<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Earboleda</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Earboleda"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/Special:Contributions/Earboleda"/>
	<updated>2026-04-14T22:15:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6791</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6791"/>
		<updated>2011-05-10T03:15:24Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6790</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6790"/>
		<updated>2011-05-10T03:14:29Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf  &lt;br /&gt;
[[User:Earboleda|Earboleda]] 03:14, 10 May 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6789</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6789"/>
		<updated>2011-05-10T03:13:34Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf  [[User:Earboleda|Earboleda]]&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&amp;diff=6788</id>
		<title>File:Ed Arboleda HES Internet and Society Final Project.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&amp;diff=6788"/>
		<updated>2011-05-10T03:11:30Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6717</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6717"/>
		<updated>2011-05-03T19:33:22Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastifdonty|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wanted to submit this article to add to the discussion. I found it to be interesting. Cybersecurity is probably the most vital issue to our country&#039;s infrastructure today. The recent military operation to take out  Osama bin Ladin would have failed miserably if knowledge of the raid was disclosed. To keep our intelligence reports under wraps should be among our highest priorities. While the government wages wars on three fronts at once, it is difficult but nessessary to ensure our reports stay out of our enemies hands. By blocking IP addresses and using more sophisticated encryption, we will be well on our way to protecting our great country. The world runs through the Internet, and so does our future.   [http://delivery.acm.org/10.1145/1840000/1839688/p33-brenner.pdf?key1=1839688&amp;amp;key2=5956834031&amp;amp;coll=DL&amp;amp;dl=ACM&amp;amp;ip=74.90.79.253&amp;amp;CFID=18979663&amp;amp;CFTOKEN=55280022] [[User:Joshuasurillo|Joshuasurillo]] 01:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Cyberthreats are real and pervasive.  The people within IT infrastructure have been fighting the battle for years.  It makes no difference whether you work for a government, business or school – every domain (gov, com &amp;amp; edu) is under attack.  Private business and the military arm of the government are the most concerned about security, so they were the first to adopt network access control and identity management.  Security is enforced by verifying the identity of each user and device before allowing them to gain access to the network.  This, of course, runs counter to the idea of a free, open and anonymous Internet.  Yes, we can do a lot to protect the public by having the ISPs filter and block malware (search for SonicWALL and Blue Coat for examples) but it’s not enough to stop all breaches and wastes precious bandwidth.  Our government recognizes this and is actively promoting what would become a national electronic identity “ecosystem.” (Their euphemism; see http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf) Jack Goldsmith had some well reasoned arguments why we should expect more government controls.  Finally, a good taxonomy of Internet security practices can be found in the pages of Chief Security Officer Magazine at http://www.csoonline.com/. [[User:ChrisSura|-Chris Sura]]&lt;br /&gt;
&lt;br /&gt;
Even with additional security measures instituted, there will always be someone looking for a way around it.  Jack Goldsmith&#039;s suggestion (suggested earlier by Zittrain), that additional measures be placed at the ISP level brings in significant risk to the ISPs.  What if the measures are put in place and something (inevitably) gets through?  Are the ISPs then liable for this?  Hacking and break-ins will continue to occur even at some of the most &amp;quot;secure&amp;quot; sites.  RSA, an industry security leader recently had their systems compromised, which led to information being extracted from their systems.  The fact that extremely sophisticated and targeted attacks can happen at secure Nuclear Power plants (Stuxnet worm), means that ISPs have would have their hands full with any targeted attack.&lt;br /&gt;
http://www.rsa.com/node.aspx?id=3872   [[User:Earboleda|Earboleda]]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=6658</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=6658"/>
		<updated>2011-04-19T21:38:21Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
**Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
** Updated link to the Etling, et al. piece: [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Mapping the Arabic Blogosphere]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I&#039;m inclined to be skeptical of the idea that the internet and social media are making interpersonal connections &amp;quot;shallower&amp;quot;, whether we are talking about &amp;quot;Facebook friends&amp;quot; or social and political activism. Setting aside the question of whether online relationships count as &amp;quot;real&amp;quot; relationships (that is, are qualitatively inferior to real-life relationships), in order for this theory to be correct, online relationships would have to be replacing real-life relationships. While I don&#039;t have any hard data to back this up, I simply don&#039;t see this happening in most cases. The imagined concept is one of young people avoiding traditional social contact in favor of hours spent online. However, I would postulate that the people most inclined to shut themselves off from the &amp;quot;real world&amp;quot; in favor of computers are the same people who would have shut themselves off in favor of books or various solo hobbies in previous decades. Under this model, the quantity and quality of social interaction for persons thus inclined is &#039;&#039;increasing&#039;&#039;, rather than decreasing. What we are talking about is both an increase in reach and a lowering of thresholds. For the average user, social media, first and foremost, provides a vehicle for interaction with people they &#039;&#039;already know&#039;&#039; in real life (friends from school, family, etc... so your kid spending time on the computer rather than playing with friends outside is likely to be interacting with those same friends electronically) and then adds to this a new layer of online friendships and acquaintances which arise as social media provides previously unavailable opportunities to build relationships over distance. (There is, as well, traffic between these two layers, as real-life friends separated by distance use social media to keep in touch, and friends - and potential romantic partners - met online arrange to meet in person). Similarly, when it comes to activism, the increasing availability of &amp;quot;intermediate&amp;quot; levels of support (such as donation or petition signing – hardly new developments) is not likely, to my mind, to decrease the number of active real-world advocates. Verily, the opposite: those inclined to get off the couch and &amp;quot;make a difference&amp;quot; are still likely (or even more likely) to do so, only now with the support of countless others who would not have been reached by the activist&#039;s message otherwise.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 17 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think it&#039;s worth raising the point that there have been a lot of serious questions raised as to the accuracy of the NYTimes piece read in class this week; for example, Global Voices shows Egyptian Twitterers mocking the idea that they needed Western help (http://globalvoicesonline.org/2011/04/15/egypt-gene-sharp-taught-us-how-to-revolt/).  I think that, ultimately, this controversy is more important than the content of the article itself, in that it illustrates how social media can be vital to media accuracy--you have numerous direct accounts from known activists contradicting the commentary in the NYTimes, while the NYTimes meanwhile often has difficulty getting good sources in the Arab world because of its somewhat negative reputation (two words: Thomas Friedman).  Another issue in the piece is the emphasis on a very tiny collaborative movement aided by the US, while numerous genuine, grassroots movements exist and have been ignored by media (case in point: The Arab Bloggers workshops and Arab Techies group). &lt;br /&gt;
&lt;br /&gt;
In terms of the broader picture, one aspect of all of this that has been desperately overlooked is the use and importance of backchannels like private groups, IRC, and email.  While social media is certainly important, the organizing that happens in private online spaces (as well as via SMS) is undoubtedly even more vital. [[User:Jyork|Jyork]] 20:06, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another argument in favor of the role social media is playing in providing accurate information for journalists about things that are happening elsewhere: if you have Twitter, check out the work that @andycarvin has beeen doing.  He&#039;s NPR&#039;s senior product manager for online communities, and has been connecting with people on the ground in countries like Egypt and Libya for a while, using them and their networks to verify or challenge information that the mainstream media has been getting.  It&#039;s been neat stuff.  [[User:Mcforelle|Mcforelle]] 01:11, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In addition to the lack of accuracy in the NY Times article, I don&#039;t think the internet is necessarily the mean of online hate speech and irrational behavior. Many of the least developed and heavily indebted poor countries are grossly corrupt, which lack adequate financial means or political and economic conditions to cultivate human rights. In addition, poor countries are also notoriously more vulnerable to economic volatility, conflict and humanitarian crisis; good governance matters to development and how citizens behave online.[[User:Alexsolomon|Alexsolomon]]&lt;br /&gt;
&lt;br /&gt;
I find Mr. Shirky&#039;s interview to be especially important today.  He highlights the use of social media, SMS, mobile email, and internet-based freedom of speech (i.e. blogs) to organize people in the absence of other more traditional, government controlled, methods (i.e. print media).  I believe it is obvious that the governments are aware of the people&#039;s ability to organize over this uncontrolled medium which is why many governments are trying to stop further penetration of technologies such as email encryption and blogging/tweeting (e.g. India, Saudi Arabia, China).  If they can control, stop, or accurately monitor these communication mediums they can further disrupt grassroots uprisings.  [[User:Rakundig|Rakundig]] 19:15, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fundamental notion of democracy is the active participation of the governed in the government, either directly or through representatives.  This week’s readings take aim at an outer fringe of that notion: the active participation of the governed in the overthrow of government.  There can be no doubt that the Internet provides the world’s best electronic soapbox.  It is a better mouthpiece, a better broadcast medium, a better tool.   Etling et al. wisely note that “[t]he Internet lays a good foundation for a battle of ideas, but does not necessarily favor a winner” while Shirky states more bluntly that the Internet is “a better way to take down autocracies but not a better way to replace them.”  We can marvel at the effectiveness of social media in toppling the Egyptian government, but it could not have happened without a military that was sympathetic to the public.  Libya and Iran demonstrate the counterpoint.&lt;br /&gt;
While the Internet has shown great promise facilitating political freedom, I fear those days are numbered.  Last week’s readings exposed the blatant large scale surveillance which the Internet also facilitates.  The video from the cell phone uploaded to youtube probably contains the serial number of the phone traceable to the owner via his GPS coordinates.  This is not just a problem with the Internet – it is prevalent in all technology.  You can no longer print an “anonymous” political flyer when it contains the serial number of the color printer that rendered it.  Technology is a powerful tool that can do wonderful and terrible things.  It needs thoughtful regulation.&lt;br /&gt;
[[User:ChrisSura|-Chris Sura]] 21:20, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The simple quote by Wael Ghonim really brings home the message of how government should be looked at. “This is your country; a government official is your employee who gets his salary from your tax money, and you have your rights.” The simple message was able to be communicated through Technology and Social Media. Both have naturally played a crucial role in the changes occurring in the Arab world.  Discussing technology, Clay Shirkey states “The technology is that big of difference if it is a big difference.”  He goes on to explain that the newness of the technology creates a unique opportunity for impact, as users are unsure how to react to it. Unfortunately, this same technology can also be used against the protestors (as was used by Iran to track down protestors).  Given that this is happening in some Arab countries, is there a reason why this has not created a lot of traction in countries like Syria? Is it because this same technology is being used against the protestors? [[User:Earboleda|Earboleda]] 21:36, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If we&#039;re looking to Tunisia and Egypt, I really think we ought to be looking at Tunisian and Egyptian sources, particularly in light of the fact that we&#039;re reading what is largely considered an inaccurate portrayal by the NYTimes.  Here are two great pieces from an Egyptian blogger (they&#039;re not necessarily representative, but they&#039;re the best English sources I&#039;ve found so far): http://www.hanimorsi.com/blog/index.php/archives/2011/02/22/from-clicktivism-to-activism/; http://www.hanimorsi.com/blog/index.php/archives/2011/02/17/the-virtualization-of-dissent-social-media-as-a-catalyst-for-social-change-part-two/.  I also think that these two 2008 pieces from Egyptian journalist Hossam El-Hamalawy are vital reading, incredibly prescient: http://www.arabawy.org/2008/05/08/the-revolution-will-be-flickrized/; http://www.arabawy.org/2008/02/26/a-call-to-blogo-arms/. [[User:Jyork|Jyork]] 20:09, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
My Assignment 4 paper was loosely based on this. I wonder people see the far reaching grasp of the Internet. Social media keeps growing and affecting our lives. With such devices as Facebook and Wikileaks, it wont be long before the masses control the countrys&#039; direction. Joshua Surillo&lt;br /&gt;
