<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2011/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=FMRR</id>
	<title>Technologies and Politics of Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2011/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=FMRR"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/Special:Contributions/FMRR"/>
	<updated>2026-04-06T12:40:25Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Final_Projects&amp;diff=6818</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Final_Projects&amp;diff=6818"/>
		<updated>2011-05-10T19:48:10Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
* Name: Mary Van Gils&lt;br /&gt;
* Title: Yelp Reviews: Freedom of Speech v. Reputational Injuries&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Yelp_Reviews_Freedom_of_Speech_v_Reputational_Injuries.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Faye Ryding&lt;br /&gt;
* Title: Trolls and Vandals on Epinions and Yelp&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle C Forelle - [[User:Mcforelle|Mcforelle]] 19:18, 10 May 2011 (UTC)&lt;br /&gt;
* Title: Viva La Vimeo!: How Vimeo&#039;s Unique Architecture Fostered a Unique Videomaking Community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:VimeoMCForelle_final.doc&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Assignment_4_Submissions&amp;diff=6553</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Assignment_4_Submissions&amp;diff=6553"/>
		<updated>2011-04-12T22:35:17Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AV.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://www.youtube.com/watch?v=w0q8Gudh0T8}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|Extra Credit Assignment|[http://www.youtube.com/watch?v=dipXpay4_mI]}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_4.doc&amp;diff=6552</id>
		<title>File:Faye Ryding Assignment 4.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_4.doc&amp;diff=6552"/>
		<updated>2011-04-12T22:32:39Z</updated>

		<summary type="html">&lt;p&gt;FMRR: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Assignment_3_Submissions&amp;diff=6303</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Assignment_3_Submissions&amp;diff=6303"/>
		<updated>2011-03-22T18:47:53Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline:&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|yourname|assignment description|link to assignment document}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
{{AssignmentInfo|Susan Jennings|Annuity Companies&#039; Social Media Communities(Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:_Outline_of_annuity_social_media.doc‎}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kristina Meshkova&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alokika Singh|Feminist Movement in India and the Internet (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:MARCH_22_singh.singh.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Lorena Abuín|Media role in the contribution to prosecuted online activities (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Assignment_3_-_Lorena_Abu%C3%ADn.pdf}}&lt;br /&gt;
&lt;br /&gt;
Jillian York&lt;br /&gt;
{{AssignmentInfo|Jillian C. York|Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
Faye Ryding&lt;br /&gt;
{{AssignmentInfo|Faye Ryding|What are the explicit and implicit policies for dealing with trolls and vandals on epinions.com?| http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_3.pdf}}&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_3.pdf&amp;diff=6295</id>
		<title>File:Faye Ryding Assignment 3.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_3.pdf&amp;diff=6295"/>
		<updated>2011-03-22T17:02:50Z</updated>

		<summary type="html">&lt;p&gt;FMRR: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Collective_Action_and_Decision-making&amp;diff=5876</id>
		<title>Collective Action and Decision-making</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Collective_Action_and_Decision-making&amp;diff=5876"/>
		<updated>2011-02-24T16:02:25Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Mass collaboration and the aggregation of information enable potentially profound changes in business and politics. In this class, we will compare and contrast the transformations in economic life and collective decision-making processes brought on the information revolution.  The discussions will also explore the role of open information systems on business and the scope for greater transparency and participation in government, politics and public life.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_2:_Prospectus|Assignment 2]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* James Surowiecki, [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html Wisdom of Crowds (excerpt)]&lt;br /&gt;
**[http://www.nytimes.com/2004/05/22/books/review/0523books-mclemee.html?ex=1400644800&amp;amp;en=43bc95eb638bfed2&amp;amp;ei=5007&amp;amp;partner=USERLAND NYT Review]&lt;br /&gt;
&lt;br /&gt;
* [http://ethanzuckerman.com/blog/?p=1125 Ethan Zuckerman&#039;s blog review of Infotopia] Great summary of the issues in the book.&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Federalist_Papers Federalist Papers] published under the pseudonym Publius.&lt;br /&gt;
* [http://www.blogpulse.com/papers/2005/AdamicGlanceBlogWWW.pdf Divided They Blog] - a paper showing trackbacks between political blogs, mentioned by Ethan Zuckerman in his review of Cass Sunstein&#039;s Infotopia&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
