COMPUTER SCIENCE CAFÉ
  • WORKBOOKS
  • BLOCKY GAMES
  • GCSE
    • CAMBRIDGE GCSE
  • IB
  • A LEVEL
  • LEARN TO CODE
  • ROBOTICS ENGINEERING
  • MORE
    • CLASS PROJECTS
    • Classroom Discussions
    • Useful Links
    • SUBSCRIBE
    • ABOUT US
    • CONTACT US
    • PRIVACY POLICY
  • WORKBOOKS
  • BLOCKY GAMES
  • GCSE
    • CAMBRIDGE GCSE
  • IB
  • A LEVEL
  • LEARN TO CODE
  • ROBOTICS ENGINEERING
  • MORE
    • CLASS PROJECTS
    • Classroom Discussions
    • Useful Links
    • SUBSCRIBE
    • ABOUT US
    • CONTACT US
    • PRIVACY POLICY

WEB SCIENCE | THE EVOLVING WEB

Topics from the International Baccalaureate (IB) 2014 Computer Science Guide. 
ON THIS PAGE
KEY TERMINOLOGY
SECTION 1 | ONLINE INTERACTION
SECTION 2 | CLOUD COMPUTING AND CLIENT SIDE ARCHITECTURE
SECTION 3 | ORGANISASTIONAL CLOUD COMPUTING
SECTION 4 | COPYRIGHT AND INTELLECTUAL PROPERTY
SECTION 5 | PRIVACY, IDENTIFICATION AND AUTHENTICATION
SECTION 6 | PROTOCOLS AND STANDARDS
SECTION 7 | UNREGULATED MONOPOLIES
SECTION 8 | DECENTRALISED AND DEMOCRATIC WEB
ALSO IN THIS SECTION
CREATING THE WEB PART 1
CREATING THE WEB PART 2​
SEARCHING THE WEB
DISTRIBUTED APPROACHES TO THE WEB
THE EVOLVING WEB
ANALYSING THE WEB
THE INTELLIGENT WEB

​NETWORK COMPONENTS
XML AND XMLT
PHP PRINCIPLES
JAVASCRIPT PRINCIPLES

REVISION CARDS
ANSWERS

Picture
KEY TERMINOLOGY
  • Blockchain | A distributed database or ledger technology that maintains a continuously growing list of records, called blocks, which are linked and secured using cryptography.
  • Client-Server Architecture | A network architecture where a server hosts, delivers, and manages most of the resources and services, which are consumed by the client.
  • Cloud Computing | A technology that allows users to access and store data, and run applications over the internet, rather than on a physical computer or server.
  • Cyberbullying | The use of digital technology, particularly on social media platforms, to harass, threaten, or intimidate someone.
  • Data Encryption | The process of converting data or information into a code to prevent unauthorized access, ensuring data privacy and security.
  • Decentralised Web | An internet architecture where control and distribution of data are spread across a network of multiple, independent nodes, rather than being centralised.
  • Digital Divide | The gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
  • Edge Computing | A method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data.
  • HTTP/HTTPS | Protocols used for transmitting data over the web. HTTPS is the secure version of HTTP, where communications are encrypted.
  • Intellectual Property (IP) | Legal rights that result from intellectual activity in the industrial, scientific, literary, and artistic fields.
  • Online Oligarchies | A situation where a few companies or entities hold a dominant position in the online marketplace, exerting significant control and influence.
  • Peer-to-Peer Network | A network of computers configured to allow certain files and folders to be shared with everyone or with selected users.
  • Plagiarism |The practice of taking someone else's work or ideas and passing them off as one's own.
  • Privacy | The right of individuals or organizations to keep their information confidential and protected from unauthorized access.
  • Protocols | Sets of rules or standards that define how data is transmitted and received over a network.
  • User-Generated Content | Content created and shared by consumers or end-users, often found on social media platforms and blogs.
  • Web 2.0 | The second generation of the World Wide Web, characterised by greater user interactivity, collaboration, and the sharing of user-generated content.
SECTION 1 | ONLINE INTERACTION
​The advent of the internet has revolutionised the way we communicate, interact, and share information. With the emergence of Web 2.0, a term coined in 2004, the internet transformed from a collection of static web pages to a dynamic and interactive experience. This section explores how the web has supported new methods of online interaction, particularly through social networking, and discusses the issues arising from the growth of these new internet technologies.