&lt;br /&gt;
This article too: http://www.guardian.co.uk/commentisfree/2011/mar/02/egypt-revolution-mubarak-wall-of-fear [[User:Jyork|Jyork]] 20:11, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Interesting Question: [http://www.govtech.com/e-government/Government-Twitter-Tsar.html Do Government Agencies Need a Twitter Tsar?] --[[User:Gclinch|Gclinch]] 15:31, 19 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=6657</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=6657"/>
		<updated>2011-04-19T21:36:16Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
**Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
** Updated link to the Etling, et al. piece: [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Mapping the Arabic Blogosphere]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I&#039;m inclined to be skeptical of the idea that the internet and social media are making interpersonal connections &amp;quot;shallower&amp;quot;, whether we are talking about &amp;quot;Facebook friends&amp;quot; or social and political activism. Setting aside the question of whether online relationships count as &amp;quot;real&amp;quot; relationships (that is, are qualitatively inferior to real-life relationships), in order for this theory to be correct, online relationships would have to be replacing real-life relationships. While I don&#039;t have any hard data to back this up, I simply don&#039;t see this happening in most cases. The imagined concept is one of young people avoiding traditional social contact in favor of hours spent online. However, I would postulate that the people most inclined to shut themselves off from the &amp;quot;real world&amp;quot; in favor of computers are the same people who would have shut themselves off in favor of books or various solo hobbies in previous decades. Under this model, the quantity and quality of social interaction for persons thus inclined is &#039;&#039;increasing&#039;&#039;, rather than decreasing. What we are talking about is both an increase in reach and a lowering of thresholds. For the average user, social media, first and foremost, provides a vehicle for interaction with people they &#039;&#039;already know&#039;&#039; in real life (friends from school, family, etc... so your kid spending time on the computer rather than playing with friends outside is likely to be interacting with those same friends electronically) and then adds to this a new layer of online friendships and acquaintances which arise as social media provides previously unavailable opportunities to build relationships over distance. (There is, as well, traffic between these two layers, as real-life friends separated by distance use social media to keep in touch, and friends - and potential romantic partners - met online arrange to meet in person). Similarly, when it comes to activism, the increasing availability of &amp;quot;intermediate&amp;quot; levels of support (such as donation or petition signing – hardly new developments) is not likely, to my mind, to decrease the number of active real-world advocates. Verily, the opposite: those inclined to get off the couch and &amp;quot;make a difference&amp;quot; are still likely (or even more likely) to do so, only now with the support of countless others who would not have been reached by the activist&#039;s message otherwise.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 17 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think it&#039;s worth raising the point that there have been a lot of serious questions raised as to the accuracy of the NYTimes piece read in class this week; for example, Global Voices shows Egyptian Twitterers mocking the idea that they needed Western help (http://globalvoicesonline.org/2011/04/15/egypt-gene-sharp-taught-us-how-to-revolt/).  I think that, ultimately, this controversy is more important than the content of the article itself, in that it illustrates how social media can be vital to media accuracy--you have numerous direct accounts from known activists contradicting the commentary in the NYTimes, while the NYTimes meanwhile often has difficulty getting good sources in the Arab world because of its somewhat negative reputation (two words: Thomas Friedman).  Another issue in the piece is the emphasis on a very tiny collaborative movement aided by the US, while numerous genuine, grassroots movements exist and have been ignored by media (case in point: The Arab Bloggers workshops and Arab Techies group). &lt;br /&gt;
&lt;br /&gt;
In terms of the broader picture, one aspect of all of this that has been desperately overlooked is the use and importance of backchannels like private groups, IRC, and email.  While social media is certainly important, the organizing that happens in private online spaces (as well as via SMS) is undoubtedly even more vital. [[User:Jyork|Jyork]] 20:06, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another argument in favor of the role social media is playing in providing accurate information for journalists about things that are happening elsewhere: if you have Twitter, check out the work that @andycarvin has beeen doing.  He&#039;s NPR&#039;s senior product manager for online communities, and has been connecting with people on the ground in countries like Egypt and Libya for a while, using them and their networks to verify or challenge information that the mainstream media has been getting.  It&#039;s been neat stuff.  [[User:Mcforelle|Mcforelle]] 01:11, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In addition to the lack of accuracy in the NY Times article, I don&#039;t think the internet is necessarily the mean of online hate speech and irrational behavior. Many of the least developed and heavily indebted poor countries are grossly corrupt, which lack adequate financial means or political and economic conditions to cultivate human rights. In addition, poor countries are also notoriously more vulnerable to economic volatility, conflict and humanitarian crisis; good governance matters to development and how citizens behave online.[[User:Alexsolomon|Alexsolomon]]&lt;br /&gt;
&lt;br /&gt;
I find Mr. Shirky&#039;s interview to be especially important today.  He highlights the use of social media, SMS, mobile email, and internet-based freedom of speech (i.e. blogs) to organize people in the absence of other more traditional, government controlled, methods (i.e. print media).  I believe it is obvious that the governments are aware of the people&#039;s ability to organize over this uncontrolled medium which is why many governments are trying to stop further penetration of technologies such as email encryption and blogging/tweeting (e.g. India, Saudi Arabia, China).  If they can control, stop, or accurately monitor these communication mediums they can further disrupt grassroots uprisings.  [[User:Rakundig|Rakundig]] 19:15, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fundamental notion of democracy is the active participation of the governed in the government, either directly or through representatives.  This week’s readings take aim at an outer fringe of that notion: the active participation of the governed in the overthrow of government.  There can be no doubt that the Internet provides the world’s best electronic soapbox.  It is a better mouthpiece, a better broadcast medium, a better tool.   Etling et al. wisely note that “[t]he Internet lays a good foundation for a battle of ideas, but does not necessarily favor a winner” while Shirky states more bluntly that the Internet is “a better way to take down autocracies but not a better way to replace them.”  We can marvel at the effectiveness of social media in toppling the Egyptian government, but it could not have happened without a military that was sympathetic to the public.  Libya and Iran demonstrate the counterpoint.&lt;br /&gt;
While the Internet has shown great promise facilitating political freedom, I fear those days are numbered.  Last week’s readings exposed the blatant large scale surveillance which the Internet also facilitates.  The video from the cell phone uploaded to youtube probably contains the serial number of the phone traceable to the owner via his GPS coordinates.  This is not just a problem with the Internet – it is prevalent in all technology.  You can no longer print an “anonymous” political flyer when it contains the serial number of the color printer that rendered it.  Technology is a powerful tool that can do wonderful and terrible things.  It needs thoughtful regulation.&lt;br /&gt;
[[User:ChrisSura|-Chris Sura]] 21:20, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The simple quote by Wael Ghonim really brings home the message of how government should be looked at. “This is your country; a government official is your employee who gets his salary from your tax money, and you have your rights.” 1 The simple message was able to be communicated through Technology and Social Media. Both have naturally played a crucial role in the changes occurring in the Arab world.  Discussing technology, Clay Shirkey states “The technology is that big of difference if it is a big difference.”2  He goes on to explain that the newness of the technology creates a unique opportunity for impact, as users are unsure how to react to it. Unfortunately, this same technology can also be used against the protestors (as was used by Iran to track down protestors).  Given that this is happening in some Arab countries, is there a reason why this has not created a lot of traction in countries like Syria? Is it because this same technology is being used against the protestors? [[User:Earboleda|Earboleda]] 21:36, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If we&#039;re looking to Tunisia and Egypt, I really think we ought to be looking at Tunisian and Egyptian sources, particularly in light of the fact that we&#039;re reading what is largely considered an inaccurate portrayal by the NYTimes.  Here are two great pieces from an Egyptian blogger (they&#039;re not necessarily representative, but they&#039;re the best English sources I&#039;ve found so far): http://www.hanimorsi.com/blog/index.php/archives/2011/02/22/from-clicktivism-to-activism/; http://www.hanimorsi.com/blog/index.php/archives/2011/02/17/the-virtualization-of-dissent-social-media-as-a-catalyst-for-social-change-part-two/.  I also think that these two 2008 pieces from Egyptian journalist Hossam El-Hamalawy are vital reading, incredibly prescient: http://www.arabawy.org/2008/05/08/the-revolution-will-be-flickrized/; http://www.arabawy.org/2008/02/26/a-call-to-blogo-arms/. [[User:Jyork|Jyork]] 20:09, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
My Assignment 4 paper was loosely based on this. I wonder people see the far reaching grasp of the Internet. Social media keeps growing and affecting our lives. With such devices as Facebook and Wikileaks, it wont be long before the masses control the countrys&#039; direction. Joshua Surillo&lt;br /&gt;
&lt;br /&gt;
This article too: http://www.guardian.co.uk/commentisfree/2011/mar/02/egypt-revolution-mubarak-wall-of-fear [[User:Jyork|Jyork]] 20:11, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Interesting Question: [http://www.govtech.com/e-government/Government-Twitter-Tsar.html Do Government Agencies Need a Twitter Tsar?] --[[User:Gclinch|Gclinch]] 15:31, 19 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6560</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6560"/>
		<updated>2011-04-12T23:13:21Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Mind Map|to be uploaded}}&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_LSTU_E%C3%A2%E2%82%AC%E2%80%9C120_AudioVideo.ppt&amp;diff=6559</id>
		<title>File:Ed Arboleda LSTU Eâ€“120 AudioVideo.ppt</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_LSTU_E%C3%A2%E2%82%AC%E2%80%9C120_AudioVideo.ppt&amp;diff=6559"/>
		<updated>2011-04-12T23:10:29Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6545</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6545"/>
		<updated>2011-04-12T21:26:28Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AV.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://www.youtube.com/watch?v=w0q8Gudh0T8}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_LSTU_E%C3%A2%E2%82%AC%E2%80%9C120_AV.ppt&amp;diff=6544</id>
		<title>File:Ed Arboleda LSTU Eâ€“120 AV.ppt</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_LSTU_E%C3%A2%E2%82%AC%E2%80%9C120_AV.ppt&amp;diff=6544"/>
		<updated>2011-04-12T21:23:33Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6507</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6507"/>
		<updated>2011-04-11T23:25:28Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|sent to Rebekah}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6506</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6506"/>
		<updated>2011-04-11T23:24:15Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|sent to Rebekah}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6505</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6505"/>
		<updated>2011-04-11T23:23:52Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|sent to Rebekah}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf&amp;diff=6504</id>
		<title>File:Ed Arboleda HES Internet and Society Assignment4.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf&amp;diff=6504"/>
		<updated>2011-04-11T23:20:33Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6465</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6465"/>
		<updated>2011-04-04T23:45:02Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
* [http://www.whitehouse.gov/blog/2011/03/15/concrete-steps-congress-can-take-protect-americas-intellectual-property The White House Blog: Concrete Steps Congress Can Take to Protect America&#039;s Intellectual Property]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
For the mind map software, I found [http://vue.tufts.edu/ VUE] easy to use. I was especially impressed by the rendering in PDF. Everything fit neatly on the page. This was a big surprise after being a Microsoft Office User ;-). Also, PC Users, if you need to print to PDF, [http://www.pdfforge.org/ PDF Creator] is wonderful. --[[User:SCL|SCL]] 22:17, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The story of Edwin Howard Armstrong in Lawrence Lessig&#039;s Free Culture, is especially disturbing due in part to his unfortunate demise. FM radio was systematically repressed by RCA and the government (FCC); for the benefit of RCA (to keep it&#039;s market share with AM radio).The fight between RCA and Edwin Armstrong ultimately broke him down, but this story has repeated itself in many forms throughout history.  RCA benefited from AM radio at the expense of millions of radio listeners who would have been able to enjoy clear FM transmissions.  In this particular case, it lead to the direct death of the inventor and the short changing of the radio listening public.  What happens in other cases where lives are at stake? Would a pharmaceutical company react the same way to protect their financial interests in the event of an important cure being developed?  What if the cure was developed using prior pharmaceutical patents? Would “common sense revolt at the idea?”1 [[User:Earboleda|Earboleda]] 23:44, 4 April 2011 (UTC)&lt;br /&gt;