This week’s readings prove that groupthink is a powerful but not infallible force.  Surowiecki tells us that the average of group answers always outperforms individuals over time.  (He uses the example of how the audience of Who Wants to be a Millionaire was right 91% of the time when polled.)  Zuckerman, citing the Condorcet Jury Theorem, retorts that the case is true only if the individuals in the group tend to be right more often than not.  (Otherwise the group answer would probably be wrong 91% of the time.)  Collective decision making works only when each individual is more likely than not to make the correct decision on her own.&lt;br /&gt;
We expect an informed individual is better equipped to make a correct decision than an ignorant one, so where do we get our information?  The distinction between the Federalist Papers and the political blogosphere is telling.  While today’s political pundits advocate for their positions with at least the same fervor (if not eloquence) as Hamilton, Madison and Jay, their audiences receive messages differently.  In the 1700’s newspapers printed federalist and anti-federalist letters alongside each other while their readers evaluated both sides of the question.  Today’s blog readers select their feeds which likely matches their predispositions.  The “information cocoon” is real. [[User:ChrisSura|-Chris Sura]] 22:27, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the readings to highlight the differences that have become so polarizing in our society.  Is this because the &amp;quot;crowdsourcing&amp;quot; attitude is working against strategic thought and boosting mob mentality instead?  Maybe, to Yu Ri&#039;s point, people are being more closed in their beliefs because there is just too much information and we are on overload.  Humans in their natural way will always regroup and go to where the comfort level is....my hope is that a middle ground is found so that true intelligent discourse may again be as prevalent as it was when a man got on a soapbox in a town square one hundred years ago.  [[User:Camcloughlin|Camcloughlin]] 21:40, 22 February 2011 (UTC)  camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have praised the emergence of personalized media, so-called &amp;quot;The Daily Me,&amp;quot; as the contribution to efficiency in information gathering and classifying. Thus, it was an perplexing confrontation of reading Sustein&#039;s assertion on information cocoon dwellers. It is true that people like to hear and see what they want to hear and see and that principle applies to the online activities to some degree. While I was pondering on this notion, a certain idea came up to me: now there is this platform for diversity to spread its wings, but aren&#039;t people being more obstinate about their beliefs and tenets? It is just that I could hardly find the interchanges between liberals and conservatives in the Internet forums, except those with acrid animosity. --[[User:Yu Ri|Yu Ri]] 01:44, 22 February 2011 (UTC)   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think that the posted below concern about the purpose and structure is fair enough to draw our attention to the meaning of the curriculum; the meaning that makes a difference between well-informed person and well-educated person. No objections, of course, to the administrators of this course, they did marvelous research on relevant literature, but as some of us began noticing, the material does not follow logically to build up a skill. I know that in some countries people are spending many years to learn how to properly relate material to students, not simply make them memorize everything. In order to guess on our own what pedagogy might have been behind this giant sheer volume, we must align the material in order so that each concept will serve as a preamble for the next one, and all key terms then will be logically connected to the main scheme. It seems that after sorting out all major concepts from the minor key terms, we are aiming to arrive at the issue of ideological, society based, differences within one giant infrastructure called the internet. After examining most ideologically conflicting dimensions, we must derive a method that will keep catalytic reactions between those most extreme ideologies under control. This method, I assume, should include political, policy-based, and technological instruments. In order to build these instruments we must rely on our predecessors whose remarkable writings we have at our disposal. As some of you have already noticed that some of the writings are of a high caliber and some are of a low and average; nevertheless, they do contribute substance to the sphere of the course. It is therefore crucial to distinguish a high caliber conceptual pieces of writing from the low or mediocre type of writings. Then, we should align them in the right sequence so that we can apply our reasoning, not only memory. I guess this is as far as I should go because as we know, some of the writers are working at the Berkman Center - the host of the course. It will be unethical from my side to point out on the perplexity they may create. &lt;br /&gt;
&lt;br /&gt;
