<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Elishasurillo</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Elishasurillo"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/Special:Contributions/Elishasurillo"/>
	<updated>2026-04-11T21:25:16Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6865</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6865"/>
		<updated>2011-05-11T03:53:10Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Acrowe|Anthony Crowe]]&lt;br /&gt;
* Title: Tagging: The Grassroots Tool That Has Restructured Our Internet&lt;br /&gt;
* Link: (Paper) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4_Final.doc&lt;br /&gt;
* Link: (Appendix) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE-120_Final_Append.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Yaerin Kim&lt;br /&gt;
* Title:  Culture of Sharing: A Case Study of MIT OCW&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Final_Project_Kim_.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Saam Batmanghelidj&lt;br /&gt;
* Title:  Digital Intellectual Property of Synthetic Worlds&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Corey MacDonald&lt;br /&gt;
* Title:  Communication for the Fringe&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Communication_for_the_Fringe.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Rick Kundiger&lt;br /&gt;
* Title: A Study on Free Riding in the Bitorrent Peer-to-peer Swarm.pdf‎&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Final_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Swarm.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Mary Van Gils&lt;br /&gt;
* Title: Yelp Reviews: Freedom of Speech v. Reputational Injuries&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Yelp_Reviews_Freedom_of_Speech_v_Reputational_Injuries.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Faye Ryding&lt;br /&gt;
* Title: Trolls and Vandals on Epinions and Yelp&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle C Forelle - [[User:Mcforelle|Mcforelle]] 19:18, 10 May 2011 (UTC)&lt;br /&gt;
* Title: Viva La Vimeo!: How Vimeo&#039;s Unique Architecture Fostered a Unique Videomaking Community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:VimeoMCForelle_final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Adriana Faria Torii &amp;amp; Anna Christiana Marinho Cavalcanti Machado [[[User:Anna|Anna]] 21:21, 10 May 2011 (UTC)]&lt;br /&gt;
* Title: Analysis of E-Government Practices in Brazil: The Case of The E-Voting System&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tymoteusz Lewtak [[User:Lewtak|Lewtak]] 01:27, 11 May 2011 (UTC)&lt;br /&gt;
* Title: Site Super-User Science&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4_Final.pdf&lt;br /&gt;
&lt;br /&gt;
* Name: Jillian York [[user:jyork|jyork]] [[User:Jyork|Jyork]] 01:32, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Final_Draft_JillianCYork.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo [[User:Jsanfilippo|Jsanfilippo]] 03:49, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Crowd Funding and Cultural Production&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Final_Project_V2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Elisha Surillo&lt;br /&gt;
*Title: Homophily, the Tea Party, and the Internet&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Homophily%2C_the_Tea_Party%2C_and_the_Internet-Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6863</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=6863"/>
		<updated>2011-05-11T03:52:11Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Acrowe|Anthony Crowe]]&lt;br /&gt;
* Title: Tagging: The Grassroots Tool That Has Restructured Our Internet&lt;br /&gt;
* Link: (Paper) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4_Final.doc&lt;br /&gt;
* Link: (Appendix) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE-120_Final_Append.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Yaerin Kim&lt;br /&gt;
* Title:  Culture of Sharing: A Case Study of MIT OCW&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Final_Project_Kim_.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Saam Batmanghelidj&lt;br /&gt;
* Title:  Digital Intellectual Property of Synthetic Worlds&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Corey MacDonald&lt;br /&gt;
* Title:  Communication for the Fringe&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Communication_for_the_Fringe.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Rick Kundiger&lt;br /&gt;
* Title: A Study on Free Riding in the Bitorrent Peer-to-peer Swarm.pdf‎&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Final_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Swarm.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Mary Van Gils&lt;br /&gt;
* Title: Yelp Reviews: Freedom of Speech v. Reputational Injuries&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Yelp_Reviews_Freedom_of_Speech_v_Reputational_Injuries.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Faye Ryding&lt;br /&gt;
* Title: Trolls and Vandals on Epinions and Yelp&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle C Forelle - [[User:Mcforelle|Mcforelle]] 19:18, 10 May 2011 (UTC)&lt;br /&gt;
* Title: Viva La Vimeo!: How Vimeo&#039;s Unique Architecture Fostered a Unique Videomaking Community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:VimeoMCForelle_final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Adriana Faria Torii &amp;amp; Anna Christiana Marinho Cavalcanti Machado [[[User:Anna|Anna]] 21:21, 10 May 2011 (UTC)]&lt;br /&gt;
* Title: Analysis of E-Government Practices in Brazil: The Case of The E-Voting System&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tymoteusz Lewtak [[User:Lewtak|Lewtak]] 01:27, 11 May 2011 (UTC)&lt;br /&gt;
* Title: Site Super-User Science&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4_Final.pdf&lt;br /&gt;
&lt;br /&gt;
* Name: Jillian York [[user:jyork|jyork]] [[User:Jyork|Jyork]] 01:32, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Final_Draft_JillianCYork.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo [[User:Jsanfilippo|Jsanfilippo]] 03:49, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Crowd Funding and Cultural Production&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Final_Project_V2.pdf&lt;br /&gt;
&lt;br /&gt;
*Name: Elisha Surillo&lt;br /&gt;
*Title: Homophily, the Tea Party, and the Internet&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Homophily%2C_the_Tea_Party%2C_and_the_Internet-Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Homophily,_the_Tea_Party,_and_the_Internet-Final_Paper.doc&amp;diff=6862</id>
		<title>File:Homophily, the Tea Party, and the Internet-Final Paper.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Homophily,_the_Tea_Party,_and_the_Internet-Final_Paper.doc&amp;diff=6862"/>
		<updated>2011-05-11T03:49:37Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: Final Paper&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Final Paper&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6756</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6756"/>
		<updated>2011-05-08T23:01:08Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-5.3.11-Cybersecurity_and_Cyberwarfare.pdf Cybersecurity and Cyberwarfare]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastifdonty|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wanted to submit this article to add to the discussion. I found it to be interesting. Cybersecurity is probably the most vital issue to our country&#039;s infrastructure today. The recent military operation to take out  Osama bin Ladin would have failed miserably if knowledge of the raid was disclosed. To keep our intelligence reports under wraps should be among our highest priorities. While the government wages wars on three fronts at once, it is difficult but nessessary to ensure our reports stay out of our enemies hands. By blocking IP addresses and using more sophisticated encryption, we will be well on our way to protecting our great country. The world runs through the Internet, and so does our future.   [http://delivery.acm.org/10.1145/1840000/1839688/p33-brenner.pdf?key1=1839688&amp;amp;key2=5956834031&amp;amp;coll=DL&amp;amp;dl=ACM&amp;amp;ip=74.90.79.253&amp;amp;CFID=18979663&amp;amp;CFTOKEN=55280022] [[User:Joshuasurillo|Joshuasurillo]] 01:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Cyberthreats are real and pervasive.  The people within IT infrastructure have been fighting the battle for years.  It makes no difference whether you work for a government, business or school – every domain (gov, com &amp;amp; edu) is under attack.  Private business and the military arm of the government are the most concerned about security, so they were the first to adopt network access control and identity management.  Security is enforced by verifying the identity of each user and device before allowing them to gain access to the network.  This, of course, runs counter to the idea of a free, open and anonymous Internet.  Yes, we can do a lot to protect the public by having the ISPs filter and block malware (search for SonicWALL and Blue Coat for examples) but it’s not enough to stop all breaches and wastes precious bandwidth.  Our government recognizes this and is actively promoting what would become a national electronic identity “ecosystem.” (Their euphemism; see http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf) Jack Goldsmith had some well reasoned arguments why we should expect more government controls.  Finally, a good taxonomy of Internet security practices can be found in the pages of Chief Security Officer Magazine at http://www.csoonline.com/. [[User:ChrisSura|-Chris Sura]]&lt;br /&gt;
&lt;br /&gt;
Even with additional security measures instituted, there will always be someone looking for a way around it.  Jack Goldsmith&#039;s suggestion (suggested earlier by Zittrain), that additional measures be placed at the ISP level brings in significant risk to the ISPs.  What if the measures are put in place and something (inevitably) gets through?  Are the ISPs then liable for this?  Hacking and break-ins will continue to occur even at some of the most &amp;quot;secure&amp;quot; sites.  RSA, an industry security leader recently had their systems compromised, which led to information being extracted from their systems.  The fact that extremely sophisticated and targeted attacks can happen at secure Nuclear Power plants (Stuxnet worm), means that ISPs have would have their hands full with any targeted attack.&lt;br /&gt;
http://www.rsa.com/node.aspx?id=3872   [[User:Earboleda|Earboleda]]&lt;br /&gt;
&lt;br /&gt;
Although cyberthreats are real and eminent issues, there are not enough resources, mostly human, for countermeasures. In the United States, lack of expert computer scientists in the field of information security poses a serious problem in appropriately handling cyberwarfare. Rouge states such as North Korea rather have a lead on cyberwarfare preparation. I assume that first of all there needs to be a wider recognition for cyberthreats and a determined agreement toward dealing with this &amp;quot;fifth domain of warfare&amp;quot;. --[[User:Yu Ri|Yu Ri]] 21:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The Chatham House report is concerned that there isn&#039;t enough political control over the direction of cybersecurity and cyberwarfare initiatives due to the impenetrability of the technical details - that, as they put it, &amp;quot;the chief engineer&amp;quot; is driving the boat. I find this ironic (though not necessarily invalid); my first instinct is to be more concerned about know-knothing politicians trying to steer when they don&#039;t understand how the ship works or what direction it should go in. Still, education of the polical class, in either case, is the logical solution. - [[User:BrandonAndrzej|BrandonAndrzej]] 16:40, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just a quick rehash of something I was pondering in class: We have read about Lessig’s &amp;quot;free culture&amp;quot; (as opposed to permissions culture) as well as Benkler&#039;s &amp;quot;sharing nicely&amp;quot; and peer-production models. My project has been on Free and Open Source Software licensing. All this points to the value of sharing, open source business models, and weaker intellectual property rights. IP protections, however, have grown increasingly stronger. What if, I was thinking, we are never really able to secure the net? What will it mean when nation-states and other actors are constantly engaged in strategic and industrial espionage? Will we see, essentially, a culture of sharing &amp;quot;not-nicely&amp;quot; where theft of trade secrets and copying of patent and copyrighted materials regularly occurs outside the reach of law enforcement? Will companies reliant on proprietary business models be pushed more towards open source ones? Will we see the death of copyright as we know it? - [[User:BrandonAndrzej|BrandonAndrzej]] 16:51, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Anonymous is the group that first comes to mind with this.http://en.wikipedia.org/wiki/Anonymous_(group) This is a real problem. Its not a journalistic endevor, this is harassment. There has to be a way to shut down these hackers. The target is not someone in paticular; there are scams all over Facebook to steal people&#039;s identity. Worms and Trojian horses are on the web to get to your information and transmit it overseas. Now there are two questions- Were we ever safe? And how can we become safe again? Wars will soon be fought via the computer. [[User:Elishasurillo|Elishasurillo]] 23:01, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
If you&#039;d like to help us with the collection of data regarding online dating sites please take our survey, it&#039;s anonymous.&lt;br /&gt;
Online Dating site Survey: https://www.surveymonkey.com/s/28VMJWX&lt;br /&gt;
--[[User:Adavies01|Adavies01]] 17:03, 4 May 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6755</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6755"/>
		<updated>2011-05-08T22:51:40Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 26&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetDemocracyApril26.pdf Slides: Internet and Democracy II]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
* And the [http://opennet.net/map ONI global filtering map]&lt;br /&gt;
* Explore the Global Network Initiative website [http://www.globalnetworkinitiative.org/ GNI], with particular attention to the [http://www.globalnetworkinitiative.org/principles/index.php Principles], [http://www.globalnetworkinitiative.org/implementationguidelines/index.php Implementation Guidelines], and [http://www.globalnetworkinitiative.org/governanceframework/index.php Governance Framework]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
According to the United Nations Universal Declaration of Human Rights, all policy makers must cultivate a culture that promotes the fulfillment of human rights. However numerous policy markers grossly violate their duties to fulfill the declaration, and many governments, especially in the developing world- brutally exploit and corrupt their citizens. So, how are ICT companies suppose to fulfill online rights in volatile environments?&lt;br /&gt;
I think it’s interesting how GNI believes ICT companies will abide by their guidelines and try to strategically execute the human rights framework on a global scale within in environments, where violating human rights is considered part of societal norms.&lt;br /&gt;
Thus, I’m surprised GNI’s Implementation Guidelines entail, “Participating companies will encourage governments to be specific, transparent and consistent in the demands, laws and regulations (“government restrictions”) that are issued to restrict freedom of expression online.   Participants will also encourage government demands that are consistent with international laws and standards on freedom of expression. This includes engaging proactively with governments to reach a shared understanding of how government restrictions can be applied in a manner consistent with the Principles.”&lt;br /&gt;
Freedom of expression and privacy are severely neglected worldwide the recent events in Egypt to overthrow Mubarak in Egypt and ongoing Civil War in Libya exemplify severe abuse of freedom of expression and human rights. I doubt companies can convince autocratic governments to abide by GNI’s guidelines especially in corrupt environments.&lt;br /&gt;
Though “ICT companies have the responsibility to respect and protect the freedom of expression and privacy rights of their users”. It doesn’t mean the governments will necessarily facilitate such efforts. by Alex&lt;br /&gt;
&lt;br /&gt;