1 Lawrence Lessig, ( New York: Penguin Press, 1994) Free Culture, 2&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Interesting question: [http://paidcontent.org/article/419-have-media-companies-destroyed-their-copyrights-with-the-share-button/# Have Media Companies Destroyed Their Copyrights With The ‘Share’ Button?] --[[User:Gclinch|Gclinch]] 23:06, 3 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6464</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6464"/>
		<updated>2011-04-04T23:44:09Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
* [http://www.whitehouse.gov/blog/2011/03/15/concrete-steps-congress-can-take-protect-americas-intellectual-property The White House Blog: Concrete Steps Congress Can Take to Protect America&#039;s Intellectual Property]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
For the mind map software, I found [http://vue.tufts.edu/ VUE] easy to use. I was especially impressed by the rendering in PDF. Everything fit neatly on the page. This was a big surprise after being a Microsoft Office User ;-). Also, PC Users, if you need to print to PDF, [http://www.pdfforge.org/ PDF Creator] is wonderful. --[[User:SCL|SCL]] 22:17, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The story of Edwin Howard Armstrong in Lawrence Lessig&#039;s Free Culture, is especially disturbing due to his unfortunate demise. FM radio was systematically repressed by RCA and the government (FCC); for the benefit of RCA (to keep it&#039;s market share with AM radio).The fight between RCA and Edwin Armstrong ultimately broke him down, but this story has repeated itself in many forms throughout history.  RCA benefited from AM radio at the expense of millions of radio listeners who would have been able to enjoy clear FM transmissions.  In this particular case, it lead to the direct death of the inventor and the short changing of the radio listening public.  What happens in other cases where lives are at stake? Would a pharmaceutical company react the same way to protect their financial interests in the event of an important cure being developed?  What if the cure was developed using prior pharmaceutical patents? Would “common sense revolt at the idea?”1 [[User:Earboleda|Earboleda]] 23:44, 4 April 2011 (UTC)&lt;br /&gt;
1 Lawrence Lessig, ( New York: Penguin Press, 1994) Free Culture, 2&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Interesting question: [http://paidcontent.org/article/419-have-media-companies-destroyed-their-copyrights-with-the-share-button/# Have Media Companies Destroyed Their Copyrights With The ‘Share’ Button?] --[[User:Gclinch|Gclinch]] 23:06, 3 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6463</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6463"/>
		<updated>2011-04-04T23:43:31Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
* [http://www.whitehouse.gov/blog/2011/03/15/concrete-steps-congress-can-take-protect-americas-intellectual-property The White House Blog: Concrete Steps Congress Can Take to Protect America&#039;s Intellectual Property]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
For the mind map software, I found [http://vue.tufts.edu/ VUE] easy to use. I was especially impressed by the rendering in PDF. Everything fit neatly on the page. This was a big surprise after being a Microsoft Office User ;-). Also, PC Users, if you need to print to PDF, [http://www.pdfforge.org/ PDF Creator] is wonderful. --[[User:SCL|SCL]] 22:17, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The story of Edwin Howard Armstrong in Lawrence Lessig&#039;s Free Culture, is especially disturbing due to his unfortunate demise. FM radio was systematically repressed by RCA and the government (FCC); for the benefit of RCA (to keep it&#039;s market share with AM radio).The fight between RCA and Edwin Armstrong ultimately broke him down, but this story has repeated itself in many forms throughout history.  RCA benefited from AM radio at the expense of millions of radio listeners who would have been able to enjoy clear FM transmissions.  In this particular case, it lead to the direct death of the inventor and the short changing of the radio listening public.  What happens in other cases where lives are at stake? Would a pharmaceutical company react the same way to protect their financial interests in the event of an important cure being developed?  What if the cure was developed using prior pharmaceutical patents? Would “common sense revolt at the idea?”1 [[User:Earboleda|Earboleda]]&lt;br /&gt;
1 Lawrence Lessig, ( New York: Penguin Press, 1994) Free Culture, 2&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Interesting question: [http://paidcontent.org/article/419-have-media-companies-destroyed-their-copyrights-with-the-share-button/# Have Media Companies Destroyed Their Copyrights With The ‘Share’ Button?] --[[User:Gclinch|Gclinch]] 23:06, 3 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=6330</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=6330"/>
		<updated>2011-03-22T20:58:21Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:Mary Van Gils&lt;br /&gt;
*Description:Yelp Outline&lt;br /&gt;
*Link to your outline:{{http://cyber.law.harvard.edu/is2011/sites/is2011/images/_Yelp_outline.doc}}&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|MaryVanGils|Yelp Outline|http://cyber.law.harvard.edu/is2011/Images/Yelp_outline.doc(file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
Corey MacDonald&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Corey MacDonald|Communication for the Fringe: Sites that cater to the unrepresented or under-represented audience.|http://cyber.law.harvard.edu/is2011/Image:Outline_MacDonald_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Laura Connell&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Laura Connell|The impact of internet piracy on the UK creative industries (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_3_Prospectus.pdf}}&lt;br /&gt;
&lt;br /&gt;
Yu Ri Jeong&lt;br /&gt;
{{AssignmentInfo|Yu Ri Jeong|Collective Intelligence in South Korea: Study on Architecture and Governance of Naver Knowledge iN (Assignment #3)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_3_Project_Outline.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Jennings|Annuity Companies&#039; Social Media Communities(Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:_Outline_of_annuity_social_media.doc‎}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kristina Meshkova&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alokika Singh|Feminist Movement in India and the Internet (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:MARCH_22_singh.singh.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Lorena Abuín|Media role in the contribution to prosecuted online activities (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Assignment_3_-_Lorena_Abu%C3%ADn.pdf}}&lt;br /&gt;
&lt;br /&gt;
Jillian York&lt;br /&gt;
{{AssignmentInfo|Jillian C. York|Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
Faye Ryding&lt;br /&gt;
{{AssignmentInfo|Faye Ryding|What are the explicit and implicit policies for dealing with trolls and vandals on epinions.com?| http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
Syed Yasir A. Shirazi&lt;br /&gt;
{{AssignmentInfo|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:SYAS-Assignment_3-Outline-Pledgebank%27s_Community.pdf}}&lt;br /&gt;
&lt;br /&gt;
Guy Clinch{{AssignmentInfo|Guy Clinch|The Transition to Next Generation 9-1-1 in North America &lt;br /&gt;
(Assignment #3)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anna &amp;amp; Adriana {{AssignmentInfo|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil (Assignment #3)| http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
Ed Arboleda {{AssignmentInfo|Ed Arboleda|Hyperlocal Websites and Community Activism Outline|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment3.pdf}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=6329</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=6329"/>
		<updated>2011-03-22T20:56:15Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:Mary Van Gils&lt;br /&gt;
*Description:Yelp Outline&lt;br /&gt;
*Link to your outline:{{http://cyber.law.harvard.edu/is2011/sites/is2011/images/_Yelp_outline.doc}}&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|MaryVanGils|Yelp Outline|http://cyber.law.harvard.edu/is2011/Images/Yelp_outline.doc(file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
Corey MacDonald&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Corey MacDonald|Communication for the Fringe: Sites that cater to the unrepresented or under-represented audience.|http://cyber.law.harvard.edu/is2011/Image:Outline_MacDonald_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Laura Connell&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Laura Connell|The impact of internet piracy on the UK creative industries (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_3_Prospectus.pdf}}&lt;br /&gt;
&lt;br /&gt;
Yu Ri Jeong&lt;br /&gt;
{{AssignmentInfo|Yu Ri Jeong|Collective Intelligence in South Korea: Study on Architecture and Governance of Naver Knowledge iN (Assignment #3)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_3_Project_Outline.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Jennings|Annuity Companies&#039; Social Media Communities(Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:_Outline_of_annuity_social_media.doc‎}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kristina Meshkova&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alokika Singh|Feminist Movement in India and the Internet (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:MARCH_22_singh.singh.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Lorena Abuín|Media role in the contribution to prosecuted online activities (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Assignment_3_-_Lorena_Abu%C3%ADn.pdf}}&lt;br /&gt;
&lt;br /&gt;
Jillian York&lt;br /&gt;
{{AssignmentInfo|Jillian C. York|Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
Faye Ryding&lt;br /&gt;
{{AssignmentInfo|Faye Ryding|What are the explicit and implicit policies for dealing with trolls and vandals on epinions.com?| http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
Syed Yasir A. Shirazi&lt;br /&gt;
{{AssignmentInfo|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:SYAS-Assignment_3-Outline-Pledgebank%27s_Community.pdf}}&lt;br /&gt;
&lt;br /&gt;
Guy Clinch{{AssignmentInfo|Guy Clinch|The Transition to Next Generation 9-1-1 in North America &lt;br /&gt;
(Assignment #3)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anna &amp;amp; Adriana {{AssignmentInfo|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil (Assignment #3)| http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
Ed Arboleda {{AssignmentInfo|Ed Arboleda|Hyperlocal Websites and Community Activism Outline|http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_HES_Internet_and_Society_Assignment3.pdf(file}}&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_HES_Internet_and_Society_Assignment3.pdf&amp;diff=6328</id>
		<title>File:Ed Arboleda HES Internet and Society Assignment3.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_HES_Internet_and_Society_Assignment3.pdf&amp;diff=6328"/>
		<updated>2011-03-22T20:52:11Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:HES_Internet_and_Society_Assignment3.pdf&amp;diff=6327</id>
		<title>File:HES Internet and Society Assignment3.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:HES_Internet_and_Society_Assignment3.pdf&amp;diff=6327"/>
		<updated>2011-03-22T20:46:18Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=6151</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=6151"/>
		<updated>2011-03-08T16:56:43Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* David Ardia, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
* James Grimmelmann, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1760151 Sealand, HavenCo, and the Rule of Law]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
Perhaps I am missing some of the complex nuances of the arguments, but to me the resolution seems straightforward.  Laws exist to govern people not machines.  The legal entities are citizens, companies and governments, not routers and servers.  Every Internet web service is a transaction between two legal entities at each endpoint with subcontractors facilitating the transport.  The Internet or, more precisely, the collection of independent service providers that comprise the Internet, should be regulated in the same manner that all domestic and foreign commerce is managed today.  Germany, for example, requires every German web site to include an &amp;quot;impressum&amp;quot; page listing the legal owner of the site and contact information.  Just as it is more complex to import and export goods across national boundaries, we should expect similar complexities with transnational web services.  Whether or not we agree with the laws of a particular sovereign nation, it seems prudent that international law should preside in cyberspace as surely as anywhere else on the planet. [[User:ChrisSura|-Chris Sura]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi. I just want to encourage anyone who hasn&#039;t yet read the optional reading by Grimmelmann on the fate of HavenCo to do so; it&#039;s a terrific read. I find the central irony of the piece - essentially that HavenCo, ostensibly an organization devoted avoidance of the law, was actually heavily dependent on the rule of law to operate, and that lack of law, not the opposite, is what ultimately destroyed HavenCo - to be fascinating. [[User:BrandonAndrzej|BrandonAndrzej]] 04:17, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Like any good reader of mystery novels who once hooked into the plot flips to the back of the book to discover the ending, my curiosity forced me to google what happened to HavenCo and Sealand.  Found http://www.theconstitutional.org/2011/02/15/sealand-and-havenco-part-ii-the-rise-and-fall-of-havenco/.  Will take Brandon&#039;s suggestion and read the optional reading on the subject, but for the quick answer here it is.  [[[[User:Sjennings|sjennings]] 14:55, 8 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