Perhaps for those who has enough imagination, imagine that after all readings that we read so far, we are exposed only to several stones on a giant planet in the giant universe with many other planets connected to it. There are terabytes of books on the net. There is so much to read about and discover. Take the DARPA internet archive alone [http://www.darpa.mil/internetbibliography.html] or the internet society resources [http://www.isoc.org/internet/history/cerf.shtml] and they will extrapolate our horizons even farther. If we will search the archives of other countries, we would have not enough lifetime to read everything that is equally worth reading as our class material. It is important however, to have a wise conventional opinion not only about the modern concepts, but also about classic definitions, and Wisdom of Crowds by Surowiecki is an excellent emitter of the &amp;quot;old school&amp;quot; discoveries. His book &#039;&#039;Wisdom of Crowds&#039;&#039; so as &#039;&#039;Wealth of the Networks&#039;&#039; is built on the original concepts he interprets. In the book &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; the Scottish journalist Charles Mackay writes about the first conglomerates of people, not connected with internet, but infatuated by the same idea of rapid enrichment through the stock market. In the first hundred pages author describes the most devastating financial bubbles and schemes instigated by John Law, the son of the banker and a creative financier, who in his &#039;&#039;Proposals and Reasons for Constituting a Council of Trade&#039;&#039;, which he presented to the British Parliament, proposed to issue a loan-for-shares based instrument which has failed a number of times and at several countries due to the rapid and large demand for one type of shares issued for sale. If we think of a stock buyers as of the web sight users, we can understand better the concept of the collective action and decision making process. Surowiecki, of course, makes an excellent example of the bias in the herd instinct when he describes the authority bias in the decision by investigative group of the shuttle&#039;s catastrophe and in the coordination of other groups of people driven by the common goal. I am confident that the experts opinion and the seer-sucker theory is in value when the majority is trying to think. It is exactly what people are trying to do in this course: people are trying to find a cognizable way to comprehend the material by cooperating and coordinating within the group. Nevertheless, I personally believe that &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; is by default the strongest platform to base our understanding both of the concepts of the internet and of the digital economics of the society.  --[[User:VladimirK|VladimirK]] 01:30, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Link to article in today&#039;s NY Times regarding Egypt&#039;s shut down during the revolution of internet within its borders:&lt;br /&gt;
http://www.nytimes.com/2011/02/16/technology/16internet.html?pagewanted=1&amp;amp;_r=2&amp;amp;hp&lt;br /&gt;
&amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 15:53, 16 February 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In reading the Surowiecki excerpt and the summary on Zuckerman&#039;s Infotopia I think it is apparent that they are discussing apples and oranges.  Surowiecki is concentrating on the crowd&#039;s ability to accurately determine a correct answer to a specific question governed by a certain criteria (e.g. how many beans in this jar or which one of these four possible answers is correct).  Zuckerman, on the other hand, is looking at the human behavior and ideology aspect which has no defined criteria or &amp;quot;right&amp;quot; answer.  When asking the crowd what their opinion is regarding a particular issue the answers will undoubtedly depend on the individual&#039;s personal beliefs and past experiences which vary greatly from person to person.  If the ideological question is framed in such a way that there is a limited selection of answers, such as in polling, the individuals will gravitate towards the answer which most fits their personal belief.  While this will allow for an analysis of what the &amp;quot;majority&amp;quot; of the crowd prefers it does not necessarily mean that majority is correct.  Once the human condition is allowed to enter the equation the ability to determine what is correct vs. what is preferred is gone.&lt;br /&gt;
--[[User:Rakundig|Rakundig]] 10:37, 17 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Dear&#039;&#039;&#039; Fellow Internet and Society Classmates:&lt;br /&gt;
&lt;br /&gt;
I am writing with a proposal.  February 22 will be our forth meeting as a class which marks the milestone that  we are more than one quarter of the way through the material we will study during the semester. During the last several classes we have studied examples of commons based production including Wikipedia and we are using a wiki based tool for asynchronous class discussions. Not to take anything away from the quality of the content of those contributions, one thing that has been missing is a structure and purpose.&lt;br /&gt;
 &lt;br /&gt;
My proposal is that starting this week we begin to put into practice some of the things that we have learned to date. That is, below I have constructed a set of notes on what I have taken away from the class. I invite you in the spirit of Wikipedia to edit, comment upon, contribute to and in other ways improve what I have written in a collaborative search for a common understanding of the materials presented in this course. If you are so inclined, I ask you to follow a small set of basic tenets that are described on the [http://cyber.law.harvard.edu/is2011/edit/Talk:Collective_Action_and_Decision-making Discussion page].&lt;br /&gt;