Zittrain and Palfrey suggest a viable model for defining filtering parameters may be to allow the voluntary industry consensus to evolve into established law over time. I liken this to a policy version of the type of production model we saw in our von Hippel readings. If some of the most successful products can be borne out of manufacturer improvements on initial user innovations, I think it is arguable that the same can be said of policy. Proof in practice. [[User:Jsanfilippo|Jsanfilippo]] 16:40, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The goals of protecting individual privacy and minimizing the regulation of speech are indeed worthy of attention.  Unfortunately, Zittrain and Palfrey’s solution falls short of the mark.  They do concede that any industry consensus does not carry the force of law, and instead hope that the solution proposed by industry will be workable enough so that it is eventually adopted as law.  They assert, however, that industry self-regulation is the “most likely – and most desirable – means of resolving this problem in the near term.”  They are correct to a point in that a great deal of the technical expertise resides in the ranks of industry, but industry “cooperation” is notoriously complex.  First, there is more than one industry type: content providers will favor a different solution than search engines, with each industry biased to its advantage.  Second, there are legal barriers to industry collusion.  An industry consortium can easily set operating standards or principles that favor the business model of its members while putting non-member competitors at a disadvantage.  Third, members are free to abandon the standards at will.  Note how GNI membership includes representation from search engine providers (Google &amp;amp; Yahoo) but there are no member network providers or telecommunication companies like Cisco or AT&amp;amp;T at the table, even though the group purports to represent “information and communications technologies.”  The members associate voluntarily, and may choose to disassociate ust as easily.  In fact, they may choose to not share all information with third party compliance assessors, as business contracts and corporate law departments may supersede any and all principles.  Ultimately it will come down to a question of international law.  Perhaps the UN or WTO is not such a long shot after all.[[User:ChrisSura|-Chris Sura]] 19:04, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Content should only be censored if it falls under the section of treason. In America we don&#039;t really have this problem, but what about other places?  The GNI is a lofty goal, but how can we enforce it? As long as there are autocratic governments, there will be a surpressing of free speech online. They tried to shut it down in Egypt, and Google is blocked in China. I just don&#039;t believe companies, when under the pressure from autocrats, will uphold their commitments to freedom. It remains to be seen how it will play out but I agree with Alex that governments play a vital role. How they use that role is the question. [[User:Elishasurillo|Elishasurillo]] 22:51, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the link to the extensive Freedom House &amp;quot;Freedom on the Net 2011&amp;quot; report. (Honestly, at 410 pages I haven&#039;t really had time to read and evaulate this, but I thought I would throw it up on the wiki for those who might be interested.)&lt;br /&gt;
http://www.freedomhouse.org/images/File/FotN/FOTN2011.pdf &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 17:12, 20 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
On the Today show this morning, one of the lead headlines was about your location can be followed thru your IPhone and IPad which is something we have been chatting about for the last two classes in the chat room.  Also, there was an interesting article for corporate counsel on law.com regarding the idea that the government is watching corporations on the internet:&lt;br /&gt;
http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202484184534&lt;br /&gt;
[[[[User:Sjennings|sjennings]] 18:22, 21 April 2011 (UTC)}}&lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/community/blog/unsecured-wi-fi-router-brings-federal-agents- Unsecured Wi-Fi router brings federal agents, assault rifles on early morning visit] --[[User:Gclinch|Gclinch]] 21:28, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://www.governing.com/topics/technology/Wiretapping-Internet-Calls-May-Require-New-Law.html Wiretapping Internet Calls May Require New Law]&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=6754</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=6754"/>
		<updated>2011-05-08T22:41:03Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
**Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
** Updated link to the Etling, et al. piece: [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Mapping the Arabic Blogosphere]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I&#039;m inclined to be skeptical of the idea that the internet and social media are making interpersonal connections &amp;quot;shallower&amp;quot;, whether we are talking about &amp;quot;Facebook friends&amp;quot; or social and political activism. Setting aside the question of whether online relationships count as &amp;quot;real&amp;quot; relationships (that is, are qualitatively inferior to real-life relationships), in order for this theory to be correct, online relationships would have to be replacing real-life relationships. While I don&#039;t have any hard data to back this up, I simply don&#039;t see this happening in most cases. The imagined concept is one of young people avoiding traditional social contact in favor of hours spent online. However, I would postulate that the people most inclined to shut themselves off from the &amp;quot;real world&amp;quot; in favor of computers are the same people who would have shut themselves off in favor of books or various solo hobbies in previous decades. Under this model, the quantity and quality of social interaction for persons thus inclined is &#039;&#039;increasing&#039;&#039;, rather than decreasing. What we are talking about is both an increase in reach and a lowering of thresholds. For the average user, social media, first and foremost, provides a vehicle for interaction with people they &#039;&#039;already know&#039;&#039; in real life (friends from school, family, etc... so your kid spending time on the computer rather than playing with friends outside is likely to be interacting with those same friends electronically) and then adds to this a new layer of online friendships and acquaintances which arise as social media provides previously unavailable opportunities to build relationships over distance. (There is, as well, traffic between these two layers, as real-life friends separated by distance use social media to keep in touch, and friends - and potential romantic partners - met online arrange to meet in person). Similarly, when it comes to activism, the increasing availability of &amp;quot;intermediate&amp;quot; levels of support (such as donation or petition signing – hardly new developments) is not likely, to my mind, to decrease the number of active real-world advocates. Verily, the opposite: those inclined to get off the couch and &amp;quot;make a difference&amp;quot; are still likely (or even more likely) to do so, only now with the support of countless others who would not have been reached by the activist&#039;s message otherwise.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 17 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think it&#039;s worth raising the point that there have been a lot of serious questions raised as to the accuracy of the NYTimes piece read in class this week; for example, Global Voices shows Egyptian Twitterers mocking the idea that they needed Western help (http://globalvoicesonline.org/2011/04/15/egypt-gene-sharp-taught-us-how-to-revolt/).  I think that, ultimately, this controversy is more important than the content of the article itself, in that it illustrates how social media can be vital to media accuracy--you have numerous direct accounts from known activists contradicting the commentary in the NYTimes, while the NYTimes meanwhile often has difficulty getting good sources in the Arab world because of its somewhat negative reputation (two words: Thomas Friedman).  Another issue in the piece is the emphasis on a very tiny collaborative movement aided by the US, while numerous genuine, grassroots movements exist and have been ignored by media (case in point: The Arab Bloggers workshops and Arab Techies group). &lt;br /&gt;
&lt;br /&gt;
In terms of the broader picture, one aspect of all of this that has been desperately overlooked is the use and importance of backchannels like private groups, IRC, and email.  While social media is certainly important, the organizing that happens in private online spaces (as well as via SMS) is undoubtedly even more vital. [[User:Jyork|Jyork]] 20:06, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another argument in favor of the role social media is playing in providing accurate information for journalists about things that are happening elsewhere: if you have Twitter, check out the work that @andycarvin has beeen doing.  He&#039;s NPR&#039;s senior product manager for online communities, and has been connecting with people on the ground in countries like Egypt and Libya for a while, using them and their networks to verify or challenge information that the mainstream media has been getting.  It&#039;s been neat stuff.  [[User:Mcforelle|Mcforelle]] 01:11, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In addition to the lack of accuracy in the NY Times article, I don&#039;t think the internet is necessarily the mean of online hate speech and irrational behavior. Many of the least developed and heavily indebted poor countries are grossly corrupt, which lack adequate financial means or political and economic conditions to cultivate human rights. In addition, poor countries are also notoriously more vulnerable to economic volatility, conflict and humanitarian crisis; good governance matters to development and how citizens behave online.[[User:Alexsolomon|Alexsolomon]]&lt;br /&gt;
&lt;br /&gt;
I find Mr. Shirky&#039;s interview to be especially important today.  He highlights the use of social media, SMS, mobile email, and internet-based freedom of speech (i.e. blogs) to organize people in the absence of other more traditional, government controlled, methods (i.e. print media).  I believe it is obvious that the governments are aware of the people&#039;s ability to organize over this uncontrolled medium which is why many governments are trying to stop further penetration of technologies such as email encryption and blogging/tweeting (e.g. India, Saudi Arabia, China).  If they can control, stop, or accurately monitor these communication mediums they can further disrupt grassroots uprisings.  [[User:Rakundig|Rakundig]] 19:15, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fundamental notion of democracy is the active participation of the governed in the government, either directly or through representatives.  This week’s readings take aim at an outer fringe of that notion: the active participation of the governed in the overthrow of government.  There can be no doubt that the Internet provides the world’s best electronic soapbox.  It is a better mouthpiece, a better broadcast medium, a better tool.   Etling et al. wisely note that “[t]he Internet lays a good foundation for a battle of ideas, but does not necessarily favor a winner” while Shirky states more bluntly that the Internet is “a better way to take down autocracies but not a better way to replace them.”  We can marvel at the effectiveness of social media in toppling the Egyptian government, but it could not have happened without a military that was sympathetic to the public.  Libya and Iran demonstrate the counterpoint.&lt;br /&gt;
While the Internet has shown great promise facilitating political freedom, I fear those days are numbered.  Last week’s readings exposed the blatant large scale surveillance which the Internet also facilitates.  The video from the cell phone uploaded to youtube probably contains the serial number of the phone traceable to the owner via his GPS coordinates.  This is not just a problem with the Internet – it is prevalent in all technology.  You can no longer print an “anonymous” political flyer when it contains the serial number of the color printer that rendered it.  Technology is a powerful tool that can do wonderful and terrible things.  It needs thoughtful regulation.&lt;br /&gt;
[[User:ChrisSura|-Chris Sura]] 21:20, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The simple quote by Wael Ghonim really brings home the message of how government should be looked at. “This is your country; a government official is your employee who gets his salary from your tax money, and you have your rights.” The simple message was able to be communicated through Technology and Social Media. Both have naturally played a crucial role in the changes occurring in the Arab world.  Discussing technology, Clay Shirkey states “The technology is that big of difference if it is a big difference.”  He goes on to explain that the newness of the technology creates a unique opportunity for impact, as users are unsure how to react to it. Unfortunately, this same technology can also be used against the protestors (as was used by Iran to track down protestors).  Given that this is happening in some Arab countries, is there a reason why this has not created a lot of traction in countries like Syria? Is it because this same technology is being used against the protestors? [[User:Earboleda|Earboleda]] 21:36, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Social gatherings and the web go hand in hand. The uprising in Egypt was coordinated via the web, and political fundraisers regularly use Facebook to gather people. I agree with Jyork in that I think the NYT article was a little off. We are indebted to the Internet. People live-tweeted the Osama bi Laden raid and let us know excatly how it went down. This is creating a media watchdog. The web is part of the solution, not the problem. [[User:Elishasurillo|Elishasurillo]] 22:41, 8 May 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If we&#039;re looking to Tunisia and Egypt, I really think we ought to be looking at Tunisian and Egyptian sources, particularly in light of the fact that we&#039;re reading what is largely considered an inaccurate portrayal by the NYTimes.  Here are two great pieces from an Egyptian blogger (they&#039;re not necessarily representative, but they&#039;re the best English sources I&#039;ve found so far): http://www.hanimorsi.com/blog/index.php/archives/2011/02/22/from-clicktivism-to-activism/; http://www.hanimorsi.com/blog/index.php/archives/2011/02/17/the-virtualization-of-dissent-social-media-as-a-catalyst-for-social-change-part-two/.  I also think that these two 2008 pieces from Egyptian journalist Hossam El-Hamalawy are vital reading, incredibly prescient: http://www.arabawy.org/2008/05/08/the-revolution-will-be-flickrized/; http://www.arabawy.org/2008/02/26/a-call-to-blogo-arms/. [[User:Jyork|Jyork]] 20:09, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
My Assignment 4 paper was loosely based on this. I wonder people see the far reaching grasp of the Internet. Social media keeps growing and affecting our lives. With such devices as Facebook and Wikileaks, it wont be long before the masses control the countrys&#039; direction. Joshua Surillo&lt;br /&gt;
&lt;br /&gt;
This article too: http://www.guardian.co.uk/commentisfree/2011/mar/02/egypt-revolution-mubarak-wall-of-fear [[User:Jyork|Jyork]] 20:11, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Interesting Question: [http://www.govtech.com/e-government/Government-Twitter-Tsar.html Do Government Agencies Need a Twitter Tsar?] --[[User:Gclinch|Gclinch]] 15:31, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
This is a great little video that considers some of the negative impact that the internet can have on democracy.  [http://wimp.com/internetinhibit/ RSAnimate: Does the Internet actually inhibit, not encourage democracy?] [[User:Saambat|Saambat]] 23:11, 19 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6753</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6753"/>
		<updated>2011-05-08T22:31:06Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regarding Cato Institute Policy Analysis No. 295&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I&#039;m struggling with this analysis piece from the Cato Institute. I used to consider myself to be a libertarian; unfortunately, I&#039;m not sure that term means what I want it to mean anymore. Suffice it to say that some of the core ideas in the Cato Institute piece have resonance for me; namely, the idea that one does not own information, that there is no right &#039;&#039;not&#039;&#039; be annoyed or offended, and that there is (significant) societal and economic value in businesses being able to access information concerning their customers (the Slate article I posted below goes into this). That said, the Cato Institute seems to be taking the (rather undesirable) position that there *is* no &amp;quot;right to privacy&amp;quot;, and the piece itself seems (to my mind) to be riddled with a number of false equivalencies, leaps in reasoning, and glaring oversights. It seems to unduly privilege one portion of the citizenry (those engaged in business) against another (those engaged in consumption). Now, there is nothing wrong with running a business, or turning a profit (verily, the opposite - such activity is key to both individual and national well-being), but I am skeptical at the idea that direct marketing counts as &amp;quot;free speech&amp;quot; and should therefore be immune to government regulation (indeed, there are numerous precedents for limiting marketing speech), that industry self-regulation has proven adequate, or that concerns about privacy, fraud, and identity theft should be so casually dismissed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the ownership of information:&#039;&#039;&#039; clearly we do not “own” information about ourselves; information is not property in the traditional sense, but that does not mean we cannot control the release of certain information under certain circumstances. The article mentions confidentiality for medical records, for instance – but then seems to act as if this is the only sort of information that can or should receive protection. Yet there are other categories of information which we can and do privilege – court proceedings and criminal records, for instance, can be sealed in some cases. While it may be lawful to obtain and publish such information by other means, this is not the sort of free access to information that the article seems to envision. The paper compares gathering (and then selling) statistical information on clients with – of all things – gossip, which (to my mind) is nothing like gathering statistical information. Gossip is a natural social occurrence based on casual observation and the relation of second or third hand accounts. It is nothing like using instruments (in this case computer programs) to take detailed recordings of a person’s circumstances and shopping habits and then processing them mathematically to yield commercially valuable statistics. Gossip is an inevitability that cannot be prevented, or even regulated, beyond the use of social norms (legal means for extreme cases, such as libel, have been shown to be remarkably ineffective). Regulation of business practices, either by law or by voluntary codes of business ethics, is, on the other hand, not merely feasible, but common. Furthermore, no contract (save perhaps the &#039;&#039;social contract&#039;&#039;) exists between the causal observer and those observed. In contrast, a contractual relationship exists between the consumer of a good or service and the provider thereof – contracts which are subject to regulation by law. I reject the false equivalency drawn between gossip and the gathering of marketing data, and with it a large portion of the Cato Institute’s argument, which attempts to convince the reader that such data collection is not only similar too, but in light of its greater accuracy, more beneficial to the subject being observed. We can make this rejection, however, without disputing that such marketing information may be of critical value to the business operator, or bring other, legitimate benefits to the consumer.