I was truly inspired by Orin Kerr&#039;s The Problem of Perspective in Internet Law. Someone who is deeply curious about Internet Law has to read this review! The basic legal principle of application of law based on fact raises a fundamental question within Internet Law. The most critical issue of current digital law is not how to list all the newly created technologies but on which perspective we are going to observe the case and apply laws. The view points of users and outsiders can be very tricky but need to be clarified for more accurate legal judgment. I would love to read the rest of this review and other related topics so that I develop better insights in analyzing Internet controversies. --[[User:Yu Ri|Yu Ri]] 15:20, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thanks Brandon and Sjennings for the tips - I was also curious about the fate of HavenCo, and found it particularly interesting to learn that they were originally founded and registered in the UK. So yes, much more dependent on law than they led the public to believe. It also seems shortsighted that, in an effort to stretch the boundaries of the Internet, they saw the creation of a new physical space with its own set of lax regulations as the ultimate design. Other rebellious projects (i.e., torrent services, wikileaks, etc) were able to accomplish as much by operating entirely within the virtual space and defying territorial boundaries. [[User:Jsanfilippo|Jsanfilippo]] 16:01, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In reading “The Problem of Perspective in Internet Law” it brought up some interesting thoughts about the blurring between the “physical” and “virtual” worlds. How will law govern these types of scenarios in the future?  In November, there was a sale of virtual property for $335K in the Virtual Entropia Universe. This was the largest virtual real estate deal to date and creates a whole new set of challenges with Internet law.  What laws do you apply/enforce to a property that technically does not exist in the true sense of the physical definition?  [[User:Earboleda|Earboleda]] 16:56, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5992</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5992"/>
		<updated>2011-03-02T04:18:11Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5991</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5991"/>
		<updated>2011-03-02T04:16:53Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think Crowd Funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5990</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5990"/>
		<updated>2011-03-02T04:14:28Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think Crowd Funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5959</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5959"/>
		<updated>2011-03-01T17:09:14Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Links from Class */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* John Nichols and Robert W. McChesney, [http://www.thenation.com/article/death-and-life-great-american-newspapers The Life and Death of Great American Newspapers]&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* Nieman Journalism Lab, [http://www.niemanlab.org/2009/06/four-crowdsourcing-lessons-from-the-guardians-spectacular-expenses-scandal-experiment/ Four crowdsourcing lessons from the Guardian’s (spectacular) expenses-scandal experiment]&lt;br /&gt;
* [http://sunlightfoundation.com/ Sunlight Foundation website] - just look around the site to see what they are up to&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.ftc.gov/opp/workshops/news/jun15/docs/new-staff-discussion.pdf FTC Staff Discussion Draft, Potential Policy Recommendations to Support the Reinvention of Journalism] - just skim it&lt;br /&gt;
* Leonard Downie, Jr., and Michael Schudson, [http://www.cjr.org/reconstruction/the_reconstruction_of_american.php?page=all The Reconstruction of American Journalism]&lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
*  Reposting this because, after reading all the material for this week, I&#039;m realizing that it&#039;s outrageously relevant.  Watch it!:&lt;br /&gt;
**  [http://web.mit.edu/comm-forum/forums/online_news.html#abstract ONLINE NEWS: Public Sphere or Echo Chamber?] -   ~~[[User:mcforelle|mcforelle]] 17:00, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I can readily sympathize with this week’s selected authors.  It is unquestionable that the state of journalism is declining, and it was declining long before the Internet was to available to blame.  I had been involved in local politics from the mid 1980’s until a few years ago.  At the start there were always 3 or 4 reporters attending the Selectmen’s and Finance board meetings, and 1 or 2 at every other board or commission meeting.  By the time I “retired” from politics only one local paper remained.  The sole reporter couldn’t (and still can’t) attend the meetings so he would call the local officials to ask what transpired, then write the report based on what he was told without any further fact checking.  Often the newspaper reports are wildly inaccurate.&lt;br /&gt;
While the newspaper was the government watchdog of the past, today it is usually the lone gadfly who attends all the meetings, asks the tough questions, and does whatever he can to make his voice heard.  The Internet is his most powerful amplifier.  [[User:ChrisSura|-Chris Sura]] 00:44, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fact that journalism was already declining long before the widespread of the Internet was novel to me. I assumed that emergence of citizen-led media is taking significant roles of reporting and distributing information away from the conventional media. Was it a lame excuse of the existing journal entities to explain their reduced power which is caused by factors other than the bloggers? --[[User:Yu Ri|Yu Ri]] 09:19, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
It is interesting that a proposed solution to the decline of  American journalism, is to look at  government subsidies.  Would the fact that journalists are subsidized by the government in some fashion, make it a target for political and other influences?  What would stop Congress or the President from cutting off subsidies, or having undue influence on an investigation by a reporter for an article they did not like?  The reality is that the world is changing rapidly, and that includes the way we consume information.  Social media is what helped fuel revolutions across Tunisia, and the Arab world.  This was done by empowering the people with information; not through state subsidized news outlets...  [[User:Earboleda|Earboleda]] 17:09, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=5851</id>
		<title>Collective Action and Decision-making</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=5851"/>
		<updated>2011-02-23T00:24:47Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Mass collaboration and the aggregation of information enable potentially profound changes in business and politics. In this class, we will compare and contrast the transformations in economic life and collective decision-making processes brought on the information revolution.  The discussions will also explore the role of open information systems on business and the scope for greater transparency and participation in government, politics and public life.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_2:_Prospectus|Assignment 2]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* James Surowiecki, [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html Wisdom of Crowds (excerpt)]&lt;br /&gt;
**[http://www.nytimes.com/2004/05/22/books/review/0523books-mclemee.html?ex=1400644800&amp;amp;en=43bc95eb638bfed2&amp;amp;ei=5007&amp;amp;partner=USERLAND NYT Review]&lt;br /&gt;
&lt;br /&gt;
* [http://ethanzuckerman.com/blog/?p=1125 Ethan Zuckerman&#039;s blog review of Infotopia] Great summary of the issues in the book.&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Federalist_Papers Federalist Papers] published under the pseudonym Publius.&lt;br /&gt;
* [http://www.blogpulse.com/papers/2005/AdamicGlanceBlogWWW.pdf Divided They Blog] - a paper showing trackbacks between political blogs, mentioned by Ethan Zuckerman in his review of Cass Sunstein&#039;s Infotopia&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
This week’s readings prove that groupthink is a powerful but not infallible force.  Surowiecki tells us that the average of group answers always outperforms individuals over time.  (He uses the example of how the audience of Who Wants to be a Millionaire was right 91% of the time when polled.)  Zuckerman, citing the Condorcet Jury Theorem, retorts that the case is true only if the individuals in the group tend to be right more often than not.  (Otherwise the group answer would probably be wrong 91% of the time.)  Collective decision making works only when each individual is more likely than not to make the correct decision on her own.&lt;br /&gt;
We expect an informed individual is better equipped to make a correct decision than an ignorant one, so where do we get our information?  The distinction between the Federalist Papers and the political blogosphere is telling.  While today’s political pundits advocate for their positions with at least the same fervor (if not eloquence) as Hamilton, Madison and Jay, their audiences receive messages differently.  In the 1700’s newspapers printed federalist and anti-federalist letters alongside each other while their readers evaluated both sides of the question.  Today’s blog readers select their feeds which likely matches their predispositions.  The “information cocoon” is real. [[User:ChrisSura|-Chris Sura]] 22:27, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the readings to highlight the differences that have become so polarizing in our society.  Is this because the &amp;quot;crowdsourcing&amp;quot; attitude is working against strategic thought and boosting mob mentality instead?  Maybe, to Yu Ri&#039;s point, people are being more closed in their beliefs because there is just too much information and we are on overload.  Humans in their natural way will always regroup and go to where the comfort level is....my hope is that a middle ground is found so that true intelligent discourse may again be as prevalent as it was when a man got on a soapbox in a town square one hundred years ago.  [[User:Camcloughlin|Camcloughlin]] 21:40, 22 February 2011 (UTC)  camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have praised the emergence of personalized media, so-called &amp;quot;The Daily Me,&amp;quot; as the contribution to efficiency in information gathering and classifying. Thus, it was an perplexing confrontation of reading Sustein&#039;s assertion on information cocoon dwellers. It is true that people like to hear and see what they want to hear and see and that principle applies to the online activities to some degree. While I was pondering on this notion, a certain idea came up to me: now there is this platform for diversity to spread its wings, but aren&#039;t people being more obstinate about their beliefs and tenets? It is just that I could hardly find the interchanges between liberals and conservatives in the Internet forums, except those with acrid animosity. --[[User:Yu Ri|Yu Ri]] 01:44, 22 February 2011 (UTC)   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think that the posted below concern about the purpose and structure is fair enough to draw our attention to the meaning of the curriculum; the meaning that makes a difference between well-informed person and well-educated person. No objections, of course, to the administrators of this course, they did marvelous research on relevant literature, but as some of us began noticing, the material does not follow logically to build up a skill. I know that in some countries people are spending many years to learn how to properly relate material to students, not simply make them memorize everything. In order to guess on our own what pedagogy might have been behind this giant sheer volume, we must align the material in order so that each concept will serve as a preamble for the next one, and all key terms then will be logically connected to the main scheme. It seems that after sorting out all major concepts from the minor key terms, we are aiming to arrive at the issue of ideological, society based, differences within one giant infrastructure called the internet. After examining most ideologically conflicting dimensions, we must derive a method that will keep catalytic reactions between those most extreme ideologies under control. This method, I assume, should include political, policy-based, and technological instruments. In order to build these instruments we must rely on our predecessors whose remarkable writings we have at our disposal. As some of you have already noticed that some of the writings are of a high caliber and some are of a low and average; nevertheless, they do contribute substance to the sphere of the course. It is therefore crucial to distinguish a high caliber conceptual pieces of writing from the low or mediocre type of writings. Then, we should align them in the right sequence so that we can apply our reasoning, not only memory. I guess this is as far as I should go because as we know, some of the writers are working at the Berkman Center - the host of the course. It will be unethical from my side to point out on the perplexity they may create. &lt;br /&gt;
&lt;br /&gt;
Perhaps for those who has enough imagination, imagine that after all readings that we read so far, we are exposed only to several stones on a giant planet in the giant universe with many other planets connected to it. There are terabytes of books on the net. There is so much to read about and discover. Take the DARPA internet archive alone [http://www.darpa.mil/internetbibliography.html] or the internet society resources [http://www.isoc.org/internet/history/cerf.shtml] and they will extrapolate our horizons even farther. If we will search the archives of other countries, we would have not enough lifetime to read everything that is equally worth reading as our class material. It is important however, to have a wise conventional opinion not only about the modern concepts, but also about classic definitions, and Wisdom of Crowds by Surowiecki is an excellent emitter of the &amp;quot;old school&amp;quot; discoveries. His book &#039;&#039;Wisdom of Crowds&#039;&#039; so as &#039;&#039;Wealth of the Networks&#039;&#039; is built on the original concepts he interprets. In the book &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; the Scottish journalist Charles Mackay writes about the first conglomerates of people, not connected with internet, but infatuated by the same idea of rapid enrichment through the stock market. In the first hundred pages author describes the most devastating financial bubbles and schemes instigated by John Law, the son of the banker and a creative financier, who in his &#039;&#039;Proposals and Reasons for Constituting a Council of Trade&#039;&#039;, which he presented to the British Parliament, proposed to issue a loan-for-shares based instrument which has failed a number of times and at several countries due to the rapid and large demand for one type of shares issued for sale. If we think of a stock buyers as of the web sight users, we can understand better the concept of the collective action and decision making process. Surowiecki, of course, makes an excellent example of the bias in the herd instinct when he describes the authority bias in the decision by investigative group of the shuttle&#039;s catastrophe and in the coordination of other groups of people driven by the common goal. I am confident that the experts opinion and the seer-sucker theory is in value when the majority is trying to think. It is exactly what people are trying to do in this course: people are trying to find a cognizable way to comprehend the material by cooperating and coordinating within the group. Nevertheless, I personally believe that &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; is by default the strongest platform to base our understanding both of the concepts of the internet and of the digital economics of the society.  --[[User:VladimirK|VladimirK]] 01:30, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Link to article in today&#039;s NY Times regarding Egypt&#039;s shut down during the revolution of internet within its borders:&lt;br /&gt;