Social networking sites like Facebook, Twitter, Instagram, and LinkedIn have become integral to our daily lives. These platforms allow users to:
  • Connect | Users can maintain existing relationships and form new ones, regardless of geographical barriers.
  • Share | From personal experiences to news, social networking enables a rapid exchange of information.
  • Collaborate | These platforms facilitate collaboration for both personal and professional purposes.
  • Entertain | Social media is a significant source of entertainment, including games, videos, and other interactive content.

Web 2.0 technologies have been pivotal in shaping online interactions:
  • User-Generated Content | Users are not just consumers but also creators of content. Blogs, vlogs, and podcasts are some examples.
  • Interactivity | Enhanced interactivity allows users to comment, like, share, and react to content, fostering community engagement.
  • Customization | Algorithms tailor content to individual preferences, enhancing user experience but also creating filter bubbles.
  • Real-Time Communication | Instant messaging and live streaming have enabled real-time interaction across the globe.

As much as Web 2.0 has enhanced online interaction, it has also brought several issues:
  • Privacy Concerns | The vast amount of personal data on social networks raises concerns about data protection and privacy.
  • Misinformation | The ease of content creation and sharing can lead to the rapid spread of misinformation and fake news.
  • Cyberbullying | Social media platforms can be breeding grounds for harassment and cyberbullying.
  • Digital Divide | While many benefit from these technologies, there remains a significant portion of the global population without access to the internet.

The evolution of online interaction involves various stakeholders:
  • Users | The primary drivers of content creation and consumption, their needs and behaviours shape the direction of social networking services.
  • Developers and Companies | They innovate and maintain the platforms, balancing profit with user satisfaction and safety.
  • Governments and Regulatory Bodies | They are responsible for legislating and regulating to protect users and ensure fair practices.
  • Activists and NGOs | These groups advocate for digital rights, privacy, and equitable access.

The web, particularly through the lens of Web 2.0, has significantly transformed how we interact online. Social networking sites have become ubiquitous, offering new ways to connect, share, and collaborate. However, this evolution brings challenges that require active engagement from all stakeholders to ensure a safe, fair, and inclusive digital environment.
SECTION 2 | CLOUD COMPUTING AND CLIENT SIDE ARCHITECTURE
In the realm of information technology and web services, understanding the differences between cloud computing and client-server architecture is crucial. This section aims to elucidate these differences, providing a clear understanding of both concepts and how they are distinct from each other.

What is Cloud Computing?
Cloud computing is a technology that allows users to access and store data, and run applications over the internet instead of on a physical computer or server. Key characteristics include:
  • On-Demand Self-Service | Users can access computing resources like servers and storage without human intervention from the service provider.
  • Broad Network Access | Services are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
  • Resource Pooling | The provider’s computing resources are pooled to serve multiple consumers, with different physical and virtual resources dynamically assigned and reassigned according to demand.
  • Rapid Elasticity | Capabilities can be elastically provisioned and released to scale rapidly outward and inward commensurate with demand.
  • Measured Service | Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).

What is Client-Server Architecture?
Client-server architecture is a computing model in which the server hosts, delivers, and manages most of the resources and services to be consumed by the client. This model can be used in both local and wide area networks. Key aspects include:
  • Centralized Resources | The server typically hosts software and data, centralizing most of the computing power and control.
  • Network Communication | Clients communicate with the server over a network to request services or access data.
  • Role Specialisation | The server and client have distinct roles, with the server managing resources and the client providing the user interface.