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the validity of privacy concerns:&#039;&#039;&#039; Furthermore, I find the paper in question entirely too dismissive of consumers’ privacy concerns – as if large corporate marketing databases posed little to no increased risk for those who’s information they contain. Just today, I heard news of a large corporate email database being hacked into (http://losangeles.cbslocal.com/2011/04/04/banks-retailers-warn-customers-after-email-database-hacked/), exposing the customers of several major firms to the potential of spam and fraudulent email. This is not the first such occurrence; indeed, we have seen much more sensitive bank account and credit card data stolen from financial institutions. The Cato institute seems to think that the abuse of cooperate databases can be adequately prevented by industry standards, existing legal penalties, and that the only real danger is that posed by the government. To further its case, it argues that many instances of criminal abuse are essentially inevitable – making the spectacular leap of logic that since certain abuses are not 100% preventable, that there is little value in attempting to increase legal protection against them. This is fallacious at best, disingenuous at worst. It is often said that there is very little one can do to prevent a determined assassin from assassinating a public figure; yet we do not throw up our hands and, say, allow the President to travel unescorted. On the contrary, the Secret Service and other government agencies spend an enormous amount of time, energy, and money attempting to safeguard key public officials by preventing or otherwise making such assassination attempts as difficult as possible. Likewise – to take a considerably more mundane example – even the best bike-lock will not prevent the most determined and organized of bike thieves from stealing or stripping a parked bike. That does not mean we encourage cyclists to leave their bikes unlocked and unattended on the street. I am willing to accept the argument that there is a price to be paid for greater privacy rights and safeguards, and that no such measures provide perfect protection, but I am not willing to entertain the notion that such safeguards are doomed to failure and therefore are of no value to the consumer, and to society as a whole. I am also troubled by the piece’s treatment of direct marketing; namely the glaring omission of any mention of spam email. While direct marketing is no doubt crucial to many businesses, and more tailored marketing would no doubt be a blessing to many consumers, when it comes to email, “junk mail” or “spam” can be crippling to the very businesses who’s interests the Cato Institute seems to have in mind; sorting though hundreds of spam messages a day can have serious impact on productivity for employees who make heavy use of electronic communications as part of their work duties – increasingly efficient spam filters help, but they are not solely responsible for reductions of spam mail; rather governmental regulation and prosecution of spammers has played a vital role in this. I doubt that many recipients of spam mail would be favorably predisposed to the argument that such mail constituted a category direct marketing constitutionally protected as “free speech”. We are not a talking about mere “annoyance” here, as the Cato Institute suggests, but rather a phenomenon that new technology has allowed to grow to such proportion that it has a serious impact on people’s lives, let alone its role as a conduit for illegal and unethical predatory activity. The government is commonly held to have a responsibility to protect citizens from unwanted and intrusive harassment by other private citizens. While the “Lands End” catalogue may not fall into this category, spam mail, as well as persistent telemarketing calls at inappropriate times, increasingly are seen to do so. As a consumer I am inclined to think that the rights of business to conduct their business need to be balanced against the rights of consumers to conduct their lives without undo interference.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the government and business ethics:&#039;&#039;&#039; The Cato Institute is quite correct to point out the special danger presented by the government and government information gathering, with the unique powers of enforcement it holds over the citizenry. I applaud this healthy skepticism; however, I think the institute’s libertarian biases have blinded it to potential for abuse posed by corporate databases, both by corporations themselves and – in the most glaring omission of the piece – abuse of said databases by the government with the acquiescence (if not outright support) of their private administrators. We have already seen such (mis)use of corporate marketing databases in our current reading: eloquently detailed by Christopher Soghoian on his weblog (http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html). Keep in mind that these databases were never intended to be used for surveillance purposes, but rather intended for just the sort of marketing uses which the Cato Institute is advocating in favor of. The purity of purpose the institute ascribes to business – that is, the pursuit of profit – did not prevent these companies from secretly divulging customer information for (what the institute itself would surely see as) abuse by government agencies. And why should it have? If businesses are conceived for the sole purpose of making profit, then why should we expect them to do anything but what they have done? – namely seize the opportunity to turn the sale of consumer information to the government into a profitable revenue source. The only potential curb on this sort of behavior would be the ire these corporations’ customer base, but since the widespread sale of geo-location and other private information is largely hidden from the public no outcry is possible. Furthermore, while I am sure that the Cato Institute would be quick to demand new restrictions on the government concerning the acquisition of such information (judicial oversight through a system of warrants, and laws requiring transparency in reporting), I am equally sure that the Institute would casually dismiss any need for tighter regulation on the business end. This is troubling to me. Industry self-regulation is only valuable as far as it achieves the desired results; it is only too easy for self-regulation to be corrupted into a self-serving obfuscation. And, as much as we should respect business’ (entirely necessary) role as an engine of societal growth and prosperity, we can still demand that said businesses conform to certain codes of business ethics. Requiring that businesses respect the privacy of their customers by providing clear explanations of how and to what extent customer information will be used, requesting permission for certain uses, and abiding by terms of service agreements which govern these uses is entirely is, to me, entirely reasonable. Telling customers that they can just “opt out” of internet or cell phone use if they are concerned about privacy seems to me to be about as sensible as relying on abstinence-only education to prevent the spread of STDs and unwanted teen pregnancy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion:&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
To synthesize the thoughts presented here:&lt;br /&gt;
1)	A certain degree of personal privacy is desirable and should be protected.&lt;br /&gt;
2)	Businesses have a legitimate need for marketing information gathered from consumers who use their services.&lt;br /&gt;
3)	Therefore, efforts must be made to balance these two nontrivial concerns.&lt;br /&gt;
4)	Self-regulation is insufficient to guarantee freedom from abuse of corporate consumer information databases.&lt;br /&gt;
5)	Both the government and private corporations should be restricted in this regard.&lt;br /&gt;
&lt;br /&gt;
Highly tailored direct marketing is the wave of the future. This development cannot be stopped; neither should we attempt to stop it, as it promises significant benefits to both business and consumer. This sort of analysis (http://www.theatlantic.com/business/archive/2011/04/how-the-american-man-spends-money/236888/) is not only critical to business, but can tell us important things about society as a whole. However, this does not mean we need to, or should, sacrifice the entirety of our personal privacy rights on the altar of innovation. Privacy is an important issue, and it behooves us to define with a degree of clarity to what extent a citizen’s personal privacy is to be protected. It is naïve to believe that such protection is of little benefit to society, or that the natural (unregulated) course of evolution will adequately provide for its existence. This is not a call for heavy handed regulation; rather it is a call for serious, objective thought on the subject. I am not sure that the Cato Institute’s advocacy piece (as valuable as it its insights might be) qualifies in this regard. &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:36, 10 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;RE: Privacy as Censorship &#039;&#039;&#039; (typing this on my Blackberry, sorry for any typos)&lt;br /&gt;
Singleton says that, &amp;quot;...value does not somehow inhere in a person&#039;s name.&lt;br /&gt;
Rather, the activities of marketers and list compilers create the value of the name.&amp;quot; Really? If the name wasn&#039;t worth anything, why collect it? The miner doesn&#039;t create the value of the gold, he is mearly the conduit. My name is valuable to marketers because of who I am and what I have accomplished in life. The sum total of what we each accomplish and the labor we expend to produce the income that the marketers seak to extract from each of us among other things is what creates the value of a name.[[User:Gclinch|Gclinch]] 04:33, 12 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I loved the work &#039;&#039;Blown to Bits&#039;&#039;. From the &amp;quot;black boxes&amp;quot; in cars to the Segway card, everything we do is watched and recorded. I&#039;ve never read the liscencing agreement from the program iTunes, but I can assume it serves to inform us that they record my purchases as well. As a user I am responsible for the content I use, but there has to be a better way of communicating policies. http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html I found this article about personal information online. [[User:Elishasurillo|Elishasurillo]] 22:30, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FTC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The internet in action: &amp;quot;My Dad is Li Gang!&amp;quot;, courtesy of Know Your Meme. http://knowyourmeme.com/memes/my-dad-is-li-gang-%E6%88%91%E7%88%B8%E6%98%AF%E6%9D%8E%E5%88%9A &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 06:05, 11 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
iPhone or iSpy? Feds, Lawyers Tackle Mobile Privacy:&lt;br /&gt;
&amp;quot;A proposed class-action lawsuit filed last week alleges that Apple and a handful of app makers are invading user privacy by accessing personal data from customers’ smartphones without permission and sharing it with third-party advertisers.&amp;quot; -- http://www.wired.com/gadgetlab/2011/04/iphone-ispy/&lt;br /&gt;
[[User:Alex|Alex]] 5:21, 12 April 2011&lt;br /&gt;
&lt;br /&gt;
A related link profiling [http://www.strategy-business.com/article/11110?gko=64e54&amp;amp;cid=20110222enews Generation C] who may have fewer privacy qualms. Also, feel free to join us in Cambridge for beers after class next week on 4/19. --[[User:SCL|SCL]] 01:07, 13 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6752</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6752"/>
		<updated>2011-05-08T22:30:18Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regarding Cato Institute Policy Analysis No. 295&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I&#039;m struggling with this analysis piece from the Cato Institute. I used to consider myself to be a libertarian; unfortunately, I&#039;m not sure that term means what I want it to mean anymore. Suffice it to say that some of the core ideas in the Cato Institute piece have resonance for me; namely, the idea that one does not own information, that there is no right &#039;&#039;not&#039;&#039; be annoyed or offended, and that there is (significant) societal and economic value in businesses being able to access information concerning their customers (the Slate article I posted below goes into this). That said, the Cato Institute seems to be taking the (rather undesirable) position that there *is* no &amp;quot;right to privacy&amp;quot;, and the piece itself seems (to my mind) to be riddled with a number of false equivalencies, leaps in reasoning, and glaring oversights. It seems to unduly privilege one portion of the citizenry (those engaged in business) against another (those engaged in consumption). Now, there is nothing wrong with running a business, or turning a profit (verily, the opposite - such activity is key to both individual and national well-being), but I am skeptical at the idea that direct marketing counts as &amp;quot;free speech&amp;quot; and should therefore be immune to government regulation (indeed, there are numerous precedents for limiting marketing speech), that industry self-regulation has proven adequate, or that concerns about privacy, fraud, and identity theft should be so casually dismissed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the ownership of information:&#039;&#039;&#039; clearly we do not “own” information about ourselves; information is not property in the traditional sense, but that does not mean we cannot control the release of certain information under certain circumstances. The article mentions confidentiality for medical records, for instance – but then seems to act as if this is the only sort of information that can or should receive protection. Yet there are other categories of information which we can and do privilege – court proceedings and criminal records, for instance, can be sealed in some cases. While it may be lawful to obtain and publish such information by other means, this is not the sort of free access to information that the article seems to envision. The paper compares gathering (and then selling) statistical information on clients with – of all things – gossip, which (to my mind) is nothing like gathering statistical information. Gossip is a natural social occurrence based on casual observation and the relation of second or third hand accounts. It is nothing like using instruments (in this case computer programs) to take detailed recordings of a person’s circumstances and shopping habits and then processing them mathematically to yield commercially valuable statistics. Gossip is an inevitability that cannot be prevented, or even regulated, beyond the use of social norms (legal means for extreme cases, such as libel, have been shown to be remarkably ineffective). Regulation of business practices, either by law or by voluntary codes of business ethics, is, on the other hand, not merely feasible, but common. Furthermore, no contract (save perhaps the &#039;&#039;social contract&#039;&#039;) exists between the causal observer and those observed. In contrast, a contractual relationship exists between the consumer of a good or service and the provider thereof – contracts which are subject to regulation by law. I reject the false equivalency drawn between gossip and the gathering of marketing data, and with it a large portion of the Cato Institute’s argument, which attempts to convince the reader that such data collection is not only similar too, but in light of its greater accuracy, more beneficial to the subject being observed. We can make this rejection, however, without disputing that such marketing information may be of critical value to the business operator, or bring other, legitimate benefits to the consumer.