http://www.nytimes.com/2011/02/16/technology/16internet.html?pagewanted=1&amp;amp;_r=2&amp;amp;hp&lt;br /&gt;
&amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 15:53, 16 February 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In reading the Surowiecki excerpt and the summary on Zuckerman&#039;s Infotopia I think it is apparent that they are discussing apples and oranges.  Surowiecki is concentrating on the crowd&#039;s ability to accurately determine a correct answer to a specific question governed by a certain criteria (e.g. how many beans in this jar or which one of these four possible answers is correct).  Zuckerman, on the other hand, is looking at the human behavior and ideology aspect which has no defined criteria or &amp;quot;right&amp;quot; answer.  When asking the crowd what their opinion is regarding a particular issue the answers will undoubtedly depend on the individual&#039;s personal beliefs and past experiences which vary greatly from person to person.  If the ideological question is framed in such a way that there is a limited selection of answers, such as in polling, the individuals will gravitate towards the answer which most fits their personal belief.  While this will allow for an analysis of what the &amp;quot;majority&amp;quot; of the crowd prefers it does not necessarily mean that majority is correct.  Once the human condition is allowed to enter the equation the ability to determine what is correct vs. what is preferred is gone.&lt;br /&gt;
--[[User:Rakundig|Rakundig]] 10:37, 17 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Dear&#039;&#039;&#039; Fellow Internet and Society Classmates:&lt;br /&gt;
&lt;br /&gt;
I am writing with a proposal.  February 22 will be our forth meeting as a class which marks the milestone that  we are more than one quarter of the way through the material we will study during the semester. During the last several classes we have studied examples of commons based production including Wikipedia and we are using a wiki based tool for asynchronous class discussions. Not to take anything away from the quality of the content of those contributions, one thing that has been missing is a structure and purpose.&lt;br /&gt;
 &lt;br /&gt;
My proposal is that starting this week we begin to put into practice some of the things that we have learned to date. That is, below I have constructed a set of notes on what I have taken away from the class. I invite you in the spirit of Wikipedia to edit, comment upon, contribute to and in other ways improve what I have written in a collaborative search for a common understanding of the materials presented in this course. If you are so inclined, I ask you to follow a small set of basic tenets that are described on the [http://cyber.law.harvard.edu/is2011/edit/Talk:Collective_Action_and_Decision-making Discussion page].&lt;br /&gt;
  &lt;br /&gt;
I hope that you will join me in this project. I believe a commons based approach to summarize what we have learned so far will benefit us all in translating the great information Rob and David have introduced to us. No two of us have walked away from any class discussion nor reading, nor listening, nor viewing with the exact same perception of what has been discussed. Below presents a opportunity for us all, those who gather in Cambridge and those who participate at a distance, to come to a closer mutual understanding. &lt;br /&gt;
&lt;br /&gt;
Join me below to flesh out what I have begun. Add references that I have missed, correct statements that are in accurate, add your unique insight so that we can all come to a better common understanding. &lt;br /&gt;
Thank you in advance for your willingness to participate. &lt;br /&gt;
&lt;br /&gt;
Guy --[[User:Gclinch|Gclinch]] 04:06, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can certainly count on my support and participation! I think it&#039;s a great idea to summarize what we have learned &#039;in a mass collaboration approach&#039;; nonetheless, I consider that it would be much better if we can create another page to aggregate all the information from lectures apart from opinions or questions of the discussion section. I might have interpreted your purpose in an unexpected way, so please do not hesitate to share your brilliant ideas! Thank you. --[[User:Yu Ri|Yu Ri]] 08:04, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If each of us have less than a 50% chance of being right about a decision, a group of us will be worse at making a correct decision, with our probability of accuracy increasing towards zero as the size of the group increases.&amp;quot; [http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/]&lt;br /&gt;
&lt;br /&gt;
I thought this quote highlighted what could be a hurdle for Wikipedia, insofar as the potential for an unlimited pool of contributors. While it does not appear to be a problem at present (if anything, they seem eager to include more individuals in the project), I&#039;d be curious if and when they will reach a tipping point. - [[User:Jsanfilippo|Jsanfilippo]] 18:19, 22 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Dear [http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri] ,  Thank you for your kind words. You have interpreted my purpose exactly. Are you suggesting that the topic of Internet and Society would make a good Wikipedia article? If so, I agree.  I checked and someone looks to have begun [http://en.wikipedia.org/wiki/Internet_and_Society one on this exact topic], but contributed only a small amount and has not been modified the informing since 2009. Would you suggest  we pick up where that author left off? --[[User:Gclinch|Gclinch]] 00:24, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Dear Guy,That sounds awesome! Probably we can reconstruct the contents of the article and start filling out relevant information in no time. I would be happy to contribute my effort in improving or re-editing this article on Wikipedia. Feel free to contact me with any suggestion regarding this project. --[[User:Yu Ri|Yu Ri]] 02:18, 22 February 2011 (UTC) &lt;br /&gt;
++++&lt;br /&gt;
&lt;br /&gt;
To use the term from economics, this course is built “on the shoulder of giants.” The three main giants are [http://en.wikipedia.org/wiki/Zittrain Jonathan Zittrain], [http://en.wikipedia.org/wiki/Lawrence_Lessig  Lawrence Lessig], and [http://en.wikipedia.org/wiki/Yochai_Benkler Yochai Benkler]. The course is also supplemented by a number of other influential thinkers who will be mentioned below.&lt;br /&gt;
&lt;br /&gt;
Each of these individuals has contributed a block in the foundation of a set of tools that we students can use to understand the effects that digital technologies are having on our society, culture, government and personal lives today and into the future. &lt;br /&gt;
&lt;br /&gt;
Rob told us that the best way to absorb this material is to begin with Zittrain, progress to Lessig and build to  Benkler.  Along the way we will interject relevant references to other influential thinkers.&lt;br /&gt;
&lt;br /&gt;
In his book, [http://yupnet.org/zittrain/archives/6 The Future of the Internet: and how to stop it] Jonathan Zittrain begins by describing how the Internet emerged at a time when inexpensive fully customizable multiuse computers became available to large numbers of technology tinkerers. The proliferation of these plastic (in the sense of the word that means malleable) platforms combined with unexpected success of the Internet Protocol for connecting these powerhouses of innovation together to link people across time and distance allowed the property of  Generativity to emerge. &lt;br /&gt;
&lt;br /&gt;
Defined as, “[http://en.wikipedia.org/wiki/Generativity an independent ability to create, generate, or produce new content unique to that system without additional help or input from the system&#039;s original creators]” the generative properties of the Internet allowed it to attain “[http://yupnet.org/zittrain/archives/8#2 mainstream dominance] over [http://yupnet.org/zittrain/archives/8#1 proprietary barons such as AOL, CompuServe, and Prodigy.]”&lt;br /&gt;
&lt;br /&gt;
Zittrain describe the following five properties of generativity as important to our discussion: Leverage, Adaptability,  Ease of mastery, Accessibility and Transferability. Important to beginning to build our model, Zittrain describes how the “[http://yupnet.org/zittrain/archives/13#1 hourglass architecture]” of the internet facilitated generativity through a layering property that broke the network into three logical layers. The hourglass is an intellectual concept and not a tangible thing. It helps people who wish to create innovations to focus on their specialty without needing to be concerned how other pieces of the puzzle that are necessary to make things happen work. Layers communicate with each other based on a set of properties that are native to each layer and understood by the others. In essence a digital [http://en.wikipedia.org/wiki/Esperanto Esperanto] or commonly understood language between layers.&lt;br /&gt;
&lt;br /&gt;
The model features “[http://yupnet.org/zittrain/archives/13#3 an ‘application layer,’ representing the tasks people might want to perform on the network].” The foundation of the hourglass is “[http://yupnet.org/zittrain/archives/13#3 the ‘physical layer,’ the actual wires or airwaves over which data will flow].” The middle layer is where the true ingenuity of the model lives. It is “[http://yupnet.org/zittrain/archives/13#3 the ‘protocol layer,’ which establishes consistent ways for data to flow so that the sender, the receiver, and anyone necessary in the middle can know the basics of who the data is from and where the data is going].”&lt;br /&gt;
&lt;br /&gt;
Combined the power of the plastic processing platforms on the edge and unrestrained flow of information across the digital network unleashed a wave of innovation and creativity never before seen in the history of humanity. There is more important information in Zittrain’s about how the combination of economic, cultural security concerns and other forces are today combining to extinguish the generative nature that the Internet created. I am sure we will return to these topics later in the course. &lt;br /&gt;
&lt;br /&gt;
The next element of our foundational model comes from Lawrence Lessig. In his book [http://codev2.cc/download+remix/Lessig-Codev2.pdf  Code: version 2.0] professor Lessig describes that the Internet is what it is because of decisions that have been made by the designers of the system about how the system will work.  This means that the Internet is not of some natural evolution or from some divine design, it is a creation of human invention. &lt;br /&gt;
&lt;br /&gt;
In the early days of the Internet there was an overriding ethos that the Internet was ungovernable and beyond regulation. Notable thinkers including [http://en.wikipedia.org/wiki/John_Perry_Barlow John Perry Barlow] spoke “behalf of the future” to say, “[http://ww2.cs.mu.oz.au/~zs/decl.html no moral right to rule us nor do you possess any methods of enforcement .]“&lt;br /&gt;
&lt;br /&gt;
Lessig defeats the claim of no methods of control by describing a combination of factors including commercial motivations, user acquiescence to improve convenience, security, regulatory and other concerns that have resulted in innovation in the application layer that in turn has resulted in the implementation of features that are creating the opportunity for significant control. &lt;br /&gt;
&lt;br /&gt;
We also discussed how [http://en.wikipedia.org/wiki/Jack_Goldsmith Harvard Law School professor Jack Goldsmith] and [http://en.wikipedia.org/wiki/Tim_Wu Columbia Law School Tim Wu] showed not only do laws of local jurisdictions impose regulation on the internet and its users  so do local geographical cultural and other factors [http://www.legalaffairs.org/printerfriendly.msp?id=961].&lt;br /&gt;
&lt;br /&gt;
Lessig describes how the cumulative effect of Markets, Laws, Social norms result in the equation that Code = law. In other words, the decisions made by those who create the underlying code that makes the Internet possible result in a cumulative effect of establishing governance. The format of that governance is a direct result of the conscious choices made by those who design and implement the system. The decisions on what goes into the code are a result of Markets, Laws and Social norms.&lt;br /&gt;
&lt;br /&gt;
The third element of the foundation of the way we are describing the effects of digital technologies on our society comes from the seminal work by Yochai Benkler, [http://yupnet.org/benkler/ The Wealth of Networks]. Benkler informs us that digital technologies are creating an environment in which a, &amp;quot;[http://mitworld.mit.edu/video/396 radical decentralization of capitalization and computing resources is allowing every connected person, some 600 million to a billion people, to have the means to engage in info knowledge and cultural production].” Benkler argues that the “industrial information economy” is giving way to a new model of human contribution based upon a “commons” approach to innovation.&lt;br /&gt;
 &lt;br /&gt;
He painstakingly documents how the system for protecting  what is commonly known as intellectual property  that was originally  meant to foster economic growth is actually considerable less efficient on a macroeconomic level  than a model in which innovation is freely contributed.  &lt;br /&gt;
&lt;br /&gt;
Benkler argues that the prevailing theory of protecting an individual and organization’s right to control how their innovations are used (and influence how they are compensated for such use) creates such considerable transaction costs for those who might otherwise build upon previous innovations to create new products, services, works of art and other contributions to the betterment of society as a whole that they choose not to do so because of the imposed cost burden.  &lt;br /&gt;
Benkler provides numerous examples that show how a commons based approach has resulted in significantly better, richer and more beneficial layers of innovation.&lt;br /&gt;