  &lt;br /&gt;
I hope that you will join me in this project. I believe a commons based approach to summarize what we have learned so far will benefit us all in translating the great information Rob and David have introduced to us. No two of us have walked away from any class discussion nor reading, nor listening, nor viewing with the exact same perception of what has been discussed. Below presents a opportunity for us all, those who gather in Cambridge and those who participate at a distance, to come to a closer mutual understanding. &lt;br /&gt;
&lt;br /&gt;
Join me below to flesh out what I have begun. Add references that I have missed, correct statements that are in accurate, add your unique insight so that we can all come to a better common understanding. &lt;br /&gt;
Thank you in advance for your willingness to participate. &lt;br /&gt;
&lt;br /&gt;
Guy --[[User:Gclinch|Gclinch]] 04:06, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can certainly count on my support and participation! I think it&#039;s a great idea to summarize what we have learned &#039;in a mass collaboration approach&#039;; nonetheless, I consider that it would be much better if we can create another page to aggregate all the information from lectures apart from opinions or questions of the discussion section. I might have interpreted your purpose in an unexpected way, so please do not hesitate to share your brilliant ideas! Thank you. --[[User:Yu Ri|Yu Ri]] 08:04, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If each of us have less than a 50% chance of being right about a decision, a group of us will be worse at making a correct decision, with our probability of accuracy increasing towards zero as the size of the group increases.&amp;quot; [http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/]&lt;br /&gt;
&lt;br /&gt;
I thought this quote highlighted what could be a hurdle for Wikipedia, insofar as the potential for an unlimited pool of contributors. While it does not appear to be a problem at present (if anything, they seem eager to include more individuals in the project), I&#039;d be curious if and when they will reach a tipping point. - [[User:Jsanfilippo|Jsanfilippo]] 18:19, 22 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Dear [http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri] ,  Thank you for your kind words. You have interpreted my purpose exactly. Are you suggesting that the topic of Internet and Society would make a good Wikipedia article? If so, I agree.  I checked and someone looks to have begun [http://en.wikipedia.org/wiki/Internet_and_Society one on this exact topic], but contributed only a small amount and has not been modified the informing since 2009. Would you suggest  we pick up where that author left off? --[[User:Gclinch|Gclinch]] 00:24, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Dear Guy,That sounds awesome! Probably we can reconstruct the contents of the article and start filling out relevant information in no time. I would be happy to contribute my effort in improving or re-editing this article on Wikipedia. Feel free to contact me with any suggestion regarding this project. --[[User:Yu Ri|Yu Ri]] 02:18, 22 February 2011 (UTC) &lt;br /&gt;
++++&lt;br /&gt;
&lt;br /&gt;
To use the term from economics, this course is built “on the shoulder of giants.” The three main giants are [http://en.wikipedia.org/wiki/Zittrain Jonathan Zittrain], [http://en.wikipedia.org/wiki/Lawrence_Lessig  Lawrence Lessig], and [http://en.wikipedia.org/wiki/Yochai_Benkler Yochai Benkler]. The course is also supplemented by a number of other influential thinkers who will be mentioned below.&lt;br /&gt;
&lt;br /&gt;
Each of these individuals has contributed a block in the foundation of a set of tools that we students can use to understand the effects that digital technologies are having on our society, culture, government and personal lives today and into the future. &lt;br /&gt;
&lt;br /&gt;
Rob told us that the best way to absorb this material is to begin with Zittrain, progress to Lessig and build to  Benkler.  Along the way we will interject relevant references to other influential thinkers.&lt;br /&gt;
&lt;br /&gt;
In his book, [http://yupnet.org/zittrain/archives/6 The Future of the Internet: and how to stop it] Jonathan Zittrain begins by describing how the Internet emerged at a time when inexpensive fully customizable multiuse computers became available to large numbers of technology tinkerers. The proliferation of these plastic (in the sense of the word that means malleable) platforms combined with unexpected success of the Internet Protocol for connecting these powerhouses of innovation together to link people across time and distance allowed the property of  Generativity to emerge. &lt;br /&gt;
&lt;br /&gt;
Defined as, “[http://en.wikipedia.org/wiki/Generativity an independent ability to create, generate, or produce new content unique to that system without additional help or input from the system&#039;s original creators]” the generative properties of the Internet allowed it to attain “[http://yupnet.org/zittrain/archives/8#2 mainstream dominance] over [http://yupnet.org/zittrain/archives/8#1 proprietary barons such as AOL, CompuServe, and Prodigy.]”&lt;br /&gt;
&lt;br /&gt;