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the validity of privacy concerns:&#039;&#039;&#039; Furthermore, I find the paper in question entirely too dismissive of consumers’ privacy concerns – as if large corporate marketing databases posed little to no increased risk for those who’s information they contain. Just today, I heard news of a large corporate email database being hacked into (http://losangeles.cbslocal.com/2011/04/04/banks-retailers-warn-customers-after-email-database-hacked/), exposing the customers of several major firms to the potential of spam and fraudulent email. This is not the first such occurrence; indeed, we have seen much more sensitive bank account and credit card data stolen from financial institutions. The Cato institute seems to think that the abuse of cooperate databases can be adequately prevented by industry standards, existing legal penalties, and that the only real danger is that posed by the government. To further its case, it argues that many instances of criminal abuse are essentially inevitable – making the spectacular leap of logic that since certain abuses are not 100% preventable, that there is little value in attempting to increase legal protection against them. This is fallacious at best, disingenuous at worst. It is often said that there is very little one can do to prevent a determined assassin from assassinating a public figure; yet we do not throw up our hands and, say, allow the President to travel unescorted. On the contrary, the Secret Service and other government agencies spend an enormous amount of time, energy, and money attempting to safeguard key public officials by preventing or otherwise making such assassination attempts as difficult as possible. Likewise – to take a considerably more mundane example – even the best bike-lock will not prevent the most determined and organized of bike thieves from stealing or stripping a parked bike. That does not mean we encourage cyclists to leave their bikes unlocked and unattended on the street. I am willing to accept the argument that there is a price to be paid for greater privacy rights and safeguards, and that no such measures provide perfect protection, but I am not willing to entertain the notion that such safeguards are doomed to failure and therefore are of no value to the consumer, and to society as a whole. I am also troubled by the piece’s treatment of direct marketing; namely the glaring omission of any mention of spam email. While direct marketing is no doubt crucial to many businesses, and more tailored marketing would no doubt be a blessing to many consumers, when it comes to email, “junk mail” or “spam” can be crippling to the very businesses who’s interests the Cato Institute seems to have in mind; sorting though hundreds of spam messages a day can have serious impact on productivity for employees who make heavy use of electronic communications as part of their work duties – increasingly efficient spam filters help, but they are not solely responsible for reductions of spam mail; rather governmental regulation and prosecution of spammers has played a vital role in this. I doubt that many recipients of spam mail would be favorably predisposed to the argument that such mail constituted a category direct marketing constitutionally protected as “free speech”. We are not a talking about mere “annoyance” here, as the Cato Institute suggests, but rather a phenomenon that new technology has allowed to grow to such proportion that it has a serious impact on people’s lives, let alone its role as a conduit for illegal and unethical predatory activity. The government is commonly held to have a responsibility to protect citizens from unwanted and intrusive harassment by other private citizens. While the “Lands End” catalogue may not fall into this category, spam mail, as well as persistent telemarketing calls at inappropriate times, increasingly are seen to do so. As a consumer I am inclined to think that the rights of business to conduct their business need to be balanced against the rights of consumers to conduct their lives without undo interference.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the government and business ethics:&#039;&#039;&#039; The Cato Institute is quite correct to point out the special danger presented by the government and government information gathering, with the unique powers of enforcement it holds over the citizenry. I applaud this healthy skepticism; however, I think the institute’s libertarian biases have blinded it to potential for abuse posed by corporate databases, both by corporations themselves and – in the most glaring omission of the piece – abuse of said databases by the government with the acquiescence (if not outright support) of their private administrators. We have already seen such (mis)use of corporate marketing databases in our current reading: eloquently detailed by Christopher Soghoian on his weblog (http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html). Keep in mind that these databases were never intended to be used for surveillance purposes, but rather intended for just the sort of marketing uses which the Cato Institute is advocating in favor of. The purity of purpose the institute ascribes to business – that is, the pursuit of profit – did not prevent these companies from secretly divulging customer information for (what the institute itself would surely see as) abuse by government agencies. And why should it have? If businesses are conceived for the sole purpose of making profit, then why should we expect them to do anything but what they have done? – namely seize the opportunity to turn the sale of consumer information to the government into a profitable revenue source. The only potential curb on this sort of behavior would be the ire these corporations’ customer base, but since the widespread sale of geo-location and other private information is largely hidden from the public no outcry is possible. Furthermore, while I am sure that the Cato Institute would be quick to demand new restrictions on the government concerning the acquisition of such information (judicial oversight through a system of warrants, and laws requiring transparency in reporting), I am equally sure that the Institute would casually dismiss any need for tighter regulation on the business end. This is troubling to me. Industry self-regulation is only valuable as far as it achieves the desired results; it is only too easy for self-regulation to be corrupted into a self-serving obfuscation. And, as much as we should respect business’ (entirely necessary) role as an engine of societal growth and prosperity, we can still demand that said businesses conform to certain codes of business ethics. Requiring that businesses respect the privacy of their customers by providing clear explanations of how and to what extent customer information will be used, requesting permission for certain uses, and abiding by terms of service agreements which govern these uses is entirely is, to me, entirely reasonable. Telling customers that they can just “opt out” of internet or cell phone use if they are concerned about privacy seems to me to be about as sensible as relying on abstinence-only education to prevent the spread of STDs and unwanted teen pregnancy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion:&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
To synthesize the thoughts presented here:&lt;br /&gt;
1)	A certain degree of personal privacy is desirable and should be protected.&lt;br /&gt;
2)	Businesses have a legitimate need for marketing information gathered from consumers who use their services.&lt;br /&gt;
3)	Therefore, efforts must be made to balance these two nontrivial concerns.&lt;br /&gt;
4)	Self-regulation is insufficient to guarantee freedom from abuse of corporate consumer information databases.&lt;br /&gt;
5)	Both the government and private corporations should be restricted in this regard.&lt;br /&gt;
&lt;br /&gt;
Highly tailored direct marketing is the wave of the future. This development cannot be stopped; neither should we attempt to stop it, as it promises significant benefits to both business and consumer. This sort of analysis (http://www.theatlantic.com/business/archive/2011/04/how-the-american-man-spends-money/236888/) is not only critical to business, but can tell us important things about society as a whole. However, this does not mean we need to, or should, sacrifice the entirety of our personal privacy rights on the altar of innovation. Privacy is an important issue, and it behooves us to define with a degree of clarity to what extent a citizen’s personal privacy is to be protected. It is naïve to believe that such protection is of little benefit to society, or that the natural (unregulated) course of evolution will adequately provide for its existence. This is not a call for heavy handed regulation; rather it is a call for serious, objective thought on the subject. I am not sure that the Cato Institute’s advocacy piece (as valuable as it its insights might be) qualifies in this regard. &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:36, 10 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;RE: Privacy as Censorship &#039;&#039;&#039; (typing this on my Blackberry, sorry for any typos)&lt;br /&gt;
Singleton says that, &amp;quot;...value does not somehow inhere in a person&#039;s name.&lt;br /&gt;
Rather, the activities of marketers and list compilers create the value of the name.&amp;quot; Really? If the name wasn&#039;t worth anything, why collect it? The miner doesn&#039;t create the value of the gold, he is mearly the conduit. My name is valuable to marketers because of who I am and what I have accomplished in life. The sum total of what we each accomplish and the labor we expend to produce the income that the marketers seak to extract from each of us among other things is what creates the value of a name.[[User:Gclinch|Gclinch]] 04:33, 12 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I loved the work &#039;&#039;Blown to Bits&#039;&#039;. From the &amp;quot;black boxes&amp;quot; in cars to the Segway card, everything we do is watched and recorded. I&#039;ve never read the liscenceing agreement from the program iTunes, but I can assume it serves to inform us that they recod my purchases as well. As a user I am responsible for the content I use, but there has to be a better way of communicating policies. http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html I found this article about personal information online. [[User:Elishasurillo|Elishasurillo]] 22:30, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FTC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The internet in action: &amp;quot;My Dad is Li Gang!&amp;quot;, courtesy of Know Your Meme. http://knowyourmeme.com/memes/my-dad-is-li-gang-%E6%88%91%E7%88%B8%E6%98%AF%E6%9D%8E%E5%88%9A &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 06:05, 11 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
iPhone or iSpy? Feds, Lawyers Tackle Mobile Privacy:&lt;br /&gt;
&amp;quot;A proposed class-action lawsuit filed last week alleges that Apple and a handful of app makers are invading user privacy by accessing personal data from customers’ smartphones without permission and sharing it with third-party advertisers.&amp;quot; -- http://www.wired.com/gadgetlab/2011/04/iphone-ispy/&lt;br /&gt;
[[User:Alex|Alex]] 5:21, 12 April 2011&lt;br /&gt;
&lt;br /&gt;
A related link profiling [http://www.strategy-business.com/article/11110?gko=64e54&amp;amp;cid=20110222enews Generation C] who may have fewer privacy qualms. Also, feel free to join us in Cambridge for beers after class next week on 4/19. --[[User:SCL|SCL]] 01:07, 13 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6751</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6751"/>
		<updated>2011-05-08T22:16:23Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
* [http://www.whitehouse.gov/blog/2011/03/15/concrete-steps-congress-can-take-protect-americas-intellectual-property The White House Blog: Concrete Steps Congress Can Take to Protect America&#039;s Intellectual Property]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
For the mind map software, I found [http://vue.tufts.edu/ VUE] easy to use. I was especially impressed by the rendering in PDF. Everything fit neatly on the page. This was a big surprise after being a Microsoft Office User ;-). Also, PC Users, if you need to print to PDF, [http://www.pdfforge.org/ PDF Creator] is wonderful. --[[User:SCL|SCL]] 22:17, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The story of Edwin Howard Armstrong in Lawrence Lessig&#039;s Free Culture, is especially disturbing due in part to his unfortunate demise. FM radio was systematically repressed by RCA and the government (FCC); for the benefit of RCA (to keep it&#039;s market share with AM radio).The fight between RCA and Edwin Armstrong ultimately broke him down, but this story has repeated itself in many forms throughout history.  RCA benefited from AM radio at the expense of millions of radio listeners who would have been able to enjoy clear FM transmissions.  In this particular case, it lead to the direct death of the inventor and the short changing of the radio listening public.  What happens in other cases where lives are at stake? Would a pharmaceutical company react the same way to protect their financial interests in the event of an important cure being developed?  What if the cure was developed using prior pharmaceutical patents? Would “common sense revolt at the idea?”1 [[User:Earboleda|Earboleda]] 23:44, 4 April 2011 (UTC)&lt;br /&gt;
1 Lawrence Lessig, ( New York: Penguin Press, 1994) Free Culture, 2&lt;br /&gt;
&lt;br /&gt;
The Righthaven case cites some factors working against the plaintiffs, one of which is the fact that they sought copyright protection with the specific intent to file suit. While I certainly don&#039;t think their actions are on the whole noble, it does seem a bit challenging that copyright protection does not require registration. If registration is mere legal formality, but is also required in order to file a suit, it seems unfair to subject Righthaven to scrutiny on that particular basis. If a judge is going to deem such actions as dubious, why not require registration at the outset? [[User:Jsanfilippo|Jsanfilippo]] 19:55, 5 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
It is difficult to discern the common sense in today’s copyright law.  It certainly makes sense that some expressions have value, and the author or assignee of copyright should have the ability to control the use of their valuable intellectual property.  There’s a difference, however, between the deliberate misappropriation of copyrighted material for commercial gain (or infliction of harm), and the casual innocent use of copyrighted material by an individual.  If I buy a newspaper and share it with several people on the train there’s no harm to the publisher.  If I read an article on their web site and email a copy to my friends, that action should be fine too.  While a blog has the potential for more viewers, it seems like a simple extension of social interaction.  I think it’s a travesty that Righthaven was able to prosecute these kinds of claims.  In contrast, the big commercial cases like Viacom v. YouTube, AFP v. Google, AP v. All Headline News and Gatehouse Media v. NYT all had a substantial monetary stake in the creation and dissemination of intellectual property.  Those seem to me to be the more suitable parties for questions of copyright infringement. [[User:ChrisSura|-Chris Sura]] 21:17, 5 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Dear Classmates,&lt;br /&gt;
 &lt;br /&gt;
Thank you for another thoughtful, engaging and energetic discussion both in class an online last evening. The topics discussed are today hyper relevant to all of us and as [http://cyber.law.harvard.edu/is2011/User:Earboleda Earboleda] points out in the case of Armstrong and FM radio have been the source of commerce, intrigue and even tragedy for time uncertain. From the business tactics of [http://en.wikipedia.org/wiki/William_Randolph_Hearst William Randolph Hearst] to [http://www.ascap.com/ ASCAP] suing the Girl Scouts for singing &amp;quot;[http://law2.umkc.edu/faculty/projects/ftrials/communications/ASCAP.html God Bless America]&amp;quot; and far beyond none of us are immune to the ramifications. Not to dwell on it, but as I said last evening even the dead.&lt;br /&gt;
&lt;br /&gt;
In a strange coincidence last night when I got home, I sat down to grab a bite and flipped on CNBC. The show &amp;quot;[http://www.cnbc.com/id/40795923/ 60 Minutes on CNBC]&amp;quot; was rerunning the segment “[http://www.cbsnews.com/stories/2010/06/19/60minutes/main6598800.shtml How Celebs Make A Living After Death]”.  It told how Attorney Mark Roesler, who wished to become a famous entertainment agent but because he lived in Indiana couldn’t find that many big named clients, latched upon the idea of representing notable figures who have passed away. For almost the past thirty years he has turned that idea into an industry.&lt;br /&gt;
 &lt;br /&gt;
Although I didn’t articulate this as well as I had hoped in class, I am conflicted over this. First it seems creepy to me that someone should take the life’s work of transformative figures from Einstein to Michael Jackson and use that for profit.  I’m all for profit from one’s contribution, but affixing the face of Einstein, crossed eyed and sticking out his tongue to a tee shirt, doesn’t seem to me to be that much of a contribution to society and more so something that someone should be able to appropriate. As [http://cyber.law.harvard.edu/is2011/edit/User:ChrisSura?redlink=1 Chris] points out, even more so, prevent the rest of us from also doing so without paying a royalty (if the tee shirt maker also had written above the image their correction of a mistake in one of Einstein&#039;s theorems, perhaps). &lt;br /&gt;
&lt;br /&gt;
On the other hand, Mr. Roesler has created an industry from which many people today make a living, feed their families and send their kids to great institutions like Harvard where they are able to have engaging conversations dissecting the subject. There’s also the point that if someone is going to make money of the dead, shouldn’t some of that money go to their heirs. Well maybe yes and maybe no. Who knows what the dearly departed would have wished for their post mortem profits. I suspect that today there are a lot of people getting rich in part due to the legacies of people like Mother Teresa and other who never spent a night knee deep in filth caring for the sick and dying. --[[User:Gclinch|Gclinch]] 11:48, 6 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