  &lt;br /&gt;
[http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php#  Kevin Kelly] demonstrates that in a “Benkleresque” world where information might be freer and ideas less subject to the artificial scarcity created by “Intellectual Property and Copyright” laws overall wealth in the economy would be greater due to the generative effects discussed by Zittrain. Kelly states that  producers would still be enriched because people are still be willing to pay monies associated to various factor involved in the conveyance of information.  In additional new forms of distribution would further increase overall good. &lt;br /&gt;
&lt;br /&gt;
Along the way we have also talked about several recurring themes. These include:&lt;br /&gt;
&lt;br /&gt;
- Internet infrastructure which is foundational, multipurpose; &lt;br /&gt;
- Innovation and public spaces&lt;br /&gt;
- Networks, openness, distributed, decentralized&lt;br /&gt;
- Digital disruption: challenges to existing institutions&lt;br /&gt;
&lt;br /&gt;
Under the topic of Digital disruption, we talked about how the &amp;quot;[http://en.wikipedia.org/wiki/Dot-com_bubble dot-com bubble]&amp;quot;  a surge in financial speculation in digital technologies from roughly 1995 to 2000 resulted in a financial market crash that disrupted economies across the globe.&lt;br /&gt;
&lt;br /&gt;
We discussed how Chris Anderson, author and editor-in-chief of Wired Magazine has shown how digital technologies have unleashed a “[http://www.wired.com/wired/archive/12.10/tail.html long tail of innovation]” that is resulting in fundamental shifts in markets. &lt;br /&gt;
&lt;br /&gt;
[http://forum-network.org/lecture/boston-ideas-2005-eric-von-hippel Eric von Hippel]  shows, in relative parallel to the Benkler proposition, that digital technologies are empowering society and increasing social welfare by shifting innovation up into the user layer. That is digital technologies are shifting the source of innovations from the traditional manufacturer to user generated creation.  He shows how end users, who know intimately more about the ways something is important and how it can be improved are becoming a dynamic source for new creation and improvement.&lt;br /&gt;
&lt;br /&gt;
(New post) Ethan Zuckerman&#039;s review of &#039;&#039;Infotopia&#039;&#039; made me want to read Sunstein&#039;s book. The breadth of topics that Sunstein explores is impressive. From my organizational behavior perch, I especially liked the coverage of group think and cocooning. As an added bonus, Zuckerman contributes another layer of insight in his treatment of Sunstein&#039;s themes.--[[User:SCL|SCL]] 03:29, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hey all!  I found this really interesting little study I found on a woman&#039;s personal blog, which she called &amp;quot;[http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!],&amp;quot; that I thought might be interesting to share.  Courtney Stanton wrote a post on her WordPress blog about women, haters, and rape culture in online gaming, and was so astounded by the responses to the post that she decided to do a wee study on the trolls of those comments.  I thought it was neat to see her methodology, how she broke things down and the conclusions she came to - basically, that trolls contribute nothing (which we all already knew, but now we know the characteristics of their nothingness), and that allowing thoughtful responses to a contentious topic, whether or not you agree with them, can actually foster respectful conversation and be good for you and your blog.  I thought this was particularly relevant giving the theme of &amp;quot;cocooning&amp;quot; in this week&#039;s readings.  Would it be appropriate for me to add this under the &amp;quot;Links&amp;quot; section of this page, with a little description and a disclaimer that it is student-submitted and not from the profs/TAs? --[[User:mcforelle|mcforelle]] 19:03, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In earlier discussions today, there was a mention of manufacturers such as Apple trying to ensure that customers do not modify/hack their products.  They faced the potential of having their phones (IPhone) shut off by their carrier.  This atmosphere of fear seems to be pervasive across manufacturers to keep their customer “in line” at times.  The “fear” of potential safety issues is one that has worked on me more than once.  Naturally if customers can modify existing products on their own,  they may not need to buy the next version of a manufacturer&#039;s product.  [[User:Earboleda|Earboleda]] 00:24, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*  [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html/ Clay Shirky TED Talk]&lt;br /&gt;
* [http://www.businessweek.com/innovate/content/feb2007/id20070201_774736.htm goldcorp story] (worth reading)&lt;br /&gt;
* [http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!] - Courtney Stanton&#039;s study of responses to a blog post about women and rape culture in gaming, focusing on the content of the comments and comparing civil discussion to trolling.  A quick read, interesting analysis.  --[[User:mcforelle|mcforelle]] 22:01, 22 February 2011 (UTC)&lt;br /&gt;
* some links on Apple&#039;s new subscription model:&lt;br /&gt;
** [http://mashable.com/2011/02/15/apple-subscription-model/ Apple&#039;s New Subscription Model]: Christina Warren, Mashable&lt;br /&gt;
** [http://www.readwriteweb.com/archives/apple_subscription_model.php The New New Media: Apple&#039;s Subscription Model]: Richard MacManus, ReadWriteWeb&lt;br /&gt;
** [http://www.pcmag.com/article2/0,2817,2380742,00.asp Top 4 Publisher Objections to Apple Subscriptions]: Peter Pachal, PCMag&lt;br /&gt;
** [http://mediadecoder.blogs.nytimes.com/2011/02/15/apple-offers-subscriptions-for-all-ipad-publications/?partner=rss&amp;amp;emc=rss Apple Offers Subscriptions for Apps]: JEREMY W. PETERS and MIGUEL HELFT, NYTimes&lt;br /&gt;
* Ethan Zuckerman on [http://www.ethanzuckerman.com/blog/2008/04/25/homophily-serendipity-xenophilia/ Homophily, serendipity, and xenophilia] -- an interesting response to the &amp;quot;silo&amp;quot; theory (aka homophily) we discussed in class. --[[User:RebekahHeacock|RebekahHeacock]] 00:15, 23 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5752</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5752"/>
		<updated>2011-02-22T04:42:08Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_Prospectus.pdf&amp;diff=5750</id>
		<title>File:Ed Arboleda Prospectus.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Ed_Arboleda_Prospectus.pdf&amp;diff=5750"/>
		<updated>2011-02-22T04:35:36Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_1_Submissions&amp;diff=5440</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_1_Submissions&amp;diff=5440"/>
		<updated>2011-02-08T22:34:00Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Public_good&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:LNLandrum_Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http//en.wikipedia.org/wiki/Bank_secrecy&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:Wikipedia Neutral Point of View.doc &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 20:48, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Windows_Phone_7&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Brian_Smith_-_Ownership_Rule_v2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 18:36, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Great_Firewall_of_China&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment1_Report_Y_Kim.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Susan Jennings: &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Indexed_annuity&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:Assignment_No._1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 00:17, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Internet_censorship#Burma&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Jillian_C_York_-assignment_1.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Guy Clinch --[[User:Gclinch|Gclinch]] 17:24, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Enhanced_9-1-1&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_1_%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Kruglyak: [[User:VladimirK|VladimirK]] 20:27, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:The_rule_you_chose.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Gagan Panjhazari [[User:gpanjhazari|gpanjhazari]] 07:24, 6 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:GP-Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 04:21, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Polling_is_not_a_substitute_for_discussion&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/DSR-570&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment-1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alex Solomon&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brandon A Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 03:52, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/History_of_crossbows&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:BrandonAndrzejAssignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak --[[User:VladimirTrojak|VladimirTrojak]] 13:50, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Telecommunications_data_retention&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_1_wikipedia_report.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Adriana Torii[[User:drifaria]]  &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/IPO&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Wikipediaassignment.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User: singh singh]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Network_neutrality&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Feb._8.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Lorena Abuín [[User:lorenabuin]]&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Sociedad_General_de_Autores_y_Editores&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment_1_-_Lorena_Abu%C3%ADn.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi [[User:syedshirazi]]&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Group_buying&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Shirazi_Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda [[User:earboleda]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Provisional_application&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:HES_Assignment1.pdf&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:HES_Assignment1.pdf&amp;diff=5436</id>
		<title>File:HES Assignment1.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:HES_Assignment1.pdf&amp;diff=5436"/>
		<updated>2011-02-08T22:27:03Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: Ed Arboleda: Assignment One&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ed Arboleda: Assignment One&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User:Earboleda&amp;diff=5400</id>
		<title>User:Earboleda</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User:Earboleda&amp;diff=5400"/>
		<updated>2011-02-08T16:46:28Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: New page: I am currently a Harvard Extension School student living in the Northeast United States.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am currently a Harvard Extension School student living in the Northeast United States.&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5208</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5208"/>
		<updated>2011-01-26T03:03:12Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below or be prepared to offer them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* [http://articles.cnn.com/2010-12-02/opinion/mackinnon.wikileaks.amazon_1_wikileaks-founder-julian-assange-lieberman-youtube?_s=PM:OPINION Rebecca MacKinnon: WikiLeaks, Amazon and the new threat to internet speech]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
The ways in which these mediums have changed how we relate to each other can certainly be seen to have both positive and negative connotations.  In the age of &#039;instant information&amp;quot; we should question how much is worthy of our attention on first blush, and what is really noise and a waste of time.  Those that manage the digital medium as opposed to it managing them are the real winners in the availability of opportunities. &lt;br /&gt;
&lt;br /&gt;
However some of the most positive aspects can be seen in our new ability to see other countries through the lens of information from citizens themselves and this has inspired a higher spirit of collaboration the world over. &lt;br /&gt;
&lt;br /&gt;
The uprising in Iran a couple of years ago, would never have gotten the world attention that it did before the advent of the social mediums that allowed the demonstrations to be viewed by millions.  The Haiti earthquake (and many other disasters) and the quickness of the response was helped by the instant donation portals that were set up to facilitate monies where they were most required.  Doctors collaborating around the world on cases and learning from those experiences is another example of how we grow our cultures for the good.   &lt;br /&gt;
&lt;br /&gt;
A &amp;quot;virtual choir&amp;quot; of 12 different countries bringing singers together showed a true spirit of co-operation among peoples.&lt;br /&gt;
http://www.youtube.com/watch?v=D7o7BrlbaDs&lt;br /&gt;
&lt;br /&gt;
We have choices in how we use all these mediums and yes there will always be an disturbing and dark aspects to it but looking at all the possibilities we have a world of substantive opportunities.  --camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The most significant change associated with digital technologies is precisely how pervasive the changes are.  These technologies affect the manner and effect of how we conduct ourselves in society: the way we read and learn, are entertained, communicate, interact professionally and personally, and express ourselves.  As such much of our existing laws and norms need to be rethought, reinterpreted, and rewritten.  This sort of technological change has happened before (i.e. printing press or radio) but never at such a scale and speed.&lt;br /&gt;
&lt;br /&gt;