Zittrain describe the following five properties of generativity as important to our discussion: Leverage, Adaptability,  Ease of mastery, Accessibility and Transferability. Important to beginning to build our model, Zittrain describes how the “[http://yupnet.org/zittrain/archives/13#1 hourglass architecture]” of the internet facilitated generativity through a layering property that broke the network into three logical layers. The hourglass is an intellectual concept and not a tangible thing. It helps people who wish to create innovations to focus on their specialty without needing to be concerned how other pieces of the puzzle that are necessary to make things happen work. Layers communicate with each other based on a set of properties that are native to each layer and understood by the others. In essence a digital [http://en.wikipedia.org/wiki/Esperanto Esperanto] or commonly understood language between layers.&lt;br /&gt;
&lt;br /&gt;
The model features “[http://yupnet.org/zittrain/archives/13#3 an ‘application layer,’ representing the tasks people might want to perform on the network].” The foundation of the hourglass is “[http://yupnet.org/zittrain/archives/13#3 the ‘physical layer,’ the actual wires or airwaves over which data will flow].” The middle layer is where the true ingenuity of the model lives. It is “[http://yupnet.org/zittrain/archives/13#3 the ‘protocol layer,’ which establishes consistent ways for data to flow so that the sender, the receiver, and anyone necessary in the middle can know the basics of who the data is from and where the data is going].”&lt;br /&gt;
&lt;br /&gt;
Combined the power of the plastic processing platforms on the edge and unrestrained flow of information across the digital network unleashed a wave of innovation and creativity never before seen in the history of humanity. There is more important information in Zittrain’s about how the combination of economic, cultural security concerns and other forces are today combining to extinguish the generative nature that the Internet created. I am sure we will return to these topics later in the course. &lt;br /&gt;
&lt;br /&gt;
The next element of our foundational model comes from Lawrence Lessig. In his book [http://codev2.cc/download+remix/Lessig-Codev2.pdf  Code: version 2.0] professor Lessig describes that the Internet is what it is because of decisions that have been made by the designers of the system about how the system will work.  This means that the Internet is not of some natural evolution or from some divine design, it is a creation of human invention. &lt;br /&gt;
&lt;br /&gt;
In the early days of the Internet there was an overriding ethos that the Internet was ungovernable and beyond regulation. Notable thinkers including [http://en.wikipedia.org/wiki/John_Perry_Barlow John Perry Barlow] spoke “behalf of the future” to say, “[http://ww2.cs.mu.oz.au/~zs/decl.html no moral right to rule us nor do you possess any methods of enforcement .]“&lt;br /&gt;
&lt;br /&gt;
Lessig defeats the claim of no methods of control by describing a combination of factors including commercial motivations, user acquiescence to improve convenience, security, regulatory and other concerns that have resulted in innovation in the application layer that in turn has resulted in the implementation of features that are creating the opportunity for significant control. &lt;br /&gt;
&lt;br /&gt;
We also discussed how [http://en.wikipedia.org/wiki/Jack_Goldsmith Harvard Law School professor Jack Goldsmith] and [http://en.wikipedia.org/wiki/Tim_Wu Columbia Law School Tim Wu] showed not only do laws of local jurisdictions impose regulation on the internet and its users  so do local geographical cultural and other factors [http://www.legalaffairs.org/printerfriendly.msp?id=961].&lt;br /&gt;
&lt;br /&gt;
Lessig describes how the cumulative effect of Markets, Laws, Social norms result in the equation that Code = law. In other words, the decisions made by those who create the underlying code that makes the Internet possible result in a cumulative effect of establishing governance. The format of that governance is a direct result of the conscious choices made by those who design and implement the system. The decisions on what goes into the code are a result of Markets, Laws and Social norms.&lt;br /&gt;
&lt;br /&gt;
The third element of the foundation of the way we are describing the effects of digital technologies on our society comes from the seminal work by Yochai Benkler, [http://yupnet.org/benkler/ The Wealth of Networks]. Benkler informs us that digital technologies are creating an environment in which a, &amp;quot;[http://mitworld.mit.edu/video/396 radical decentralization of capitalization and computing resources is allowing every connected person, some 600 million to a billion people, to have the means to engage in info knowledge and cultural production].” Benkler argues that the “industrial information economy” is giving way to a new model of human contribution based upon a “commons” approach to innovation.&lt;br /&gt;
 &lt;br /&gt;
He painstakingly documents how the system for protecting  what is commonly known as intellectual property  that was originally  meant to foster economic growth is actually considerable less efficient on a macroeconomic level  than a model in which innovation is freely contributed.  &lt;br /&gt;
&lt;br /&gt;