So sorry we did not get to spend more time discussing the Viacom v.YouTube case last night.  When a company is abusing the legal process to further their own interests (as in Viacom wanting to buy YouTube) by their own employees posting copyrighted videos on the site, the focus should not be on YouTube but on Viacom.  There is an old legal saying, bad cases make bad law.  When new legal precedents are being established, one would hope for better facts.[[[[User:Sjennings|sjennings]] 19:28, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Here is an interesting question we asked in class, how long should the copyright last? I think there is no question that there should be one, but for how long? I think the shortest reasonable time is best. Two years would be perfect. There are so many advances in the tenological universe that long copyrights would tie up developers and hinder progress. Most copyrights would be rendered worthless after 5 years due to advances anyway. Who uses Windows Millenium anymore? That was just 10 years ago that it was the world&#039;s premire OS. No one cares about a program written for it. Shorter copywrites are more realistic. [[User:Elishasurillo|Elishasurillo]] 22:16, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Interesting question: [http://paidcontent.org/article/419-have-media-companies-destroyed-their-copyrights-with-the-share-button/# Have Media Companies Destroyed Their Copyrights With The ‘Share’ Button?] --[[User:Gclinch|Gclinch]] 23:06, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Not our topic this week, but AFLAC used crowdsourcing to create their advertising commercial.  Very cool idea in a closely regulated industry - http://www.youtube.com/user/aflac#p/a/f/0/FfusU_MB1ew  [[[[User:Sjennings|sjennings]] 19:32, 6 April 2011 (UTC)]]&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_Infrastructure_and_Regulation&amp;diff=6750</id>
		<title>Internet Infrastructure and Regulation</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_Infrastructure_and_Regulation&amp;diff=6750"/>
		<updated>2011-05-08T22:04:59Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will cover the politics, policy, economics and technology of deploying broadband infrastructure.  We will look at the year-old US National Broadband Plan and the Berkman Center review of international experiences in broadband policy. Additionally, we will look at the substance and politics of the net neutrality debate. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Executive Summary of the National Broadband Plan [http://www.broadband.gov/plan/executive-summary/]&lt;br /&gt;
&lt;br /&gt;
* National Broadband Plan Commission Meeting: National Purposes Update, February 18th 2010 [http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-296353A1.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world, Berkman Center [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Berkman_Center_Broadband_Final_Report-C1_15Feb2010.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Net Neutrality 101 [http://www.savetheinternet.com/frequently-asked-questions?gclid=CKbclcK65KcCFULf4AodaxmJCg]&lt;br /&gt;
&lt;br /&gt;
* More Confusion about Internet Freedom [http://techliberation.com/2011/03/01/more-confusion-about-internet-freedom/]&lt;br /&gt;
&lt;br /&gt;
* Hands Off the Internet [http://www.youtube.com/watch?v=tlhSbJYxOnc]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.fcc.gov The Federal Communications Commission]&lt;br /&gt;
* [http://www.broadband.gov National Broadband Plan]&lt;br /&gt;
* [http://www.openinternet.gov OpenInternet.gov]&lt;br /&gt;
* [http://www.ietf.org The Internet Engineering Task Force (IETF)]&lt;br /&gt;
* [http://www.icann.org The Internet Corporation for Assigned Names and Numbers]&lt;br /&gt;
* [http://www.fcc.gov/Reports/tcom1996.txt The Telecommunications Act of 1996]&lt;br /&gt;
* [http://wireless.fcc.gov/auctions/default.htm?job=auctions_home  FCC - Wireless Spectrum Auctions]&lt;br /&gt;
* [http://www.isp-planet.com/cplanet/tech/2004/prime_letter_040301_powell.html Powell&#039;s Four Freedoms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
A number of things came to mind during the readings.  The one that I&#039;d like to discuss here is what the economic impact on startup and small businesses and the potential negative effects pipeline tiering might have on the US economy.  Pipeline tiering could and most likely would have a negative effect on the US economy if small and startup businesses seek creating revenue in other countries due to class A and class B access by US ISP&#039;s. This said, it could mean many companies opting not to setup shop in the US.  This in turn means less innovation within our own borders.  In the end the ISP&#039;s lose out on a source of revenue and the US loses it&#039;s position as world class innovator.&lt;br /&gt;
&lt;br /&gt;
Further, if another country dictates that all content is free to anyone, how can it be enforced if our own ISP&#039;s charge a tier pricing to access such sites, data and content?  It would also be a requirement for protection of such sources to be made law or included in the requirement to pay for access.  But how do you collect against a foreign country where the services are housed?  Are this ISP&#039;s really thinking this through?  Are they prepared to lose a large amount of business to foreign providers?  To the majority of us we would not notice if we are going to say the UK for content.&lt;br /&gt;
&lt;br /&gt;
If Sealand were still in existence would it help protect against the possibility of tiered charges?&lt;br /&gt;
--[[User:Adavies01|Adavies01]] 20:38, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
After reading all this week&#039;s assignment readings, I started to dig websites to see what is going on in my country, which is South Korea, regarding the &amp;quot;Net Neutrality&amp;quot; issue. It was quite a surprise to find out that Korea, nominated as one of the leading Internet police states in the world, is, in fact, suggesting a rather positive vision in this aspect. ([http://www.koreainformationsociety.com/2010/09/net-neutrality-view-from-korea.html]) Nonetheless, the Internet service of Korea led by three major mobile companies can be in any point thrown into a net neutrality controversy - especially since these corporates are pushing forward to new business frontiers of bigger profits. --[[User:Yu Ri|Yu Ri]] 21:37, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I found this article http://thehill.com/blogs/hillicon-valley/technology/114101-tea-party-groups-come-out-against-net-neutrality I was surprised to find that a lot of people are against Net Neutrality.  They dont believe the FCC has the right to regulate the Internet, but does it? This takes us back to the question of who has juristiction over the web- the government, or the users? [[User:Elishasurillo|Elishasurillo]] 22:04, 8 May 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thought this was relative and very interesting:&lt;br /&gt;
Article referring to common carriage; http://www.economist.com/node/16106593 -- [[User:Alex|Alex]]&lt;br /&gt;
 &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A follow-up to our discussion on limits to free speech and indirect political pressure on third-party private intermediaries.  In this case, four senators are &amp;quot;requesting&amp;quot; Google, Apple, and RIM (maker of Blackberry) to remove apps from their device app stores that identify police DUI checkpoints.  This article is the more passionate and argues for the freedom-of-speech angle: [http://www.eweek.com/c/a/Mobile-and-Wireless/Senators-Pressure-Mobile-App-Stores-to-Kill-Politically-Incorrect-Apps-337124/ Senators Pressure Mobile App Stores to Kill Politically Incorrect Apps.]  While this one is more neutral: [http://news.yahoo.com/s/pcworld/20110323/tc_pcworld/groupsdefenddrunkdrivingcheckpointsoftware Groups Defend Drunk-driving Checkpoint Software.]  But it certainly looks like we&#039;ll see more and more instances of individuals in congress finding favorite online bogeymen to show how patriotic/principled/family-valued/tough-on-crime/fill-in-the-blank they can be! [[User:Smithbc|Smithbc]] 07:05, 24 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*[http://cyber.law.harvard.edu/is2011/User:Smithbc Smithbc] thanks for pointing out this topic. There’s a couple of interesting discussion topics here. One is, if the purpose of drunken driving checkpoints is to get drunk drivers off the road, why would you combat a technology that would allow a potential offender to see active checkpoints before leaving the bar and maybe think twice, get a cab or stay home? It’s like people being pulled over for flashing their lights at oncoming traffic to let others know about a speed trap or ticketing for speed trap scanners in cars. If the purpose is to get people to slow down, don’t all of these accomplish the goals as much as the presence of enforcement? Of course for this logic to be valid one must assume that the goal is keeping drunk drivers off the road and slowing people down as opposed to arrest quotas and the revenue associated with fines. &lt;br /&gt;
&lt;br /&gt;
-- Putting the soapbox aside, a more focused question about the above related to the topics of class is: is it an effective policy tool to attack one set of social problems by diminishing the fundamental rights insured by the First Amendment or aren’t there many other innovative and direct ways? How about directing enforcement or remediation at the offenders instead of stripping the rest of society of basic rights in an attempt to control the actions of a few? It’s seems arcane. It’s akin to thinking you can cure someone who is anemic by using the ancient medical technique of bloodletting. --[[User:Gclinch|Gclinch]] 14:18, 26 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Classmates: Is it just me or are the subjects we are  studying in this class some of the most real world relevant in any class you’ve taken? Every week it seems like the syllabus tracks the headlines. We studied Wikileaks while in the real world events directly related to the topic unfolded. We studied collaborative technologies and the power of the individual to influence the world through digital technologies while dramatic examples of technology propelling individuals as catalysts for social change and crowd sourced political revolutions continue to unfold across large regions of the globe.&lt;br /&gt;
 &lt;br /&gt;
This week we are studying the Internet Infrastructure and Regulation and the National Broadband Plan and in the news important implications of this topic shout out to us.&lt;br /&gt;
 &lt;br /&gt;
The reason I say these things is that I below are a couple of specific examples that I would like your thoughts on.  May I have your opinion on the following? &lt;br /&gt;
&lt;br /&gt;
Last class we talked about Title V of the Telecommunications Act of 1996 commonly known as the ([http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Section 230 of the Communications Decency Act]). One of the primary goals of the 1996 Telecom act was advertised as creating an environment within which competition would flourish. &lt;br /&gt;
  &lt;br /&gt;
Flourish it did, for a relatively short period of time, but in the long run, not so much. This week’s business news started with one of the few remaining independent major wireless carriers in the US agreeing to merger terms with a massive firm that is itself the contemporary result of a string of industry consolidations that have take place in the intervening years since the passage of the Telecom Act of 1996 (see: [http://wwww.networkworld.com/news/2011/032111-att-tmobile-duopoly.html Will AT&amp;amp;T&#039;s T-Mobile buy lead to a duopoly?])&lt;br /&gt;
&lt;br /&gt;
In this week’s class we will be studying [http://www.broadband.gov/ National Broadband Plan] and again recent headlines including, [http://www.govtech.com/public-safety/FCC-Endorses-4G-Wireless-Standard-022411.html “FCC endorsed long term evolution (LTE) as the required standard for any government”] are about highly relevant topics.  One of the goals of the National Broadband Plan is to, “ensure public safety” through addressing the, “lack a nationwide public safety mobile broadband communications network.”&lt;br /&gt;
&lt;br /&gt;
One of the ways the National Broadband Plan proposed to address the lack of a nationwide public safety mobile broadband network was a proposal to auction off a block of spectrum known as the “D Block.” The D Block is a segment of the 700 MHz band that was proposed to be sold to a private entity that would use part of it for commercial purposes and as part of the purchase agreement, the organization would make available and manage part of the spectrum block in support of public safety communications. It’s a very complicated issue, but the bottom line was that the numbers didn’t work out and no private company stepped up to bid enough to cover  the auction reserve (see [http://arstechnica.com/old/content/2008/09/fcc-considering-new-d-block-auction-plan.ars FCC considering new D Block auction]). &lt;br /&gt;
&lt;br /&gt;
This all brings me to a couple of questions I hope we can discuss. Both the Telecommunications Act of 1996 and National Broadband Plan are OMNIBUS initiatives by government to address social challenges.  [http://en.wikipedia.org/wiki/Omnibus_spending_bill Omnibus] is a term that originated (in terms of its use by US government) in the 1970’s for the purpose of handling the national budget when large numbers of funding items would be consolidated into a single piece of legislation.  (This is yet again another topic related to recent headlines see [http://www.heritage.org/Research/Reports/2007/12/Omnibus-Spending-Bill-Busts-the-Budget-to-Pay-for-Pork Omnibus Spending Bill Busts the Budget to Pay for Pork ...])&lt;br /&gt;
&lt;br /&gt;
My first question begins with, “is the omnibus approach a valid way to address challenges?” Can government effectively tackle challenging issues with all encompassing approaches such as omnibus intiatives and legislation? Isn&#039;t it more effective to solve complex problems by chunking them up in more manageable pieces? &lt;br /&gt;
&lt;br /&gt;
Other questions we might discuss tie last week’s readings to this week’s topics. In [https://www.socialtext.net/codev2/free_speech chapter 12 subsection] &#039;&#039;The Regulators of Speech: Distribution&#039;&#039;, Professor Lessig talks about the idea of how the, “deeply held assumption at the core of our jurisprudence governing broadcasting technologies: Only a fixed amount of ‘spectrum’ is available for broadcasting,” and that the way to manage it is to, “allocate slices of it to users,” is a misconception routed in the decades ago understanding of the technology.  Today’s technologies are vastly different and no longer constrain the use of broadcast spectrum in the same ways, yet governance mentality seems stuck in the 1920’s. &lt;br /&gt;
&lt;br /&gt;
What are your thoughts about this idea that even in forward thinking initiatives including the National Broadband Plan policy making seeks to be progressive, yet often is trapped by historical context? &lt;br /&gt;
Thank you. I look forward to your thoughtful comments. --[[User:Gclinch|Gclinch]] 14:18, 26 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
During this week&#039;s reading I came across two interesting articles in support of the AT&amp;amp;T/T-Mobile merger as an exemplary initiation of the National Broadband Plan in action with full blanket coverage across the country, and the economical and technological potential of wireless advancements as the way of the future for broadband. [http://techliberation.com/2011/03/21/some-random-thoughts-on-att-t-mobile-merger/ Some Random Thoughts on AT&amp;amp;T/T-Mobile Merger] and [http://news.cnet.com/8301-1035_3-20045239-94.html AT&amp;amp;T and T-Mobile--Listen Before You Judge] [[User:Deinous|Deinous]] 23:49, 30 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thoughts on Net Neutrality and Open Access====&lt;br /&gt;
This week’s readings on the Omnibus Broadband Initiative, net neutrality and Internet freedom are pure advocacy papers.  (Only the Berkman Center study of next generation connectivity conveyed a sense of impartiality.)  Each presents big business or big government as the enemy of the people’s Internet.  Each is correct to a degree, but neither paints a fair and complete picture.  Theirer warns of inefficient bureaucracy should the government get involved, yet it was a government project from DARPA that created the Internet.  The populist sounding organizations “SaveTheInternet.com” and “HandsOff.org” alternately blame the greedy motives of big businesses like AT&amp;amp;T and Google without discussing the natural competition between content providers and common carriers.  The simple fact of the Internet is that traffic management has existed long before the Internet did – and it has been an integral part of the Internet for most of its life.  The electric company and the telephone company each have business and residential service tiers.  These public utilities are regulated by government to insure and even subsidize a minimum level of residential service.  Business customers pay more for higher service levels.&lt;br /&gt;
This public utility model can serve the Internet as well.  Just as the phone company cannot restrict who you can call (although you may have to pay more for long distance), no Internet service provider should block a particular site’s traffic (although there can be different data plans for capacity and speed).  Many of us perform our own traffic shaping using “Quality of Service” settings (QoS) to grant higher priority “fast lane” access to voice-over-IP (Skype) while relegating email to the slow lane (big deal).  In fact, we welcome the intervention of our ISP for filtering all that spam!  I think the Berkman Center paper gets the concept right by emphasizing “open access” policy – i.e., that every business or other entity has the ability to connect to the infrastructure – but not mandating any policy beyond it.  Promote innovation by allowing tiered service levels with an opportunity to profit from risk, while still guaranteeing basic access to all as a public good in the spirit of the First Amendment. [[User:ChrisSura|-Chris Sura]] 02:51, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Nice thoughts Chris...I share your opinion as regard your last two sentences...To be honest, I did not know how far net neutrality issue is. Till now I though that it is more problem of future than issue of current days. I was wrong...Information about the blocking skype by T-Mobile in Germany in 2009 made me sure in how important the topic is. ([http://en.wikipedia.org/wiki/Network_neutrality#Law_in_Germany T-Mobile blocking Skype in Germany])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