To focus in specifically on these digital technologies specifically, the biggest impacts come from their reach, social nature, and longevity.  First, due to being replicable and instantaneous, a person or group using digital technologies can reach a massive audience with their message, around the world, through many channels.  Second, given the ability to continuously publish and others to respond, over time a single message can grow into a dialogue which can grow into a living social conversation, and ultimately coordinated action.  Third, the ability now exists to have a permanent, discoverable, and recorded conversation.  These are all tremendous changes to the way societies function. --[[User:Smithbc|Smithbc]] 13:08, 25 January 2011 (PST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of digital technology is much like a hot war. As the Developer or Engineer creates, the digital Guerrilla works to free the technology. The greater the advance of the tools made available to the masses it becomes more and more difficult to protect an idea. One could say that ultimately the ideas are improved by the unconstrained &amp;quot;testing&amp;quot; digital liberator/Hackers subject digital creations to. --[[User:Buie|Buie]] 20:34, 25 January 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Improvements in digital technologies and the pace at which they are happening are making it increasingly more difficult for companies to innovate and compete.  Investing in research initiatives are at the forefront while still trying to devote resources to building that next biggest thing that will reach the largest number of users.--[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I agree with Edwardshinp regarding security.  It&#039;s not just an issue of security of financial data for transactions, but we are looking at national security, corporate espionage, etc.  Anything where we&#039;re engaging in the sharing of information. --[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The economic impact of the Internet and digital technologies can be significant.  Outsourcing job functions to countries outside the United States for instance, was facilitated in part by the ability of the Internet to deliver real time data across the globe.  IP telephony, high speed video and data transmitted on the Internet allowed for workers to be “virtual”, anywhere in the world.  This created cost savings and efficiencies for corporations while fueling growth in emerging countries.  Domestically, this has lead to displaced workers and job losses across many fields.  --Earboleda&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
A couple of months post-Wikileaks, and we&#039;re already seeing various similar organizations and entities (and even instances of leaking) crop up; while I don&#039;t support all of WikiLeaks&#039; leaks necessarily, I do support the overall idea of information leaking; and in the case of, for example, the Palestine Papers (recently leaked to Al Jazeera), think that it can be very effective in demonstrating hypocrisy in governments.&lt;br /&gt;
&lt;br /&gt;
I also take serious issue with the handling of WikiLeaks by American companies Amazon, Mastercard, PayPal, EasyDNS, and Tableau.  All acted under potential pressure from Sen. Joe Lieberman, and the vast majority gave &amp;quot;copyright infringement&amp;quot; as their excuse, more or less.  If we excuse this behavior in the instance of WikiLeaks, then we&#039;re headed down a slippery slope: Do we then excuse similar intermediary censorship when levied against a human rights organization? [[User:Jyork|Jyork]] 22:23, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;br /&gt;
&lt;br /&gt;
In my opinion, if we use the standard definition of what constitutes a &amp;quot;media organization&amp;quot; based on U.S. Code Title 2, Section 1602, a person or entity engaged in disseminating information to the general public through a newspaper, magazine, other publication, radio, television, cable television, or other medium of mass communication; then Wikileaks is just that and would be entitled to protections as such.  I don&#039;t agree with the way Wikileaks is carrying out it&#039;s mission on a philosophical level. There are other means that could be used to promote and encourage transparency in government without endangering people&#039;s lives. --[[User:Dreed07|-dreed07]] 20:13, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WikiLeaks is a content provider.  They are not terrorists because they do not attempt to destroy or disrupt the Internet.  They are simply providing content which some people find objectionable.  If we set aside the question of how they obtained the information then the remaining question is whether they have a legal or moral right to disseminate it.  WikiLeaks is not based in the U.S. so it is not subject to U.S. laws.  They are not publishing credit card or social security numbers.  They are not publishing copyrighted or proprietary material.  They are editorializing, but that is still the prerogative of a free press.  They at least showed some self-restraint by selectively publishing what they felt to be newsworthy and redacted sensitive information that could bring harm to others.  They are not in the same league as the New York Times.  They are not even writing their own stories.  But they are taking an editorial position by selecting which content to provide, which gives them some claim to being a journalism organization.&lt;br /&gt;
-Chris Sura&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=List_of_User_Profiles&amp;diff=5200</id>
		<title>List of User Profiles</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=List_of_User_Profiles&amp;diff=5200"/>
		<updated>2011-01-26T00:01:10Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of user profiles on this wiki.  Until a consensus on policy is come to, this listing will be voluntary.&lt;br /&gt;
&lt;br /&gt;
This page differs from the [[Special:ListUsers|User List]] page in that this page contains only active profiles of individuals who wish to contribute to this wiki.  Please add yourself by clicking on the appropriate edit button next to the letter range that corresponds to your user name.&lt;br /&gt;
&lt;br /&gt;
==Users==&lt;br /&gt;
&lt;br /&gt;
===A-G===&lt;br /&gt;
&lt;br /&gt;
=====alexleavitt=====&lt;br /&gt;
I am a research assistant at Microsoft Research, as well as a researcher for the Comparative Media Studies department at MIT, Microsoft Entertainment &amp;amp; Devices, and the Web Ecology Project. I graduated Boston University in 2009, and I am currently applying to graduate school.&lt;br /&gt;
&lt;br /&gt;
=====Dardia=====&lt;br /&gt;
I am a fellow at the [http://cyber.law.harvard.edu/ Berkman Center for Internet &amp;amp; Society] and the director of the [http://dmlp.org/ Digital Media Law Project].  In a past life I was assistant counsel at The Washington Post and before that was an associate at Williams &amp;amp; Connolly in Washington, DC, where I handled a range of intellectual property and media litigation.&lt;br /&gt;
&lt;br /&gt;
=====donaldphussey=====&lt;br /&gt;
I am an ALB student in Social Sciences with a focus in Government.  By day, I am an SVP for Global Internet Strategy for a big bank.  I live in New York and am attending online.&lt;br /&gt;
&lt;br /&gt;
=====Earboleda=====&lt;br /&gt;
I work for a large financial institution in the Northeast, and will be attending class on-site and online.&lt;br /&gt;
&lt;br /&gt;
===H-M===&lt;br /&gt;
&lt;br /&gt;
===N-S===&lt;br /&gt;
&lt;br /&gt;
=====RebekahHeacock=====&lt;br /&gt;
I&#039;m a project coordinator at the [http://cyber.law.harvard.edu/ Berkman Center for Internet &amp;amp; Society] and the co-director of the [http://transparency.globalvoicesonline.org/ Technology for Transparency Network].  I recently graduated from the Columbia University School of International and Public Affairs, where I studied the relationship between communications technologies and development.&lt;br /&gt;
&lt;br /&gt;
=====RobertCu=====&lt;br /&gt;
I&#039;m a card carrying member of the eff and the fsf and one of the inaugural viewers of zdtv. I went to the same prep school as the founder of wired magazine and personally lobbied she get a well deserved alumni award.  I&#039;ve attended many different colleges everywhere from st. johns college the great books school in Annapolis where I had a dsl line installed to my dorm room giving me more bandwidth then the rest of campus combined, to where I am now, the Harvard extension school where I am a alb degree candidate. Even though I&#039;m conversant in python, html, c++, and ti-basic I&#039;m a humanities concentrator. My favorite authors are Borges, O&#039;brien, Doctorow(cory not e.l), Aristotle, and Lessig.&lt;br /&gt;
&lt;br /&gt;
===T-Z===&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5198</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5198"/>
		<updated>2011-01-25T23:47:07Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below or be prepared to offer them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* [http://articles.cnn.com/2010-12-02/opinion/mackinnon.wikileaks.amazon_1_wikileaks-founder-julian-assange-lieberman-youtube?_s=PM:OPINION Rebecca MacKinnon: WikiLeaks, Amazon and the new threat to internet speech]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
The ways in which these mediums have changed how we relate to each other can certainly be seen to have both positive and negative connotations.  In the age of &#039;instant information&amp;quot; we should question how much is worthy of our attention on first blush, and what is really noise and a waste of time.  Those that manage the digital medium as opposed to it managing them are the real winners in the availability of opportunities. &lt;br /&gt;
&lt;br /&gt;
However some of the most positive aspects can be seen in our new ability to see other countries through the lens of information from citizens themselves and this has inspired a higher spirit of collaboration the world over. &lt;br /&gt;
&lt;br /&gt;
The uprising in Iran a couple of years ago, would never have gotten the world attention that it did before the advent of the social mediums that allowed the demonstrations to be viewed by millions.  The Haiti earthquake (and many other disasters) and the quickness of the response was helped by the instant donation portals that were set up to facilitate monies where they were most required.  Doctors collaborating around the world on cases and learning from those experiences is another example of how we grow our cultures for the good.   &lt;br /&gt;
&lt;br /&gt;
A &amp;quot;virtual choir&amp;quot; of 12 different countries bringing singers together showed a true spirit of co-operation among peoples.&lt;br /&gt;
http://www.youtube.com/watch?v=D7o7BrlbaDs&lt;br /&gt;
&lt;br /&gt;
We have choices in how we use all these mediums and yes there will always be an disturbing and dark aspects to it but looking at all the possibilities we have a world of substantive opportunities.  --[[User:?Unknown User|?Unknown User]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The most significant change associated with digital technologies is precisely how pervasive the changes are.  These technologies affect the manner and effect of how we conduct ourselves in society: the way we read and learn, are entertained, communicate, interact professionally and personally, and express ourselves.  As such much of our existing laws and norms need to be rethought, reinterpreted, and rewritten.  This sort of technological change has happened before (i.e. printing press or radio) but never at such a scale and speed.&lt;br /&gt;
&lt;br /&gt;
To focus in specifically on these digital technologies specifically, the biggest impacts come from their reach, social nature, and longevity.  First, due to being replicable and instantaneous, a person or group using digital technologies can reach a massive audience with their message, around the world, through many channels.  Second, given the ability to continuously publish and others to respond, over time a single message can grow into a dialogue which can grow into a living social conversation, and ultimately coordinated action.  Third, the ability now exists to have a permanent, discoverable, and recorded conversation.  These are all tremendous changes to the way societies function. --[[User:Smithbc|Smithbc]] 13:08, 25 January 2011 (PST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of digital technology is much like a hot war. As the Developer or Engineer creates, the digital Guerrilla works to free the technology. The greater the advance of the tools made available to the masses it becomes more and more difficult to protect an idea. One could say that ultimately the ideas are improved by the unconstrained &amp;quot;testing&amp;quot; digital liberator/Hackers subject digital creations to. --[[User:Buie|Buie]] 20:34, 25 January 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Improvements in digital technologies and the pace at which they are happening are making it increasingly more difficult for companies to innovate and compete.  Investing in research initiatives are at the forefront while still trying to devote resources to building that next biggest thing that will reach the largest number of users.--[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I agree with Edwardshinp regarding security.  It&#039;s not just an issue of security of financial data for transactions, but we are looking at national security, corporate espionage, etc.  Anything where we&#039;re engaging in the sharing of information. --[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
A couple of months post-Wikileaks, and we&#039;re already seeing various similar organizations and entities (and even instances of leaking) crop up; while I don&#039;t support all of WikiLeaks&#039; leaks necessarily, I do support the overall idea of information leaking; and in the case of, for example, the Palestine Papers (recently leaked to Al Jazeera), think that it can be very effective in demonstrating hypocrisy in governments.&lt;br /&gt;
&lt;br /&gt;
I also take serious issue with the handling of WikiLeaks by American companies Amazon, Mastercard, PayPal, EasyDNS, and Tableau.  All acted under potential pressure from Sen. Joe Lieberman, and the vast majority gave &amp;quot;copyright infringement&amp;quot; as their excuse, more or less.  If we excuse this behavior in the instance of WikiLeaks, then we&#039;re headed down a slippery slope: Do we then excuse similar intermediary censorship when levied against a human rights organization? [[User:Jyork|Jyork]] 22:23, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;br /&gt;
&lt;br /&gt;
In my opinion, if we use the standard definition of what constitutes a &amp;quot;media organization&amp;quot; based on U.S. Code Title 2, Section 1602, a person or entity engaged in disseminating information to the general public through a newspaper, magazine, other publication, radio, television, cable television, or other medium of mass communication; then Wikileaks is just that and would be entitled to protections as such.  I don&#039;t agree with the way Wikileaks is carrying out it&#039;s mission on a philosophical level. There are other means that could be used to promote and encourage transparency in government without endangering people&#039;s lives. --[[User:Dreed07|-dreed07]] 20:13, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The economic impact of the Internet and digital technologies can be significant.  Outsourcing job functions to countries outside the United States for instance, was facilitated in part by the ability of the Internet to deliver real time data across the globe.  IP telephony, high speed video and data transmitted on the Internet allowed for workers to be “virtual”, anywhere in the world.  This created cost savings and efficiencies for corporations while fueling growth in emerging countries.  Domestically, this has lead to displaced workers and job losses across many fields.  --Earboleda&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5197</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5197"/>