Differences Between Cloud Computing and Client-Server Architecture
  • Resource Location and Management | In client-server, resources are hosted on specific servers and managed centrally. In cloud computing, resources are spread across multiple servers in different locations and managed collectively.
  • Scalability | Cloud computing offers greater scalability as resources can be quickly adjusted to meet demand, whereas scaling in a client-server architecture requires significant changes to the existing infrastructure.
  • Cost and Investment |Cloud computing typically operates on a pay-as-you-go model, reducing the need for large upfront investments in infrastructure. Client-server setups often require substantial initial investment in hardware and software.
  • Maintenance and Upgrades | In cloud computing, the service provider manages maintenance and upgrades, reducing the burden on the user. In client-server systems, the organization using the system is responsible for its maintenance and upgrades.
  • Accessibility | Cloud services can be accessed from anywhere via the internet, offering greater flexibility compared to the more location-dependent client-server architecture.
  • Control | Client-server architecture offers organizations more control over their data and resources, while cloud computing involves handing over some control to the service provider.

Understanding the differences between cloud computing and client-server architecture is essential for making informed decisions about IT infrastructure and services. While cloud computing offers scalability, cost-effectiveness, and ease of access, client-server architecture provides more control and can be more suitable for organizations with specific compliance or security requirements.
SECTION 3 | ORGANISASTIONAL CLOUD COMPUTING
Cloud computing has become a cornerstone in the digital transformation of many organizations. This section delves into the effects of cloud computing on specified organisations, considering both public and private cloud models, and addresses the potential conflicts with privacy.

Public vs. Private Clouds
Before discussing the impacts, it's essential to differentiate between public and private clouds:
  • Public Clouds are services offered by third-party providers over the internet, making them available to anyone who wants to use or purchase them. They are shared resources, typically offering scalability and flexibility at a lower cost.
  • Private Clouds are exclusively used by a single organization. They can be hosted internally or externally and offer more control and customization of resources. They are often chosen for their enhanced security and privacy.

Effects of Cloud Computing on Organizations
Cost Efficiency and Scalability
  • Public Cloud | Offers a pay-as-you-go model, reducing the need for large capital expenditures. Ideal for businesses with fluctuating demands.
  • Private Cloud | Requires upfront investment but can be cost-effective for organizations with predictable, high-volume requirements.

Flexibility and Innovation
  • Public Cloud | Enables organizations to quickly access new technologies and scale resources up or down as needed, fostering innovation.
  • Private Cloud | Offers tailored solutions that can be optimized for specific business needs, though it may not provide the same breadth of options as public clouds.

Data Security and Compliance
  • Public Cloud | While reputable providers implement robust security measures, sharing resources with other organizations can pose risks. Compliance with industry regulations can be a concern.
  • Private Cloud | Offers more control over security protocols, making it easier to comply with strict data protection regulations.

Reliability and Performance
  • Public Cloud | High reliability due to redundant infrastructure. However, performance can be impacted by other users' activities.
  • Private Cloud | Can be configured for optimal performance for specific tasks, though it may lack the redundancy of public options.

Cloud Computing and Privacy Concerns
The use of cloud computing, especially public clouds, can lead to privacy concerns:
  • Data Control | Storing sensitive data off-site in a public cloud can lead to fears about unauthorized access and data breaches.
  • Compliance Issues | Organizations must ensure that their cloud usage complies with all relevant data protection laws, which can vary by region.
  • Vendor Trust | Relying on third parties for cloud services requires trust in their ability to protect data and maintain privacy.
  • Mitigating Privacy Risks
  • Risk Assessment |Conduct thorough assessments to understand the privacy implications of cloud services.
  • Choose Providers Wisely | Select providers with strong security credentials and clear data management policies.
  • Data Encryption | Encrypt sensitive data both in transit and at rest.
  • Regular Audits | Regularly review and audit cloud services to ensure compliance and address new security challenges.

The adoption of cloud computing has significantly impacted organisations, offering benefits like cost savings, scalability, and access to advanced technologies. However, it also presents challenges, particularly in terms of privacy and data security. By carefully considering the type of cloud services and implementing robust security measures, organisations can leverage the benefits of cloud computing while mitigating its risks.
SECTION 4 | COPYRIGHT AND INTELLECTUAL PROPERTY
In the digital age, the management of copyright and intellectual property (IP) on the web is a critical issue. This section explores how these rights are protected and managed online, with a focus on tools and platforms like TurnItIn and Creative Commons that aid in this process.

Understanding Copyright and Intellectual Property
  • Copyright | A legal term used to describe the rights that creators have over their literary and artistic works. It includes a range of rights, like reproduction, distribution, and adaptation of the work.
  • Intellectual Property | Encompasses a variety of rights associated with creations of the mind, including patents, trademarks, and copyrights.