[http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202486102650&amp;amp;Manhattan_Federal_Judge_Kimba_Wood_Calls_Record_Companies_Request_for__Trillion_in_Damages_Absurd_in_Lime_Wire_Copyright_Case Fed Judge Kimba Wood Calls Record Companies&#039; Request for Trillions in Damages Absurd in LimeWire Copyright Case]  The most interesting part of the article is not the outrageousness of the record companies&#039; claims, but the way the judge reached her decision.  She stated that legislature could not have foreseen the way the internet would interact with copyright law, and thus you can&#039;t use legislative history.  Reasonableness, instead, was the issue to rule on.&lt;br /&gt;
&lt;br /&gt;
Wall Street Journal Op Ed by Yochai Benkler [http://www.nytimes.com/2010/03/21/opinion/21Benkler.html Ending the Internet’s Trench Warfare] March 20, 2010 &lt;br /&gt;
&amp;quot;The Federal Communications Commission’s National Broadband Plan, announced last week, is aimed at providing nearly universal, affordable broadband service by 2020. And while it takes many admirable steps — including very important efforts toward opening space in the broadcast spectrum — it does not address the source of the access problem: without a major policy shift to increase competition, broadband service in the United States will continue to lag far behind the rest of the developed world.&amp;quot; --[[User:Gclinch|Gclinch]] 23:32, 28 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New America Foundation link concerning differing broadband service and pricing in the US vs that in Japan:&lt;br /&gt;
http://newamerica.net/publications/policy/u_s_vs_japan_residential_internet_service_provision_pricing&lt;br /&gt;
The brief posted is from 2009 and contains a generous quantity of data which should serve to give you a clear idea of the difference in service availability between the US and a country which is considered to be half a generation ahead of the international standard.[[User:BrandonAndrzej|BrandonAndrzej]] 00:28, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://www.govtech.com/newsletters/question-of-the-day-for-033111.html In a thread on Reddit.com yesterday, members of Google&#039;s Chrome development team shared how fast their office&#039;s Internet connection is. Can you guess the number?]&lt;br /&gt;
&lt;br /&gt;
NPR brings us news from the House.  The Rebublican majority voted to repeal rules that protect net neutrality.  I doubt with will fly in the Senate like the article says.&lt;br /&gt;
Article: [http://www.npr.org/2011/04/08/135247658/house-votes-to-repeal-internet-access-rules House Votes To Repeal Internet Access Rules] [[User:Saambat|Saambat]] 22:50, 19 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=6749</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=6749"/>
		<updated>2011-05-08T21:23:26Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
Regarding the AutoaAdmit case, does anyone have further details on what happened with Anthony Ciolli&#039;s countersuit against the two women and their legal advisor? For further reading on cyberbullying, defamation, privacy etc. an excellent book of essays is The Offensive Internet, edited by Saul Levmore and Martha Nussbaum.[[User:Mary Van Gils|Mary Van Gils]] 21:21, 22 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
This comment really applies to a previous class, but you might be interested in reading about the latest counter-tactics in the struggle for a &amp;quot;borderless Internet&amp;quot; against government control in this article: [http://www.economist.com/node/18386151 Unorthodox links to the internet: Signalling dissent] [[User:Smithbc|Smithbc]] 16:56, 19 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Though the introduction to this session states that &amp;quot;nstead of large media companies and corporate advertisers controlling the channels of speech...&amp;quot;, we&#039;ve reached a point where intermediaries--Facebook, Google, etc--are essentially controlling online speech.  Our networks have landed in private, corporate, centralized locations. I hope that we&#039;ll be adding intermediary censorship to the discussion :) [[User:Jyork|Jyork]] 00:02, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another story in the vein of &amp;quot;AutoAdmit&amp;quot; out right now is at [http://www.smh.com.au/technology/technology-news/cut-and-die-the-web-loves-to-hate-rebecca-black-20110321-1c2tz.html &#039;Cut and die&#039;: the web loves to hate Rebecca Black] About a 13-year old cut-and-paste singer who has become popular on You-Tube for all the wrong reasons; she is receiving death threats via user comments and web discussions. [[User:Smithbc|Smithbc]] 00:23, 22 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
To my knowledge, in US, you have different laws for intermediary liability for speech online (sec 230) and copyright (DMCA), maybe even more. In EU, there are 4 articles in one single act governing liability of ISPs. Especially for hosting providers one specific art. 14. For those interested, here is a link to Ecomerce Directive containing (see art. 12 to 15, hosting providers art. 14) [http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000L0031:en:NOT]. Comparing art. 14(1)b and art. 14(2) of the EC directive with sec. 320 plus explanation of what is publisher and distributor liability from first reading, conclusion is that in EU, hosting provider would be liable under similarly as a distributor or publisher as in US. There are problems with EU legal framework and liability of ISPs and currently it is under review. If you read art. 14 you might realise what can be problem. There is no explanation of terms, such as &#039;actual knowledge&#039;or &#039;expediously&#039;. Or even how should &#039;notice and take down&#039; procedure look like when comparing it to DMCA. It will be interesting to see how the law will change in future. Hopeully in near future:)As regard to google case in Italy, although I was aware of the issue, I did no read decision and can not say my opinion based only on the article read. However, based on my information, I would say that this was exceptional case in EU, and would not therefore make some outcome about threat in EU only based on this case.[[User:VladimirTrojak|VladimirTrojak]] 16:56, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
FWIW, I meant not intermediary liability, but intermediary censorship; e.g., Amazon&#039;s takedown of Wikileaks or Facebook removing Egyptian protest groups.[[User:Jyork|Jyork]] 21:21, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wonder whether Section 230 of the Communications Decency Act would follow the footsteps of so-called journalist&#039;s privilege. As the emergence of millions of amateur reporters and publishers, the conventional definition of journalist&#039;s privilege is rather obsolete now. Likewise, the act which was enacted more than a decade ago seems to not hold the effectiveness any more. There is literally a tremendous number of interactive computer service providers and we have witnessed numerous side-effects burgeoning with the widespread of the online communities. Would it be still okay to give immunity to these providers? --[[User:Yu Ri|Yu Ri]] 19:33, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri,] I am disappointed that we ran out of time in class to have the full discussion you propose. Perhaps we can continue in this forum. &lt;br /&gt;
 &lt;br /&gt;
From my perspective [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Section 230 of the Communications Decency Act] protecting internet intermediaries has had many undesirable unintended consequences.  At the same time, however, it is impossible to know what today’s internet would be like if Section 230 were not made law and not have survived the [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Reno v. ACLU] challenge. The internet and the offline world for that matter would surely be significantly different.  &lt;br /&gt;
&lt;br /&gt;
One thing that probably would have happened is that large numbers of companies that today provide internet based intermediary services would not be in the business because of the costs incurred due of the threat of law suits. &lt;br /&gt;
&lt;br /&gt;
What if one of those companies that decided the costs related to the risk of litigation was too high was google? What if google’s investors decided they could make more money by investing in some other industry and chose not to fund google? How different would our world be? I think of things in the real world that might not be the same. &lt;br /&gt;
&lt;br /&gt;
For instance, what might have happened in Egypt if [http://www.cbsnews.com/8301-503543_162-20030485-503543.html Wael Ghonim] had not found a job at google and followed a different career path? Would the changes we are seeing all across the globe have happened if the social networking tools used so effectively by dissidents never came into existence without Section 230? &lt;br /&gt;
&lt;br /&gt;
Very interesting questions and I’d like to hear your thoughts and those of others in the class. Thanks! --[[User:Gclinch|Gclinch]] 02:29, 23 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A very interesting study on &#039;Four Phases of Internet Regulation&#039;. It talk about how the concept of internet regulation has changed since its early day to present times:&lt;br /&gt;
[http://www.law.harvard.edu/faculty/faculty-workshops/palfrey.faculty.workshop.summer.2010.pdf Four Phases of Internet Regulation][[User:syedshirazi|SyedShirazi]] 21:53, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In professor Lessig’s [http://www.socialtext.net/codev2/index.cgi?free_speech Chapter 12: Free Speech] he makes the well reasoned proposal that a system to protect children from unwanted speech on the internet would be to implement the browser tag &amp;lt;H2M&amp;gt;. I well understand his reasoning and it makes a great deal of sense. In suggesting how to accomplish universal acceptance of this technique professor Lessig says, “This is the role for government.”&lt;br /&gt;
&lt;br /&gt;
Now I haven’t finished his book and knowing how well he backs his arguments I won’t be surprised to find he has tackled this question but until I get there I must ask: Do we really want government to get into the business of legislating actual code? &lt;br /&gt;
&lt;br /&gt;
Professor Lessig’s point that “code is law” teaches us that the code writer can be the secret hand that regulates us by the choices made when programs are written. For instance when we are in a virtual environment we are limited in what we can do substantially by the choices that the programmer has made when she wrote the program.  I think it is the legitimate role of government to protect us from the undue influence of the coder, especially when the software involved might be used by an intermediary who has been granted special status by [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230.]  &lt;br /&gt;
&lt;br /&gt;
I’m not so sure that we should carry the logic to the next level by saying that it is government’s role to actually dictate aspects of code. Classmates: what do you think? --[[User:Gclinch|Gclinch]] 01:49, 23 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Recently during the height of confusion about the disasters in Japan there was a case involving the posting of a highly offensive Youtube video by a UCLA student that at best insensitively mocked Asian peers.  While the school chose not to take disciplinary action claiming that her video did not violate school policy, the community at large took action by shunning and harassing her to the point she withdrew from the school. UCLA is also being criticized by academics of race and gender stating that the objectification of Asians in the video is harmful and displays a deep rooted often overlooked racism that falls outside of the black/white paradigm.  It has been recommended that UCLA should promote a more multicultural understanding and sensitivity by introducing mandatory courses and/or workshops.  I understand how this video and the girl&#039;s views are protected as free speech regardless of how repugnant her words are, but I also find it deeply disturbing that the video went viral mainly due to morbid curiosity.  A good analysis of the deeper harmful racist views and effeccts can be read here [http://www.insidehighered.com/news/2011/03/22/ucla_student_s_youtube_video_illustrates_many_asian_racial_stereotypes?loc=interstitialskip UCLA Student&#039;s Youtube Video Illustrates Many Asain Racial Stereotypes].  While there may be no legal action that can be taken toward a video of this nature, we as a culture unwittingly make it popular and far reaching through multiple views and backlash videos which is something I think we should all think about before we click on that next &amp;quot;shocking&amp;quot; link.  With such ease of access to such content on the internet I think that there comes a personal responsibility as to what goes viral for the wrong reasons, and what just gets lost in the far corners of the internet. [[User:Deinous|Deinous]] 02:14, 25 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This article from the NY Times takes issues from the AutoAdmit case even farther. It deals with teens, sexually explicit photos and texting. Again, what speech is protected? What is not? What about cyberbulling among teens as opposed to adults? Is there any kind of legal relief that the target can seek?  http://www.nytimes.com/2011/03/27/us/27sexting.html&lt;br /&gt;
--[[User:SCL|SCL]] 14:00, 28 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One name for this- Rebbecca Black. She is a 13 year old with possibly the worst song ever on youtube. After amassing 100 million hits, she has been torn apart in the comments. There are over 2 million comments and almost all worse than the one before. The government cannot do anything, citing free speech, but the site can. The responsibility to govern such behavior falls on the shoulders of the websites. You can&#039;t post explicit videos, why not ban explicit comments? [[User:Elishasurillo|Elishasurillo]] 21:22, 8 May 2011 (UTC) &lt;br /&gt;
== Links from Class ==&lt;br /&gt;
&lt;br /&gt;
Slides for today&#039;s class: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf]&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=6748</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=6748"/>
		<updated>2011-05-08T21:22:34Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
Regarding the AutoaAdmit case, does anyone have further details on what happened with Anthony Ciolli&#039;s countersuit against the two women and their legal advisor? For further reading on cyberbullying, defamation, privacy etc. an excellent book of essays is The Offensive Internet, edited by Saul Levmore and Martha Nussbaum.[[User:Mary Van Gils|Mary Van Gils]] 21:21, 22 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
This comment really applies to a previous class, but you might be interested in reading about the latest counter-tactics in the struggle for a &amp;quot;borderless Internet&amp;quot; against government control in this article: [http://www.economist.com/node/18386151 Unorthodox links to the internet: Signalling dissent] [[User:Smithbc|Smithbc]] 16:56, 19 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Though the introduction to this session states that &amp;quot;nstead of large media companies and corporate advertisers controlling the channels of speech...&amp;quot;, we&#039;ve reached a point where intermediaries--Facebook, Google, etc--are essentially controlling online speech.  Our networks have landed in private, corporate, centralized locations. I hope that we&#039;ll be adding intermediary censorship to the discussion :) [[User:Jyork|Jyork]] 00:02, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another story in the vein of &amp;quot;AutoAdmit&amp;quot; out right now is at [http://www.smh.com.au/technology/technology-news/cut-and-die-the-web-loves-to-hate-rebecca-black-20110321-1c2tz.html &#039;Cut and die&#039;: the web loves to hate Rebecca Black] About a 13-year old cut-and-paste singer who has become popular on You-Tube for all the wrong reasons; she is receiving death threats via user comments and web discussions. [[User:Smithbc|Smithbc]] 00:23, 22 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
To my knowledge, in US, you have different laws for intermediary liability for speech online (sec 230) and copyright (DMCA), maybe even more. In EU, there are 4 articles in one single act governing liability of ISPs. Especially for hosting providers one specific art. 14. For those interested, here is a link to Ecomerce Directive containing (see art. 12 to 15, hosting providers art. 14) [http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000L0031:en:NOT]. Comparing art. 14(1)b and art. 14(2) of the EC directive with sec. 320 plus explanation of what is publisher and distributor liability from first reading, conclusion is that in EU, hosting provider would be liable under similarly as a distributor or publisher as in US. There are problems with EU legal framework and liability of ISPs and currently it is under review. If you read art. 14 you might realise what can be problem. There is no explanation of terms, such as &#039;actual knowledge&#039;or &#039;expediously&#039;. Or even how should &#039;notice and take down&#039; procedure look like when comparing it to DMCA. It will be interesting to see how the law will change in future. Hopeully in near future:)As regard to google case in Italy, although I was aware of the issue, I did no read decision and can not say my opinion based only on the article read. However, based on my information, I would say that this was exceptional case in EU, and would not therefore make some outcome about threat in EU only based on this case.[[User:VladimirTrojak|VladimirTrojak]] 16:56, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
