Assignment 2 Submissions

From Technologies and Politics of Control
Jump to navigation Jump to search

This assignment is due on February 22. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).

The upload file link is to the left, under toolbox. Once you've uploaded your file, please link to it following the format below:

  • Name:
  • Prospectus title:
  • Link to prospectus: (the file you uploaded)

If you have trouble finding the file you uploaded, check the list of uploaded files.

Comments

Everyone will receive an additional participation grade for this assignment. You should read through everyone's proposals after they are uploaded and add constructive comments below the proposal on which you're commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (Remember to sign your comments!)

Submissions







Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --VladimirK 20:03, 24 February 2011 (UTC)













  • Name:Vladimir Trojak--VladimirTrojak 20:01, 20 February 2011 (UTC)
  • Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf
  • Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --SCL 03:06, 22 February 2011 (UTC)











I noticed that there is a lot of crossover between our topics. We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here. Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is. They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous. In other words, Anonymous is a concept more than an identifiable specific group. I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published. It could simply be the rantings of teenager enamored with the publicity of their antics and activity. The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized. There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal. Good luck, and I look forward to watching your project develope! -----=:) Deinous 23:28, 23 February 2011 (UTC) for the #datalove

I found that some of your research objectives coincide with mine. I can assure you that people do use what is called "hacktivism" to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler's Army is not a secret nowadays because of the "hacktivism", although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in a wrong way is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the "uniformed criminals" employed as the federal agents. Check out the list of literature on my prospectus; http://www.911truth.org/ is one of the web sites. The U.S Government had no reason to deploy troops to anywhere at the cost of the taxpayers dollars. Do you think other citizens do not realize this? The do, but they join others in this giant lie and say that it is a war on terror, and they say this at law schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who is ready to risk their lives for the simple yet amazingly brave cause - to reveal the corrupted syndicate of greedy liars who oppresses people with tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you don not want to be involved in this type of project, I will totally understand. Best! --VladimirK 10:29, 25 February 2011 (UTC)