the Premier and Cabinet:
http://www.espi.sa.gov.au/socialmedia-guidelines.php?id=8 (29.09.2010).
5
http://www.flickr.com/ (30.09.2010).
4
Civil Service 2.0l-1.0.0
14 / 18
20/08/2012
WG: Civil Service/ Web 2.0
4
Web 2.0 Guidelines for Administration Staff
Glossary
Account (also user account) : “A user account grants authorization to access restricted IT
systems. To log in, a user is typically required to authenticate themselves with a user name
and password. Depending on the task user accounts may have various privileges, such as
access rights, attached to them“.
Source: http://en.wikipedia.org/wiki/User_account (10.02.2010)
Blog : (short for: Weblogs) These predecessors of “Web 2.0“ as a rule do not arrange texts
by hierarchy but consist of individual articles listed in reverse chronological order, the most
recent post always appearing first. As a further asset blogs allow for numerous ways of
connecting, either among individual blogs or with other websites. Many blogs function as
“diaries“; others provide commentary on a particular subject (hobbies, politics, technology,
philosophy, events, etc.).
Source: BLSG “Position Paper on E-Democracy and E-Participation in Austria“;
http://reference.e-government.gv.at/uploads/media/EDEM-1-0-0-20080525.pdf
(10.02.2010).
Cache: in computer engineering refers to a method for reducing the average time to access
data that has been previously requested. Caches are buffer memories designed to store (or
cache) duplicates temporarily. (…) Their purpose is to reduce access time and the number of
visits to the memory to be cached.
Source: http://de.wikipedia.org/wiki/Cache (04.10.2010)
Collaboration tools: a collaboration tool is something that helps users collaborate and
cooperate. The term is often used to mean “Collaborative Software“. Everything that helps to
solve a predefined task more easily in a group is an effective collaboration tool. Wiki is
among the most widely known.
Source: http://en.wikipedia.org/wiki/Collaboration_tool (19.03.2010).
Creative Com m ons is a movement of creators the world over. All creative works being
automatically protected it wants to motivate as many creators as possible to share their
works with others. Existing content is to be used more easily while providing a basis for new
content. The Creative Commons licensing system wants to assist authors and bloggers,
musicians and composers, filmmakers and camera people, photographers, designers and
graphic designers, teachers and students in managing rights of use intelligently and without
red tape.
Source: http://www.creativecommons.at/ (29.09.2010).
Term inal equipm ent: Terminal equipment in information technology (IT) and
telecommunications (TC) refers to equipment (e.g. PC, telephone or answering machine)
connected to the network termination of a public or private data or telecommunications
network. The connection may be a direct electrical/optical one, as with a plug-in connector,
or a radio connection, as with mobile telephones.
Source: http://de.wikipedia.org/wiki/Endger%C3%A4t (10.02.2010).
Good Practices: positive case studies; also known as “best method “ or “best practice“.
Source: http://de.wikipedia.org/wiki/Good_Practice (10.02.2010).
Civil Service 2.0l-1.0.0
15 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
IP address: is a label used in computer networks which, like the Internet, are based on an
Internet protocol. Labels are assigned to devices participating in the net, making them
addressable and accessible. IP addresses may refer to a single receiver or a larger receiver
population (Multicast, Broadcast). On the other hand, one computer may have several IP
addresses assigned to it. IP addresses are used to transport data packages from a sender to
a specified receiver. Similar to postal addresses on envelopes IP addresses on data packages
clearly identify the receiver. Yet unlike postal addresses IP addresses are not tied to a
particular location.
Source: http://de.wikipedia.org/wiki/IP-Adresse (10.02.2010).
Short m essages: there are different ways of sending short messages: Short Message
Service (SMS) is a method used on mobile telephones.
Source: http://de.wikipedia.org/wiki/Kurzmitteilung (10.02.2010).
M edia hype: Media hype refers to mostly short-lived news dramatised or exaggerated by
the media and used for the purpose of advertising specific ideas and products.
Source: http://de.wikipedia.org/wiki/Medienhype (10.02.2010).