Benkler argues that the prevailing theory of protecting an individual and organization’s right to control how their innovations are used (and influence how they are compensated for such use) creates such considerable transaction costs for those who might otherwise build upon previous innovations to create new products, services, works of art and other contributions to the betterment of society as a whole that they choose not to do so because of the imposed cost burden.  &lt;br /&gt;
Benkler provides numerous examples that show how a commons based approach has resulted in significantly better, richer and more beneficial layers of innovation.&lt;br /&gt;
  &lt;br /&gt;
[http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php#  Kevin Kelly] demonstrates that in a “Benkleresque” world where information might be freer and ideas less subject to the artificial scarcity created by “Intellectual Property and Copyright” laws overall wealth in the economy would be greater due to the generative effects discussed by Zittrain. Kelly states that  producers would still be enriched because people are still be willing to pay monies associated to various factor involved in the conveyance of information.  In additional new forms of distribution would further increase overall good. &lt;br /&gt;
&lt;br /&gt;
Along the way we have also talked about several recurring themes. These include:&lt;br /&gt;
&lt;br /&gt;
- Internet infrastructure which is foundational, multipurpose; &lt;br /&gt;
- Innovation and public spaces&lt;br /&gt;
- Networks, openness, distributed, decentralized&lt;br /&gt;
- Digital disruption: challenges to existing institutions&lt;br /&gt;
&lt;br /&gt;
Under the topic of Digital disruption, we talked about how the &amp;quot;[http://en.wikipedia.org/wiki/Dot-com_bubble dot-com bubble]&amp;quot;  a surge in financial speculation in digital technologies from roughly 1995 to 2000 resulted in a financial market crash that disrupted economies across the globe.&lt;br /&gt;
&lt;br /&gt;
We discussed how Chris Anderson, author and editor-in-chief of Wired Magazine has shown how digital technologies have unleashed a “[http://www.wired.com/wired/archive/12.10/tail.html long tail of innovation]” that is resulting in fundamental shifts in markets. &lt;br /&gt;
&lt;br /&gt;
[http://forum-network.org/lecture/boston-ideas-2005-eric-von-hippel Eric von Hippel]  shows, in relative parallel to the Benkler proposition, that digital technologies are empowering society and increasing social welfare by shifting innovation up into the user layer. That is digital technologies are shifting the source of innovations from the traditional manufacturer to user generated creation.  He shows how end users, who know intimately more about the ways something is important and how it can be improved are becoming a dynamic source for new creation and improvement.&lt;br /&gt;
&lt;br /&gt;
(New post) Ethan Zuckerman&#039;s review of &#039;&#039;Infotopia&#039;&#039; made me want to read Sunstein&#039;s book. The breadth of topics that Sunstein explores is impressive. From my organizational behavior perch, I especially liked the coverage of group think and cocooning. As an added bonus, Zuckerman contributes another layer of insight in his treatment of Sunstein&#039;s themes.--[[User:SCL|SCL]] 03:29, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hey all!  I found this really interesting little study I found on a woman&#039;s personal blog, which she called &amp;quot;[http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!],&amp;quot; that I thought might be interesting to share.  Courtney Stanton wrote a post on her WordPress blog about women, haters, and rape culture in online gaming, and was so astounded by the responses to the post that she decided to do a wee study on the trolls of those comments.  I thought it was neat to see her methodology, how she broke things down and the conclusions she came to - basically, that trolls contribute nothing (which we all already knew, but now we know the characteristics of their nothingness), and that allowing thoughtful responses to a contentious topic, whether or not you agree with them, can actually foster respectful conversation and be good for you and your blog.  I thought this was particularly relevant giving the theme of &amp;quot;cocooning&amp;quot; in this week&#039;s readings.  Would it be appropriate for me to add this under the &amp;quot;Links&amp;quot; section of this page, with a little description and a disclaimer that it is student-submitted and not from the profs/TAs? --[[User:mcforelle|mcforelle]] 19:03, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In earlier discussions today, there was a mention of manufacturers such as Apple trying to ensure that customers do not modify/hack their products.  They faced the potential of having their phones (IPhone) shut off by their carrier.  This atmosphere of fear seems to be pervasive across manufacturers to keep their customer “in line” at times.  The “fear” of potential safety issues is one that has worked on me more than once.  Naturally if customers can modify existing products on their own,  they may not need to buy the next version of a manufacturer&#039;s product.  [[User:Earboleda|Earboleda]] 00:24, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai folx -----=:) In light of a seemingly negative perception of what hackers do, and also as a demonstration of positive collective action I thought that I would share a bit about a primarily European hacker group named Telecomix that recently rallied to provide low tech communications such as fax numbers, dial-up modems, and even HAM radio coms for the Egyptian people during the internet blackout days of the anti-Mubarak protests.  