Challenges of Copyright and IP Management Online
  • Easy Duplication and Distribution | Digital technologies make it easy to copy and distribute content without permission.
  • Global Nature of the Internet | Different countries have different IP laws, complicating enforcement.
  • User-Generated Content |The vast amount of content created and shared by users on social media and other platforms makes monitoring and enforcement challenging.

Tools you may know for Managing Copyright and IP
TurnItIn
  • Purpose | Primarily used in academic settings, TurnItIn is a tool that checks for plagiarism in written work.
  • Functionality | It compares submitted content against a vast database of academic works, websites, and other resources to identify potential plagiarism.
  • Benefits | Helps maintain academic integrity and teaches students about the importance of original work and proper citation.

Creative Commons
  • Purpose | Creative Commons is a nonprofit organization that provides free legal tools to help creators manage their intellectual property.
  • Licenses | Offers a range of licenses that enable creators to specify the terms under which their work can be used by others.
  • Benefits | Facilitates the legal sharing and use of creative works, promoting collaboration and innovation.

Good Practices for Managing Copyright and IP Online
  • Educate Yourself and Others | Understanding copyright and IP laws is crucial for creators, educators, and businesses.
  • Use Copyright Management Tools | Tools like TurnItIn and Creative Commons licenses can help manage and protect IP.
  • Respect IP Rights | Always seek permission where required and give credit to original creators.
  • Stay Informed About Legal Changes | IP laws can evolve, so staying informed is essential for effective management.

The management of copyright and intellectual property on the web is complex but essential for protecting the rights of creators and fostering a healthy digital ecosystem. By utilizing tools like TurnItIn and Creative Commons and adhering to best practices, individuals and organizations can navigate these challenges effectively.
SECTION 5 | PRIVACY, IDENTIFICATION AND AUTHENTICATION
In the digital age, the concepts of privacy, identification, and authentication are deeply intertwined. This section aims to describe their interrelationship and significance in ensuring secure and private online interactions.

PRIVACY
Refers to the right of individuals or organizations to keep their information confidential. In the digital context, it concerns the protection of personal data shared online.

IDENTIFICATION
The process of recognising a user's identity. This could be through a username, email address, or any unique identifier.

AUTHENTICATION
The process of verifying that a user is who they claim to be. This often involves credentials like passwords, biometric data, or security tokens.

The relationship between privacy, identification, and authentication is fundamental in the digital world. Balancing these elements is crucial for protecting user data and maintaining trust in digital platforms.

Privacy and Identification
  • Data Collection | Identification processes often require collecting personal data, raising privacy concerns about how this data is stored, used, and shared.
  • Anonymity vs. Accountability | While anonymity can protect privacy, identification is necessary for accountability in many online interactions, such as financial transactions or social media usage.

Privacy and Authentication
  • Protecting Data | Strong authentication methods are crucial for protecting users' privacy. They ensure that only authorized individuals can access sensitive personal data.
  • Authentication Data | The data used for authentication (like biometric data) is itself highly sensitive and needs to be protected to maintain privacy.

Identification and Authentication
  • Sequential Relationship | Identification precedes authentication. Once a user is identified (e.g., via a username), the authentication process verifies that identity.
  • Dependence | Effective authentication relies on accurate identification. Incorrect identification can lead to unauthorized access, compromising security and privacy.

Balancing the Triad
  • Minimising Data Collection | Collect only essential identification data to reduce privacy risks.
  • Implementing Robust Authentication | Use strong, multi-factor authentication methods to protect user identities and data.
  • Transparent Policies | Clearly communicate how identification data is used and protected.
  • Regular Updates and Audits | Regularly update security protocols and conduct audits to ensure the effectiveness of privacy and authentication measures.

Challenges in the Digital Landscape
  • Evolving Threats | As technology advances, so do the methods used to compromise privacy and security.
  • User Convenience vs. Security | Stronger authentication methods can sometimes be less convenient, leading to resistance from users.
  • Regulatory Compliance | Organizations must navigate complex and varying privacy laws across different regions.