		<updated>2011-01-25T23:45:08Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below or be prepared to offer them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* [http://articles.cnn.com/2010-12-02/opinion/mackinnon.wikileaks.amazon_1_wikileaks-founder-julian-assange-lieberman-youtube?_s=PM:OPINION Rebecca MacKinnon: WikiLeaks, Amazon and the new threat to internet speech]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
The ways in which these mediums have changed how we relate to each other can certainly be seen to have both positive and negative connotations.  In the age of &#039;instant information&amp;quot; we should question how much is worthy of our attention on first blush, and what is really noise and a waste of time.  Those that manage the digital medium as opposed to it managing them are the real winners in the availability of opportunities. &lt;br /&gt;
&lt;br /&gt;
However some of the most positive aspects can be seen in our new ability to see other countries through the lens of information from citizens themselves and this has inspired a higher spirit of collaboration the world over. &lt;br /&gt;
&lt;br /&gt;
The uprising in Iran a couple of years ago, would never have gotten the world attention that it did before the advent of the social mediums that allowed the demonstrations to be viewed by millions.  The Haiti earthquake (and many other disasters) and the quickness of the response was helped by the instant donation portals that were set up to facilitate monies where they were most required.  Doctors collaborating around the world on cases and learning from those experiences is another example of how we grow our cultures for the good.   &lt;br /&gt;
&lt;br /&gt;
A &amp;quot;virtual choir&amp;quot; of 12 different countries bringing singers together showed a true spirit of co-operation among peoples.&lt;br /&gt;
http://www.youtube.com/watch?v=D7o7BrlbaDs&lt;br /&gt;
&lt;br /&gt;
We have choices in how we use all these mediums and yes there will always be an disturbing and dark aspects to it but looking at all the possibilities we have a world of substantive opportunities.  --[[User:?Unknown User|?Unknown User]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The most significant change associated with digital technologies is precisely how pervasive the changes are.  These technologies affect the manner and effect of how we conduct ourselves in society: the way we read and learn, are entertained, communicate, interact professionally and personally, and express ourselves.  As such much of our existing laws and norms need to be rethought, reinterpreted, and rewritten.  This sort of technological change has happened before (i.e. printing press or radio) but never at such a scale and speed.&lt;br /&gt;
&lt;br /&gt;
To focus in specifically on these digital technologies specifically, the biggest impacts come from their reach, social nature, and longevity.  First, due to being replicable and instantaneous, a person or group using digital technologies can reach a massive audience with their message, around the world, through many channels.  Second, given the ability to continuously publish and others to respond, over time a single message can grow into a dialogue which can grow into a living social conversation, and ultimately coordinated action.  Third, the ability now exists to have a permanent, discoverable, and recorded conversation.  These are all tremendous changes to the way societies function. --[[User:Smithbc|Smithbc]] 13:08, 25 January 2011 (PST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of digital technology is much like a hot war. As the Developer or Engineer creates, the digital Guerrilla works to free the technology. The greater the advance of the tools made available to the masses it becomes more and more difficult to protect an idea. One could say that ultimately the ideas are improved by the unconstrained &amp;quot;testing&amp;quot; digital liberator/Hackers subject digital creations to. --[[User:Buie|Buie]] 20:34, 25 January 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Improvements in digital technologies and the pace at which they are happening are making it increasingly more difficult for companies to innovate and compete.  Investing in research initiatives are at the forefront while still trying to devote resources to building that next biggest thing that will reach the largest number of users.--[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I agree with Edwardshinp regarding security.  It&#039;s not just an issue of security of financial data for transactions, but we are looking at national security, corporate espionage, etc.  Anything where we&#039;re engaging in the sharing of information. --[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
A couple of months post-Wikileaks, and we&#039;re already seeing various similar organizations and entities (and even instances of leaking) crop up; while I don&#039;t support all of WikiLeaks&#039; leaks necessarily, I do support the overall idea of information leaking; and in the case of, for example, the Palestine Papers (recently leaked to Al Jazeera), think that it can be very effective in demonstrating hypocrisy in governments.&lt;br /&gt;
&lt;br /&gt;
I also take serious issue with the handling of WikiLeaks by American companies Amazon, Mastercard, PayPal, EasyDNS, and Tableau.  All acted under potential pressure from Sen. Joe Lieberman, and the vast majority gave &amp;quot;copyright infringement&amp;quot; as their excuse, more or less.  If we excuse this behavior in the instance of WikiLeaks, then we&#039;re headed down a slippery slope: Do we then excuse similar intermediary censorship when levied against a human rights organization? [[User:Jyork|Jyork]] 22:23, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;br /&gt;
&lt;br /&gt;
In my opinion, if we use the standard definition of what constitutes a &amp;quot;media organization&amp;quot; based on U.S. Code Title 2, Section 1602, a person or entity engaged in disseminating information to the general public through a newspaper, magazine, other publication, radio, television, cable television, or other medium of mass communication; then Wikileaks is just that and would be entitled to protections as such.  I don&#039;t agree with the way Wikileaks is carrying out it&#039;s mission on a philosophical level. There are other means that could be used to promote and encourage transparency in government without endangering people&#039;s lives. --[[User:Dreed07|-dreed07]] 20:13, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The economic impact of the Internet and digital technologies can be significant.  Outsourcing job functions to countries outside the United States for instance, was facilitated in part by the ability of the Internet to deliver real time data across the globe.  IP telephony, high speed video and data transmitted on the Internet allowed for workers to be “virtual”, anywhere in the world.  This created cost savings and efficiencies for corporations while fueling growth in emerging countries.  Domestically, this has lead to displaced workers and job losses across many fields.  Earboleda&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5196</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=5196"/>
		<updated>2011-01-25T23:44:20Z</updated>

		<summary type="html">&lt;p&gt;Earboleda: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below or be prepared to offer them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* [http://articles.cnn.com/2010-12-02/opinion/mackinnon.wikileaks.amazon_1_wikileaks-founder-julian-assange-lieberman-youtube?_s=PM:OPINION Rebecca MacKinnon: WikiLeaks, Amazon and the new threat to internet speech]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
The ways in which these mediums have changed how we relate to each other can certainly be seen to have both positive and negative connotations.  In the age of &#039;instant information&amp;quot; we should question how much is worthy of our attention on first blush, and what is really noise and a waste of time.  Those that manage the digital medium as opposed to it managing them are the real winners in the availability of opportunities. &lt;br /&gt;
&lt;br /&gt;
However some of the most positive aspects can be seen in our new ability to see other countries through the lens of information from citizens themselves and this has inspired a higher spirit of collaboration the world over. &lt;br /&gt;
&lt;br /&gt;
The uprising in Iran a couple of years ago, would never have gotten the world attention that it did before the advent of the social mediums that allowed the demonstrations to be viewed by millions.  The Haiti earthquake (and many other disasters) and the quickness of the response was helped by the instant donation portals that were set up to facilitate monies where they were most required.  Doctors collaborating around the world on cases and learning from those experiences is another example of how we grow our cultures for the good.   &lt;br /&gt;
&lt;br /&gt;
A &amp;quot;virtual choir&amp;quot; of 12 different countries bringing singers together showed a true spirit of co-operation among peoples.&lt;br /&gt;
http://www.youtube.com/watch?v=D7o7BrlbaDs&lt;br /&gt;
&lt;br /&gt;
We have choices in how we use all these mediums and yes there will always be an disturbing and dark aspects to it but looking at all the possibilities we have a world of substantive opportunities.  --[[User:?Unknown User|?Unknown User]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The most significant change associated with digital technologies is precisely how pervasive the changes are.  These technologies affect the manner and effect of how we conduct ourselves in society: the way we read and learn, are entertained, communicate, interact professionally and personally, and express ourselves.  As such much of our existing laws and norms need to be rethought, reinterpreted, and rewritten.  This sort of technological change has happened before (i.e. printing press or radio) but never at such a scale and speed.&lt;br /&gt;
&lt;br /&gt;
To focus in specifically on these digital technologies specifically, the biggest impacts come from their reach, social nature, and longevity.  First, due to being replicable and instantaneous, a person or group using digital technologies can reach a massive audience with their message, around the world, through many channels.  Second, given the ability to continuously publish and others to respond, over time a single message can grow into a dialogue which can grow into a living social conversation, and ultimately coordinated action.  Third, the ability now exists to have a permanent, discoverable, and recorded conversation.  These are all tremendous changes to the way societies function. --[[User:Smithbc|Smithbc]] 13:08, 25 January 2011 (PST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of digital technology is much like a hot war. As the Developer or Engineer creates, the digital Guerrilla works to free the technology. The greater the advance of the tools made available to the masses it becomes more and more difficult to protect an idea. One could say that ultimately the ideas are improved by the unconstrained &amp;quot;testing&amp;quot; digital liberator/Hackers subject digital creations to. --[[User:Buie|Buie]] 20:34, 25 January 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Improvements in digital technologies and the pace at which they are happening are making it increasingly more difficult for companies to innovate and compete.  Investing in research initiatives are at the forefront while still trying to devote resources to building that next biggest thing that will reach the largest number of users.--[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I agree with Edwardshinp regarding security.  It&#039;s not just an issue of security of financial data for transactions, but we are looking at national security, corporate espionage, etc.  Anything where we&#039;re engaging in the sharing of information. --[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. --[[User:Trojsy|-Trojsy]] )07:29, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
A couple of months post-Wikileaks, and we&#039;re already seeing various similar organizations and entities (and even instances of leaking) crop up; while I don&#039;t support all of WikiLeaks&#039; leaks necessarily, I do support the overall idea of information leaking; and in the case of, for example, the Palestine Papers (recently leaked to Al Jazeera), think that it can be very effective in demonstrating hypocrisy in governments.&lt;br /&gt;
&lt;br /&gt;
I also take serious issue with the handling of WikiLeaks by American companies Amazon, Mastercard, PayPal, EasyDNS, and Tableau.  All acted under potential pressure from Sen. Joe Lieberman, and the vast majority gave &amp;quot;copyright infringement&amp;quot; as their excuse, more or less.  If we excuse this behavior in the instance of WikiLeaks, then we&#039;re headed down a slippery slope: Do we then excuse similar intermediary censorship when levied against a human rights organization? [[User:Jyork|Jyork]] 22:23, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;br /&gt;
&lt;br /&gt;
In my opinion, if we use the standard definition of what constitutes a &amp;quot;media organization&amp;quot; based on U.S. Code Title 2, Section 1602, a person or entity engaged in disseminating information to the general public through a newspaper, magazine, other publication, radio, television, cable television, or other medium of mass communication; then Wikileaks is just that and would be entitled to protections as such.  I don&#039;t agree with the way Wikileaks is carrying out it&#039;s mission on a philosophical level. There are other means that could be used to promote and encourage transparency in government without endangering people&#039;s lives. --[[User:Dreed07|-dreed07]] 20:13, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The economic impact of the Internet and digital technologies can be significant.  Outsourcing job functions to countries outside the United States for instance, was facilitated in part by the ability of the Internet to deliver real time data across the globe.  IP telephony, high speed video and data transmitted on the Internet allowed for workers to be “virtual”, anywhere in the world.  This created cost savings and efficiencies for corporations while fueling growth in emerging countries.  Domestically, this has lead to displaced workers and job losses across many fields.&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;/div&gt;</summary>
		<author><name>Earboleda</name></author>
	</entry>
</feed>