This was a video they made at the beginning of the uprising: &amp;quot;[http://www.youtube.com/watch?v=Tz4ECbj3dkY| Telecomix Message to North Africa and the Middle East]&amp;quot;.  Later they were mentioned by the Electronic Frontier Foundation along with the French Data Network as organizations that provided technical workarounds and support during the black out.  The EFF article can be found here: &amp;quot;[http://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak | Egypt&#039;s Internet Blackout Highlights Danger of Weak Links Usefulness of Quick Links&amp;quot;].  Telecomix is currently providing a variety of similar technologies for the people of Libya.  They are about the datalove and keeping it free and flowing. (:=----- kthxbai [[User: deinous|deinous]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hai again!  In class last night I had mentioned the two different approaches that Microsoft and Sony are taking toward hackers hacking their gaming consoles. In a recent Mashable article, &amp;quot;[http://mashable.com/2011/02/21/kinect-sdk/ |Xbox Kinect vs. Sony PS3: How 2 Companies Handle Hacking]&amp;quot;, they described these approaches.  Microsoft is encouraging hackers to innovate and push the limitations of their new motion sensoring peripheral, Kinect, by hosting hacking contests and the upcoming commercial release of a developing platform, SDK, for hacker to use. About a week after the public release of the Kinect last fall there was a huge buzz in the gaming community that the Kinect had been hacked to play World of Warcraft. Being an avid member of the WoW community I was very excited about this and searched to find out what the hack did.  As it turned out the Institute for Creative Technology of USC had created a customizable user interface and had applied it to the game controls for WoW.  The result and explanation of this inspiring hack can be seen in their YouTube video here: &amp;quot;[http://www.youtube.com/watch?v=62wj8eJ0FHw | World of Warcraft with Microsoft Kinect using FAAST and OpenNI&#039;]. There is also already a commercially release development platform for creating homebrewed Xbox360 games, and again, there are many hosted contests for talented hackers.  Conversely, companies like Sony do not encourage hacking their systems, and are currently suing George Holt for jailbreaking the PS3 for homebrew game design. This closed attitude raises the important question: if you purchased the product, why are you not allowed to do with it as you please? Recently, at least in the common practice of jailbreaking Apple&#039;s iPhones and iPads for open development, and unapproved software from Apple, it is not illegal to do so and will not result in lawsuits or terminations of your phone and data services.  It does however void Apple warranties.  I personally am in support of the &amp;quot;you buy it, you can do what you want with it&amp;quot; argument, and look forward to more companies adopting attitudes and policies much like Microsoft has with their releasing of commercial developing tools that promote the generative process of creating new hardware uses and homebrew game design.  If these consoles and gadgets remain so closed I agree with Zittrain that there will become a stagnation with in creative technology. ---=:) kthxbai [[User:Deinous|Deinous]] 20:43, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*  [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html/ Clay Shirky TED Talk]&lt;br /&gt;
* [http://www.businessweek.com/innovate/content/feb2007/id20070201_774736.htm goldcorp story] (worth reading)&lt;br /&gt;
* [http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!] - Courtney Stanton&#039;s study of responses to a blog post about women and rape culture in gaming, focusing on the content of the comments and comparing civil discussion to trolling.  A quick read, interesting analysis.  --[[User:mcforelle|mcforelle]] 22:01, 22 February 2011 (UTC)&lt;br /&gt;
* some links on Apple&#039;s new subscription model:&lt;br /&gt;
** [http://mashable.com/2011/02/15/apple-subscription-model/ Apple&#039;s New Subscription Model]: Christina Warren, Mashable&lt;br /&gt;
** [http://www.readwriteweb.com/archives/apple_subscription_model.php The New New Media: Apple&#039;s Subscription Model]: Richard MacManus, ReadWriteWeb&lt;br /&gt;
** [http://www.pcmag.com/article2/0,2817,2380742,00.asp Top 4 Publisher Objections to Apple Subscriptions]: Peter Pachal, PCMag&lt;br /&gt;
** [http://mediadecoder.blogs.nytimes.com/2011/02/15/apple-offers-subscriptions-for-all-ipad-publications/?partner=rss&amp;amp;emc=rss Apple Offers Subscriptions for Apps]: JEREMY W. PETERS and MIGUEL HELFT, NYTimes&lt;br /&gt;
* Ethan Zuckerman on [http://www.ethanzuckerman.com/blog/2008/04/25/homophily-serendipity-xenophilia/ Homophily, serendipity, and xenophilia] -- an interesting response to the &amp;quot;silo&amp;quot; theory (aka homophily) we discussed in class. --[[User:RebekahHeacock|RebekahHeacock]] 00:15, 23 February 2011 (UTC)&lt;br /&gt;
* Here is a link from yesterday&#039;s New York Times, http://nyti.ms/fBtKpz more wikileaks this time referring to the Qaddafi family’s exploits [[User:FMRR|FMRR]] 16:02, 24 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Assignment_2_Submissions&amp;diff=5692</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Assignment_2_Submissions&amp;diff=5692"/>
		<updated>2011-02-21T23:59:45Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_2.doc&amp;diff=5691</id>