Understanding their interplay helps in developing more secure, privacy-conscious systems and policies.
SECTION 6 | PROTOCOLS AND STANDARDS
The future development of the web is intrinsically linked to the evolution of network architecture, protocols, and standards. This section explores how these elements will shape the web's future and the importance of adapting the rules and structures that support it.
  • Network Architecture | The Backbone of the Web
  • Current State | The web operates on a complex network architecture comprising various elements like routers, servers, and data centers interconnected globally.

Future Trends
  • Decentralisation | Moving away from centralized data centers to a more distributed network, reducing latency and improving data security.
  • Edge Computing | Processing data closer to where it is generated for faster, more efficient computing.
  • Integration of Advanced Technologies | Incorporating AI and machine learning for smarter network management and predictive analytics.
  • Protocols | The Rules that Govern the Web
  • Current Protocols | Protocols like HTTP/HTTPS, TCP/IP, and DNS are fundamental for data transfer and communication on the web.

Evolving Needs
  • Enhanced Security | As cyber threats evolve, developing more secure protocols becomes imperative.
  • Support for New Technologies | Protocols must evolve to support emerging technologies like IoT, blockchain, and 5G.
  • Standards | Ensuring Uniformity and Compatibility
  • Role of Standards| Standards ensure that different devices and applications can communicate and work together seamlessly.

Future Challenges
  • Interoperability | With a growing range of devices and applications, maintaining interoperability is crucial.
  • Adaptability | Standards must be flexible enough to adapt to new technologies and user needs.

The Interplay of Architecture, Protocols, and Standards in Web Development
  • Co-evolution | These elements must evolve together to support the growing and changing demands of users and technologies.
  • User-Centric Design | Future developments should focus on enhancing user experience, accessibility, and privacy.

The Impact on Rules and Structures
  • Regulatory Implications | As the web evolves, so must the regulations governing data protection, privacy, and cybersecurity.
  • Ethical Considerations | Issues like digital divide, data ownership, and user rights need ongoing attention.
  • Global Collaboration | Developing global standards and protocols requires collaboration across countries and cultures.

Preparing for the Future
  • Education and Training | Keeping up with technological advancements through continuous learning.
  • Innovation and Research | Encouraging innovation in network architecture, protocols, and standards.
  • Policy Development | Shaping policies that support ethical, secure, and innovative web development.

The future development of the web, driven by advancements in network architecture, protocols, and standards, will significantly influence the rules and structures that support it. Understanding and preparing for these changes is crucial for all stakeholders involved in the digital ecosystem.
SECTION 7 | UNREGULATED MONOPOLIES
The web has been a catalyst for immense growth and innovation, but it has also facilitated the rise of unregulated monopolies and multinational online oligarchies. This section explores why this phenomenon is occurring and its implications.

The Nature of Web-Based Monopolies
  • Low Entry Barriers, High Growth Potential | The internet allows businesses to scale rapidly with relatively low initial costs compared to traditional industries. This can lead to a few dominant players quickly monopolizing the market.
  • Network Effects | Many web services become more valuable as more people use them (e.g., social media platforms), creating a natural tendency towards monopolies.
  • Data Control | Large web companies accumulate vast amounts of data, giving them significant competitive advantages and further entrenching their monopoly status.

An "online oligarchy" refers to a situation in the digital or online marketplace where a small number of companies or entities hold a dominant position, exerting significant control and influence over the market. This term combines "oligarchy," which traditionally means rule by a few, with the online context of the internet and digital markets. 

The Rise of Multinational Online Oligarchies
  • Global Reach | The web enables companies to operate and dominate on a global scale, leading to the formation of multinational online oligarchies.
  • Market Control | These entities often have significant control over entire market segments, influencing everything from pricing to innovation and consumer choice.
  • Regulatory Challenges | Their multinational nature makes regulation challenging, as they often operate across jurisdictions with varying laws and standards.

Implications of Unregulated Monopolies
  • Reduced Competition | Monopolies can stifle competition, leading to less innovation, higher prices, and reduced consumer choice.
  • Privacy Concerns | Dominant web companies often control vast amounts of personal data, raising significant privacy concerns.
  • Economic Disparities | The concentration of wealth and power in a few corporations can exacerbate economic inequalities.
  • Influence on Democracy | These entities can have a disproportionate influence on public opinion and politics, raising concerns about democratic processes.