M edia platform s: Flickr, YouTube, Vimeo, …
M icroblog: Microblogs allow users to exchange small elements of content similar to SMS
texts. The messages tend to be no more than 200 characters. Postings are either private or
publicly accessible and as with traditional blogging are listed in chronological order. To
create or subscribe to messages different channels may be used including SMS, e-mail,
instant messaging or the Web. Microvideoblogging is a more sophisticated form of
microblogging allowing users to record short videos (without sound) and post these on the
website. Status messages on the video application may be further expanded and published
on Facebook, Twitter and Co. Twitter is the most widely known microblogging service to
date.
Source: http://de.wikipedia.org/wiki/Microblog (10.02.2010).
Nicknam e: The terms user name and nickname (also nick) these days are understood to
refer to the name you are identified with on the Internet. As a rule it is short and intended
for long-term use.
Source: http://de.wikipedia.org/wiki/Nickname (10.02.2010).
Online services: Customers of commercial and non-profit online services are given the
option of dialling a computer network (either the services’ own network or an open one) to
access content in that network.
Source: http://de.wikipedia.org/wiki/Onlinedienst (10.02.2010).
Sm artphone: A smartphone is a mobile telephone equipped with a high-capacity processor.
Most smartphones are slim and their handling is similar to that of regular mobile phones.
Smartphones may be upgraded with additional programmes (so-called Apps) and functions
to suit the individual user’s purposes. Popular examples include Android smartphones by
HTC, the Apple iPhone or Samsung smartphones.
Source: http://de.wikipedia.org/wiki/Smartphone (04.10.2010).
Social netw orks: Social networks in informatics are online communities or web applications
hosting such communities. Networks including user-generated content are also referred to as
social media. Colloquially the term social networks is used to describe online communities
Civil Service 2.0l-1.0.0
16 / 18
20/08/2012
WG: Civil Service/ Web 2.0
Web 2.0 Guidelines for Administration Staff
hosted by Web-2.0 applications or portals. Facebook is a popular example of a social
network.
Source: http://de.wikipedia.org/wiki/Soziales_Netzwerk_(Internet) (10.02.2010).
W eb search engine: A web search engine is designed to search for documents stored on
a server or computer network such as the World Wide Web. When a user enters a query the
search engine provides a listing of references to potentially relevant documents, usually with
a short summary containing the document’s title and parts of the text. Different search
methods may be applied in the process.
Source: http://de.wikipedia.org/wiki/Suchmaschinen (10.02.2010).
Tw itter: is an online social networking service and publically accessible diary (microblog)
administrated and updated worldwide via website, mobile telephone, desktop applications,
widget or web browser plug-in. it enables registered users to send and read text-based posts
of up to 140 characters. The author of a post is pictured on the service’s website with an
Avatar and is fully accountable for its content (…) Twitter is thus a useful tool for exchanging
information, thoughts and experiences, as well as for communicating with others. Writing on
Twitter is referred to as “twittering”. Posts on Twitter are known as “tweets“ or “updates“.
Reposting a message from another user, e.g. to pass on urgent information more quickly,
requires the “retweet“ function. The social network revolves around the principle of following
other users’ messages. Authors are called “twitterers“, or, less frequently, “tweeps“, readers
following an author’s messages are “followers“. The tweets followed appear on the follower’s
main Twitter page in reverse chronological order. Senders can restrict message delivery to
just their group of friends or make them publicly visible.
Source: http://de.wikipedia.org/wiki/Twitter (10.02.2010).
W eb 2.0: is a generic term used to describe a series of new interactive web techniques and
services, the WWW in particular, based on a new understanding of the Internet. What is new
essentially is the fact that users are increasingly allowed to interact and collaborate as
creators of content, to (freely) recombine existing content and to avail themselves of “social
software“ – systems supporting the structuring and maintenance of social networks largely
through self-organisation.
Source: BLSG “Position paper on e-democracy and e-participation in Austria“;
http://reference.e-government.gv.at/uploads/media/EDEM-1-0-0-20080525.pdf
(10.02.2010).
Civil Service 2.0l-1.0.0
17 / 18
20/08/2012
WG: Civil Service/ Web 2.0
5
Web 2.0 Guidelines for Administration Staff
Diagram as a template for individual use
Civil Service 2.0l-1.0.0
18 / 18
20/08/2012