		<title>File:Faye Ryding Assignment 2.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_2.doc&amp;diff=5691"/>
		<updated>2011-02-21T23:56:49Z</updated>

		<summary type="html">&lt;p&gt;FMRR: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Assignment_1_Submissions&amp;diff=5461</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Assignment_1_Submissions&amp;diff=5461"/>
		<updated>2011-02-10T01:04:00Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
* Name:&lt;br /&gt;
* Link to rule: (the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 01:04, 10 February 2011 (UTC)&lt;br /&gt;
*Link to Rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to Article: http://en.wikipedia.org/wiki/J-1_visa&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Corey MacDonald&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Fred_Moore_(attorney)&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_-_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Public_good&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:LNLandrum_Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Bank_secrecy&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:Wikipedia_Neutral_Point_of_View.doc &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 20:48, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Windows_Phone_7&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Brian_Smith_-_Ownership_Rule_v2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 18:36, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Great_Firewall_of_China&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment1_Report_Y_Kim.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Susan Jennings: &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Indexed_annuity&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:Assignment_No._1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 00:17, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Internet_censorship#Burma&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Jillian_C_York_-assignment_1.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Guy Clinch --[[User:Gclinch|Gclinch]] 17:24, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Enhanced_9-1-1&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_1_%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Kruglyak: [[User:VladimirK|VladimirK]] 20:27, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:The_rule_you_chose.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Gagan Panjhazari [[User:gpanjhazari|gpanjhazari]] 07:24, 6 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:GP-Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 04:21, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Polling_is_not_a_substitute_for_discussion&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/DSR-570&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment-1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alex Solomon&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brandon A Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 03:52, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/History_of_crossbows&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:BrandonAndrzejAssignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak --[[User:VladimirTrojak|VladimirTrojak]] 13:50, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Telecommunications_data_retention&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_1_wikipedia_report.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Adriana Torii[[User:drifaria]]  &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/IPO&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Wikipediaassignment.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User: singh singh]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Network_neutrality&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Feb._8.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Lorena Abuín [[User:lorenabuin]]&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Sociedad_General_de_Autores_y_Editores&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment_1_-_Lorena_Abu%C3%ADn.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi [[User:syedshirazi]]&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Group_buying&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Shirazi_Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda [[User:earboleda]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Provisional_application&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:HES_Assignment1.pdf&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_1.doc&amp;diff=5460</id>
		<title>File:Faye Ryding Assignment 1.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=File:Faye_Ryding_Assignment_1.doc&amp;diff=5460"/>
		<updated>2011-02-10T00:58:53Z</updated>

		<summary type="html">&lt;p&gt;FMRR: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5158</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5158"/>
		<updated>2011-01-25T19:23:09Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2011/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5153</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2011/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5153"/>
		<updated>2011-01-25T19:20:44Z</updated>

		<summary type="html">&lt;p&gt;FMRR: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;/div&gt;</summary>
		<author><name>FMRR</name></author>
	</entry>
</feed>