Addressing the Challenges
  • Regulatory Frameworks | Developing new and adapting existing regulations to better address the unique challenges posed by digital monopolies.
  • Promoting Competition | Encouraging competition through antitrust laws and policies that prevent market dominance.
  • International Cooperation | Since these are multinational entities, addressing them requires cooperation between different countries and regulatory bodies.
  • Public Awareness | Educating the public about the implications of monopolies and the importance of supporting diverse market players.

The web's capacity to foster rapid growth and global reach has led to the emergence of unregulated monopolies and multinational online oligarchies. Addressing this issue requires a multifaceted approach, including regulatory reform, international cooperation, and public engagement, to ensure a balanced, competitive, and fair digital marketplace.
SECTION 8 | DECENTRALISED AND DEMOCRATIC WEB
The concept of a decentralised and democratic web represents a significant shift from the traditional, centralized model of the internet. This section discusses the effects of such a web, focusing on how it changes user behaviours and diminishes international boundaries.

Understanding Decentralisation
  • Decentralisation Defined | In a decentralised web, control and ownership are distributed among its users rather than being concentrated in the hands of a few entities. This approach relies on technologies like blockchain and peer-to-peer networks.
  • Democratic Nature | A decentralised web promotes democratic principles by giving users more control over their data, privacy, and the content they access and create.

Impact on User Behaviour
  • Empowerment | Users gain more control and ownership of their data, leading to a greater sense of empowerment and responsibility.
  • Privacy Awareness | As users become more involved in managing their data, awareness and concern for privacy issues increase.
  • Collaborative Content Creation | Decentralisation fosters a more collaborative environment for content creation and sharing, as it reduces the reliance on central authorities.

Diminishing International Boundaries
  • Global Accessibility | A decentralized web can be more resilient and accessible globally, as it does not rely on centralised servers that may be subject to regional restrictions.
  • Cross-Border Collaboration | Enhanced global access facilitates cross-border collaborations and interactions, further diminishing the impact of geographical boundaries.
  • Cultural Exchange | Easier access and fewer restrictions lead to a richer cultural exchange, as content is not limited by national boundaries.

Challenges and Considerations
  • Regulatory Compliance | Decentralisation complicates regulatory enforcement, as the distributed nature of the web transcends traditional jurisdictional boundaries.
  • Security Concerns | While decentralisation can enhance privacy, it also raises new security challenges, as the distributed network must be protected against various threats.
  • Digital Divide | There is a risk that the benefits of a decentralised web might not be evenly distributed, potentially widening the digital divide.

The Future of a Decentralised Web
  • Innovation in Technology | Ongoing advancements in blockchain, peer-to-peer technologies, and encryption are crucial for the development of a decentralized web.
  • User Education | Educating users about the benefits and responsibilities of participating in a decentralised web is essential for its widespread adoption.
  • Balancing Decentralisation and Governance | Finding the right balance between maintaining a decentralised structure and ensuring effective governance and standards is key to the web's future success.
​
A decentralised web refers to a model of internet architecture where the control and distribution of data and resources are spread across a network of multiple, independent nodes rather than being centralised in the hands of a few large entities. This approach contrasts with the traditional centralised web, where servers and data centers owned by specific companies or organisations hold significant control over data storage, access, and management. In a decentralised web, technologies like blockchain and peer-to-peer networks enable direct interaction and data exchange among users, enhancing user autonomy, privacy, and resilience against censorship or server failures. This model promotes a more democratic and user-empowered internet, where individuals have greater control over their data and digital interactions.

The move towards a decentralised and democratic web has the potential to significantly alter the digital landscape. By empowering users, diminishing international boundaries, and fostering global collaboration, this new web model promises a more inclusive and equitable digital future. However, addressing the accompanying challenges is crucial to fully realize its potential.
Picture
SUGGESTIONS
We would love to hear from you
SUBSCRIBE 
To enjoy more benefits
We hope you find this site useful. If you notice any errors or would like to contribute material then please contact us.