FWIW, I meant not intermediary liability, but intermediary censorship; e.g., Amazon&#039;s takedown of Wikileaks or Facebook removing Egyptian protest groups.[[User:Jyork|Jyork]] 21:21, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wonder whether Section 230 of the Communications Decency Act would follow the footsteps of so-called journalist&#039;s privilege. As the emergence of millions of amateur reporters and publishers, the conventional definition of journalist&#039;s privilege is rather obsolete now. Likewise, the act which was enacted more than a decade ago seems to not hold the effectiveness any more. There is literally a tremendous number of interactive computer service providers and we have witnessed numerous side-effects burgeoning with the widespread of the online communities. Would it be still okay to give immunity to these providers? --[[User:Yu Ri|Yu Ri]] 19:33, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri,] I am disappointed that we ran out of time in class to have the full discussion you propose. Perhaps we can continue in this forum. &lt;br /&gt;
 &lt;br /&gt;
From my perspective [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Section 230 of the Communications Decency Act] protecting internet intermediaries has had many undesirable unintended consequences.  At the same time, however, it is impossible to know what today’s internet would be like if Section 230 were not made law and not have survived the [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Reno v. ACLU] challenge. The internet and the offline world for that matter would surely be significantly different.  &lt;br /&gt;
&lt;br /&gt;
One thing that probably would have happened is that large numbers of companies that today provide internet based intermediary services would not be in the business because of the costs incurred due of the threat of law suits. &lt;br /&gt;
&lt;br /&gt;
What if one of those companies that decided the costs related to the risk of litigation was too high was google? What if google’s investors decided they could make more money by investing in some other industry and chose not to fund google? How different would our world be? I think of things in the real world that might not be the same. &lt;br /&gt;
&lt;br /&gt;
For instance, what might have happened in Egypt if [http://www.cbsnews.com/8301-503543_162-20030485-503543.html Wael Ghonim] had not found a job at google and followed a different career path? Would the changes we are seeing all across the globe have happened if the social networking tools used so effectively by dissidents never came into existence without Section 230? &lt;br /&gt;
&lt;br /&gt;
Very interesting questions and I’d like to hear your thoughts and those of others in the class. Thanks! --[[User:Gclinch|Gclinch]] 02:29, 23 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A very interesting study on &#039;Four Phases of Internet Regulation&#039;. It talk about how the concept of internet regulation has changed since its early day to present times:&lt;br /&gt;
[http://www.law.harvard.edu/faculty/faculty-workshops/palfrey.faculty.workshop.summer.2010.pdf Four Phases of Internet Regulation][[User:syedshirazi|SyedShirazi]] 21:53, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In professor Lessig’s [http://www.socialtext.net/codev2/index.cgi?free_speech Chapter 12: Free Speech] he makes the well reasoned proposal that a system to protect children from unwanted speech on the internet would be to implement the browser tag &amp;lt;H2M&amp;gt;. I well understand his reasoning and it makes a great deal of sense. In suggesting how to accomplish universal acceptance of this technique professor Lessig says, “This is the role for government.”&lt;br /&gt;
&lt;br /&gt;
Now I haven’t finished his book and knowing how well he backs his arguments I won’t be surprised to find he has tackled this question but until I get there I must ask: Do we really want government to get into the business of legislating actual code? &lt;br /&gt;
&lt;br /&gt;
Professor Lessig’s point that “code is law” teaches us that the code writer can be the secret hand that regulates us by the choices made when programs are written. For instance when we are in a virtual environment we are limited in what we can do substantially by the choices that the programmer has made when she wrote the program.  I think it is the legitimate role of government to protect us from the undue influence of the coder, especially when the software involved might be used by an intermediary who has been granted special status by [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230.]  &lt;br /&gt;
&lt;br /&gt;
I’m not so sure that we should carry the logic to the next level by saying that it is government’s role to actually dictate aspects of code. Classmates: what do you think? --[[User:Gclinch|Gclinch]] 01:49, 23 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Recently during the height of confusion about the disasters in Japan there was a case involving the posting of a highly offensive Youtube video by a UCLA student that at best insensitively mocked Asian peers.  While the school chose not to take disciplinary action claiming that her video did not violate school policy, the community at large took action by shunning and harassing her to the point she withdrew from the school. UCLA is also being criticized by academics of race and gender stating that the objectification of Asians in the video is harmful and displays a deep rooted often overlooked racism that falls outside of the black/white paradigm.  It has been recommended that UCLA should promote a more multicultural understanding and sensitivity by introducing mandatory courses and/or workshops.  I understand how this video and the girl&#039;s views are protected as free speech regardless of how repugnant her words are, but I also find it deeply disturbing that the video went viral mainly due to morbid curiosity.  A good analysis of the deeper harmful racist views and effeccts can be read here [http://www.insidehighered.com/news/2011/03/22/ucla_student_s_youtube_video_illustrates_many_asian_racial_stereotypes?loc=interstitialskip UCLA Student&#039;s Youtube Video Illustrates Many Asain Racial Stereotypes].  While there may be no legal action that can be taken toward a video of this nature, we as a culture unwittingly make it popular and far reaching through multiple views and backlash videos which is something I think we should all think about before we click on that next &amp;quot;shocking&amp;quot; link.  With such ease of access to such content on the internet I think that there comes a personal responsibility as to what goes viral for the wrong reasons, and what just gets lost in the far corners of the internet. [[User:Deinous|Deinous]] 02:14, 25 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This article from the NY Times takes issues from the AutoAdmit case even farther. It deals with teens, sexually explicit photos and texting. Again, what speech is protected? What is not? What about cyberbulling among teens as opposed to adults? Is there any kind of legal relief that the target can seek?  http://www.nytimes.com/2011/03/27/us/27sexting.html&lt;br /&gt;
--[[User:SCL|SCL]] 14:00, 28 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One name for this- Rebbecca Black.She is a 13 year old with possibly the worst song ever on youtube. After amassing 100 million hits, she has been torn apart in the comments. the are over 2 million comments and almost all worse than the one before. The government cannot do anything, citing free speech, but the site can. The responsibility to govern such behavior falls on the shoulders of the websites. You cant post explicit videos, why not ban explicit comments? [[User:Elishasurillo|Elishasurillo]] 21:22, 8 May 2011 (UTC) &lt;br /&gt;
== Links from Class ==&lt;br /&gt;
&lt;br /&gt;
Slides for today&#039;s class: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf]&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=6747</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=6747"/>
		<updated>2011-05-08T21:15:51Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* David Ardia, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
* James Grimmelmann, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1760151 Sealand, HavenCo, and the Rule of Law]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have received another derogatory grade for my second assignment and need a feedback of my classmates on that. For those who read my prospectus, what grade do you think it deserves? For those who did not read it, I encourage you to take a look at my prospectus and make your comment below on this page or e-mail it me privately to &#039;&#039;vladimirkruglyak@mail.ru&#039;&#039; stating whether the project of this magnitude worth 3, 4, or 5 points on the 5 points scale (note that the prospectus is submitted on time). If your grade is below 5, please explain in what instances other projects supersede mine. When you read &amp;quot;sources sharing common domains&amp;quot; do you raise any questions, what are they? To be objective, consider the motive behind the grade of (3) for this type of prospectus submitted at this type of the course. Note that I do realize that this project, in order to be completed, requires a series of surveys that must be funded. Without surveys I have to rely on someone else&#039;s data or on &amp;quot;pickpocketing&amp;quot; which is unethical and therefore is not my goal. Nevertheless, I believe that the project could have produced several revealing results without significant changes. I think, along with dozens of my colleagues who are majoring in various disciplines, that if the prospectus such as I did deserves the grade of 3, no other project should gain more than that because there is no alternative prospectus has been submitted in this course or replicated based on my prospectus. Do you agree, disagree, and why? Thank you everyone for the survey!!&lt;br /&gt;
&lt;br /&gt;
As per today&#039;s lecture, I found many aspects such as long-arm statute, interstate commerce law, interpol networking, and stock trading/investing accounts outsourcing that could have illustrated the problem with jurisdiction over the electronic source. I am not sure if it has been said, but the principle of cloud computing is also important for many amateurs who wish to hide the hosts of their web pages. I am also encouraging you to read the J.Gilies and R. Cailliau&#039;s book called &amp;quot;How the web was born&amp;quot; so that you can understand better the notion of the internet policy that has originally been imposed in various countries. The authors have a diverse perspective on ideological and legal concepts related to the internet. I have much deeper concepts in mind which I do not mind to share with people who signed up for this course but to share them on the web page of the course in which my work is unfairly graded is senseless. For intellectually curious people and those who in general finds my comments on this site and in the prospectus as interesting, I am offering to join my facebook group where we can create a more profound discussion by exchanging superior educational materials and debating about the issues discussed in this course. The page which soon is going to become autonomous web page of a non-profit organization is located at http://www.facebook.com/group.php?gid=7314616938 --[[User:VladimirK|VladimirK]] 03:03, 9 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
**VladimirK, stop flaming and calm down.  This type of hostility will not reward you.  If you are concerned about your grade perhaps you should speak with the professors and teaching fellows as to how to improve your project.  I believe that I have tried to help you by leaving comments both on the assignment page, and on your personal page in more detail.  I am glad that you have considered the ethical implications of your research and have come to the conclusion that you did.  Now all you really need to do is update your sources to the 21st century. Also, remember, this is just one grade out of several, and just the beginning of your project.  Have fun with your topic, enjoy the work, and you will do fine.  good luck ======:) [[User:Deinous|Deinous]] 09:33, 9 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
**Hi Margaret, I did not notice that you also commented on my personal page. Thank you. I am absolutely calm and rather curious to see how administrators will review the second assignment because my prospectus apparently exceeds in many regards the posted expectations. Yes, I agree that I have to define some technical frameworks, so as everyone&#039;s prospectuses that are in fact half shorter than mine, but it is not what constitutes my grade. The oxymoron consists in the fact that the grading mechanism is acting against its own description of the grading criteria, even more funny, the grader does not know what the line between the good and perfect assignment is. In terms of pickpocketing, the common code of ethics suggests that it is unethical to jeopardize someone else&#039;s privacy, unless there is a serious exception such as duty. This code is broken in so many ways by both government and private entities that it makes no sense to bring the notion of ethics. It is rather about cryptography, super computers, and who can do more of techno-art without getting prosecuted. Take a look for example at the scandal with Russian spies versus the conflict in Libya. In both cases a sabotage is carefully organized in order to defame the adversary. It just does not square out how the twin towers could have been attacked with such a powerful networks that detected so many spies. In Libiya, the internal political climate just does not have enough reasons to create a protest of this magnitude. The notion of reciprocity persists regardless of geographic situation, and the internet is the perfect way to support all ethical and unethical causes of action. It just a matter of power, as we heard in class, to stop the perpetrators at the foreign territory. As of today, there is enough evidences in theory and perhaps on the internet to execute G.W. Bush and dozens of his allies for crimes against humanity, but which court would do that? It is similar to the grading issue in this class: I have a proof posted on the page that I have been degraded for other than academic reasons, but there is no authority in this school who can intervene to establish the status quo. The more prospectuses I see with the grade of five, the more reasons I have to submit this project at another school. So, with all this being said, I guess I will work on my outline and talk with people you are suggesting along with other professionals and journalists to develop further my project. --[[User:VladimirK|VladimirK]] 02:53, 10 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Perhaps I am missing some of the complex nuances of the arguments, but to me the resolution seems straightforward.  Laws exist to govern people not machines.  The legal entities are citizens, companies and governments, not routers and servers.  Every Internet web service is a transaction between two legal entities at each endpoint with subcontractors facilitating the transport.  The Internet or, more precisely, the collection of independent service providers that comprise the Internet, should be regulated in the same manner that all domestic and foreign commerce is managed today.  Germany, for example, requires every German web site to include an &amp;quot;impressum&amp;quot; page listing the legal owner of the site and contact information.  Just as it is more complex to import and export goods across national boundaries, we should expect similar complexities with transnational web services.  Whether or not we agree with the laws of a particular sovereign nation, it seems prudent that international law should preside in cyberspace as surely as anywhere else on the planet. [[User:ChrisSura|-Chris Sura]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi. I just want to encourage anyone who hasn&#039;t yet read the optional reading by Grimmelmann on the fate of HavenCo to do so; it&#039;s a terrific read. I find the central irony of the piece - essentially that HavenCo, ostensibly an organization devoted avoidance of the law, was actually heavily dependent on the rule of law to operate, and that lack of law, not the opposite, is what ultimately destroyed HavenCo - to be fascinating. [[User:BrandonAndrzej|BrandonAndrzej]] 04:17, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Like any good reader of mystery novels who once hooked into the plot flips to the back of the book to discover the ending, my curiosity forced me to google what happened to HavenCo and Sealand.  Found http://www.theconstitutional.org/2011/02/15/sealand-and-havenco-part-ii-the-rise-and-fall-of-havenco/.  Will take Brandon&#039;s suggestion and read the optional reading on the subject, but for the quick answer here it is.  [[[[User:Sjennings|sjennings]] 14:55, 8 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
I was truly inspired by Orin Kerr&#039;s The Problem of Perspective in Internet Law. Someone who is deeply curious about Internet Law has to read this review! The basic legal principle of application of law based on fact raises a fundamental question within Internet Law. The most critical issue of current digital law is not how to list all the newly created technologies but on which perspective we are going to observe the case and apply laws. The view points of users and outsiders can be very tricky but need to be clarified for more accurate legal judgment. I would love to read the rest of this review and other related topics so that I develop better insights in analyzing Internet controversies. --[[User:Yu Ri|Yu Ri]] 15:20, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thanks Brandon and Sjennings for the tips - I was also curious about the fate of HavenCo, and found it particularly interesting to learn that they were originally founded and registered in the UK. So yes, much more dependent on law than they led the public to believe. It also seems shortsighted that, in an effort to stretch the boundaries of the Internet, they saw the creation of a new physical space with its own set of lax regulations as the ultimate design. Other rebellious projects (i.e., torrent services, wikileaks, etc) were able to accomplish as much by operating entirely within the virtual space and defying territorial boundaries. [[User:Jsanfilippo|Jsanfilippo]] 16:01, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The Problem of Perspective in Internet Law was a really good read. I&#039;m convinced there must be a way for governments to have jurisdiction over the actions in their countries via the Internet. Sealand was a great example of this. If the United States wants to take action against a hacker living in Britain with servers at Sealand, can they? I read the piece on HavenCo, and it seems clearer to me that no matter what happens the government will be able to govern the web. Cyberpunks beware.[[User:Elishasurillo|Elishasurillo]] 21:15, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In reading “The Problem of Perspective in Internet Law” it brought up some interesting thoughts about the blurring between the “physical” and “virtual” worlds. How will law govern these types of scenarios in the future?  In November, there was a sale of virtual property for $335K in the Virtual Entropia Universe. This was the largest virtual real estate deal to date and creates a whole new set of challenges with Internet law.  What laws do you apply/enforce to a property that technically does not exist in the true sense of the physical definition?  [[User:Earboleda|Earboleda]] 16:56, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a piece of an article called &amp;quot;Cybersmearing and the Problem of Anonymous Online Speech.&amp;quot; It highlights the pressure corporations put on lawmakers to censor online speech. There are companies that desire to control the flow of information employees or disgruntled customers might reveal. They might use lobbying pressure or other means, to try to convince government officials to put a handle on internet speech. I am concerned that companies may use politics to protect themselves. [http://heinonline.org/HOL/LandingPage?collection=journals&amp;amp;handle=hein.journals/comlaw18&amp;amp;div=25&amp;amp;id=&amp;amp;page= Cybersmearing and the Problem of Anonymous Online Speech]   [[User:Joshuasurillo|Joshuasurillo]] 18:37, 5 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would like to point out that there are many organizations that are in favor of protecting online speech. Also, there are yet other companies that are hypocritical and say they are in favor of free speech, when actually they are not wholly committed. Here is an article from the NY times that discusses this.[http://www.nytimes.com/2008/10/28/technology/internet/28privacy.html Big Tech Companies Back Global Plan to Shield Online Speech]   [[User:Joshuasurillo|Joshuasurillo]] 18:37, 5 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the article I posted above it discusses the Global Network Initiative which the Berkman Center for Internet and Society took part in. [http://cyber.law.harvard.edu/research/principles]   [[User:Joshuasurillo|Joshuasurillo]] 18:37, 5 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.wired.com/threatlevel/2011/03/geohot-site-unmasking/ Judge Lets Sony Unmask Visitors to PS3-Jailbreak Site] desscribes an interesting jurisdictional question to a copyright infringement case. [[User:Deinous|Deinous]] 00:35, 9 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=6746</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=6746"/>
		<updated>2011-05-08T21:00:41Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* John Nichols and Robert W. McChesney, [http://www.thenation.com/article/death-and-life-great-american-newspapers The Life and Death of Great American Newspapers]&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* Nieman Journalism Lab, [http://www.niemanlab.org/2009/06/four-crowdsourcing-lessons-from-the-guardians-spectacular-expenses-scandal-experiment/ Four crowdsourcing lessons from the Guardian’s (spectacular) expenses-scandal experiment]&lt;br /&gt;
* [http://sunlightfoundation.com/ Sunlight Foundation website] - just look around the site to see what they are up to&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.ftc.gov/opp/workshops/news/jun15/docs/new-staff-discussion.pdf FTC Staff Discussion Draft, Potential Policy Recommendations to Support the Reinvention of Journalism] - just skim it&lt;br /&gt;
* Leonard Downie, Jr., and Michael Schudson, [http://www.cjr.org/reconstruction/the_reconstruction_of_american.php?page=all The Reconstruction of American Journalism]&lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
Reading the Knight Commission Report, it is interesting to see how the objectives to achieve informed communities can be found more and more frequently on the new media. As Earboleda notes referring to the recent riots in the Arab world, it is worth to note the ability of individuals to engage with information, communicating what they see with the community. Egypt shut down Internet, beginning with Twitter and Facebook. Primarily as tools for organizing, but they also emerged as one of the most reliable sources of information (and sometimes the only one) from abroad. It was amazing to see how the technology community came to rescue: Google and Twitter joined forces to develop in a weekend a system to convert spoken tweets in text through a phone call (speak2tweet), no need for internet connection. The information society environment is changing, and not just at an individual user level. Given the news blackout, Al Jazeera chose to release its video contents licensed under Creative Commons, making available to any user relevant and credible information (implying creation, distribution and preservation, as the Knight Commission Report states). I guess the decline of journalism has been around for a while, although, as indicated Yu Ri, for most outsiders has gone unnoticed. The acquisition of The Huffington Post by AOL or other movements as the exit of The New York Times in the S&amp;amp;P 500 on Wall Street to make way for other companies such as Netflix... I guess they are signs of the end of an era. [[User:lorenabuin|lorenabuin]] 12:48, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hey all, I hope we don&#039;t mind but I re-organized the comments from this week&#039;s class so there was a clear distinction between &amp;quot;Discussion&amp;quot; and &amp;quot;Links.&amp;quot;  I think having two specific areas each for us to discuss and to share is important; that way we don&#039;t get distracted by links in the middle of a point someone is making, and the links themselves don&#039;t get buried under conversations.  I hope you guys agree! [[User:mcforelle|mcforelle]] 17:06, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just a few comments in response to the material covered in the last slides. It is no doubt that with changes in the function of the media, the society eventually will become reorganized as well. By increasing the amount of information sources, the flow of information through the internet will redistribute our society into variety of constituent groups. Each group will have its own gravitational force that will maintain loyalty of its members. Now, there are two major types of gravities that attract people: one, which involves no money, that is, members are acting based on the ideological cause only; second, in which money-making is the primary objective of the members. There could be a third type, in which members are attracted by both a moderate amount of money and by the good old cause. These segments of the society, may be not all, are going to correlate with each other to the certain degree while maintaining a relationship with the dominating in the nation ideology or perhaps policy such as Federal Law. Hence, the society will thereby become more integrated horizontally rather than vertically. The hierarchic structures will no longer have that monopolistic power as they do have it today. The society will be re-engineered and the shock will certainly take place as Klien describes in the book &amp;quot;The Shock Doctrine&amp;quot;. There are certainly will be turbulences during the emergence of groups influenced by the different types of institutional ecology as Benkler asserts in his book &amp;quot;The Wealth of Networks&amp;quot;. Thus, the utility of the larger group producing the news will suffer due to the process of disintegration, whereas the social benefit of the group receiving the news will rise due to variety of available sources. These are some anticipations that we can make now and prepare to adjust ourselves accordingly. I should have said all this in class, but I do not think that the institutional ecology would allow me. --[[User:VladimirK|VladimirK]] 02:42, 2 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
The  Death and Life of Great American Newspapers article made me ever more thankful for my International Herald Tribune (the international edition of the New York Times).  Top reporting, top writing but at a top price (3 euros – approximately $4.00 cover price), it has become a luxury product targeted to a specific and affluent international readership.  I was horrified when it started including advertisements on the front page, and worse, on the once sacred editorial page - then I understood why: survival.[[User:Mary Van Gils|Mary Van Gils]] 19:03, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Since we are going to talk about the old and new media, I thought that we should have an idea about the sequence of events that have much contributed to the technological development of the internet. By knowing the rate of improvement in hardware and infrastructure, we can hopefully realize an impact the internet has made on the legacy media and what role did the government play in the downfall of the American journalism. Internet Timeline:  http://www.zakon.org/robert/internet/timeline/  --[[User:VladimirK|VladimirK]] 18:29, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I can readily sympathize with this week’s selected authors.  It is unquestionable that the state of journalism is declining, and it was declining long before the Internet was to available to blame.  I had been involved in local politics from the mid 1980’s until a few years ago.  At the start there were always 3 or 4 reporters attending the Selectmen’s and Finance board meetings, and 1 or 2 at every other board or commission meeting.  By the time I “retired” from politics only one local paper remained.  The sole reporter couldn’t (and still can’t) attend the meetings so he would call the local officials to ask what transpired, then write the report based on what he was told without any further fact checking.  Often the newspaper reports are wildly inaccurate.&lt;br /&gt;
While the newspaper was the government watchdog of the past, today it is usually the lone gadfly who attends all the meetings, asks the tough questions, and does whatever he can to make his voice heard.  The Internet is his most powerful amplifier.  [[User:ChrisSura|-Chris Sura]] 00:44, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fact that journalism was already declining long before the widespread of the Internet was novel to me. I assumed that emergence of citizen-led media is taking significant roles of reporting and distributing information away from the conventional media. Was it a lame excuse of the existing journal entities to explain their reduced power which is caused by factors other than the bloggers? --[[User:Yu Ri|Yu Ri]] 09:19, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
It is interesting that a proposed solution to the decline of  American journalism, is to look at  government subsidies.  Would the fact that journalists are subsidized by the government in some fashion, make it a target for political and other influences?  What would stop Congress or the President from cutting off subsidies, or having undue influence on an investigation by a reporter for an article they did not like?  The reality is that the world is changing rapidly, and that includes the way we consume information.  Social media is what helped fuel revolutions across Tunisia, and the Arab world.  This was done by empowering the people with information; not through state subsidized news outlets...  [[User:Earboleda|Earboleda]] 17:09, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
One of the frustrating elements of the discussion of the decline of journalism is that which focuses on global coverage; I am unconvinced that rhetoric regarding pre-Internet global coverage is anything more than nostalgia.  Even the major bureaux often lacked (and still lack) the local knowledge required to cover a locale accurately.  In that sense, I think it&#039;s important to note how social media, citizen journalism, hyperlocal journalism, and other forces have improved upon global coverage of news.&lt;br /&gt;
&lt;br /&gt;
The Nation piece touches on this, certainly, but I don&#039;t think it digs deep enough into the issues surrounding international correspondents and fixers.  [[User:Jyork|Jyork]] 18:57, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
This is no passing fad. The whole world is full of photographers. Cell phones now capture media anywhere at anytime. Newspapers will have to appeal to a niche of society to survive. People have suddenly come to be reporters. but its clear we have lost privacy. Nothing is left alone. Another point is that news is no longer local. The Internet has tuned us into one large community. This is fantastic because now we can understand where people come from and avoid conflicts. [[User:Elishasurillo|Elishasurillo]] 21:00, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
&lt;br /&gt;
Slides for class: [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf]&lt;br /&gt;
&lt;br /&gt;
*  Reposting this because, after reading all the material for this week, I&#039;m realizing that it&#039;s outrageously relevant.  Watch it!:&lt;br /&gt;
**  [http://web.mit.edu/comm-forum/forums/online_news.html#abstract ONLINE NEWS: Public Sphere or Echo Chamber?] -   ~~[[User:mcforelle|mcforelle]] 17:00, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
There is an interesting case on appeal in the Belgian courts regarding Yahoo’s aggregate news service that could have further European implications.  A Belgian court ruled in 2007 that Google News’ publishing links breached Belgian copyright laws.  &lt;br /&gt;
See http://www.bloomberg.com/news - search Google Belgium 2011-02-24 “Google Belgian Copyright Case Could Set Europe Policy”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the United States the way one of the founding fathers envisioned free speech was that “the people shall not be deprived or abridged of their right to speak, to write, or to publish their sentiments; and the freedom of the press, as one of the great bulwarks of liberty, shall be inviolable.”&#039; &lt;br /&gt;
&lt;br /&gt;
While the premise of this argument exists in America today, I am unconvinced in the current culture that the majority of citizen “journalism” promotes and/or moves facts forward to actually enhance the greater good in many cases.  We continue to see this during times of difficulty where inaccurate and misleading information is relayed through one source or another.   I think the larger argument that needs to be made is that the separation between opinion and fact is almost virtually extinct in the media today.   In the age of the five-second headline of hyperbole the “quick hit” is king over the investigated fact.&lt;br /&gt;
&lt;br /&gt;
There are only a few large corporations that own the media outlets and they have control over the way news is relayed.    These organizations often relay “news” into the public forum through the prism of political bias and financial expediency.&lt;br /&gt;
http://www.freepress.net/ownership/chart/main&lt;br /&gt;
&lt;br /&gt;
On September 22 2009, Clay Shirky spoke at the Shorenstein Center on accountability journalism.   Shirky noted  &amp;quot;we are headed into a long trough of decline in accountability journalism because the old models are breaking faster than the new models will be put in their place.&amp;quot;     He goes on to note that decisions about what news is being desired, “is now being made more by the consumer of the news than by the producer of the news.”  In an effort to keep up with that constant appetite, media organizations have become sloppy in their reporting.  &lt;br /&gt;
  1.  James Madison, House of Representatives, June 8 1789&lt;br /&gt;
  2.  http://www.youtube.com/watch?v=tnW2Lv8aFGs&lt;br /&gt;
[[User:Camcloughlin|Camcloughlin]] 21:43, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
How a Kansas City blogger made himself the go-to destination for KC info, both for citizens and local journalists.  Where does he fit in the blogger vs. journalist debate?&lt;br /&gt;
[http://www.pitch.com/2011-03-03/news/tonys-kansas-city/ Welcome to Tony&#039;s Kansas City]&lt;br /&gt;
[[User:Mcforelle|Mcforelle]] 17:07, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
This &#039;pitch&#039; article is pretty interesting.  It seems like he operates as a KC pundit: &amp;quot;The Botello of TKC hated Kansas City, for one. He referred to it as &amp;quot;cowtown&amp;quot; and trashed its every institution, from the Chiefs to the art scene to the restaurants. Men were &amp;quot;douchebags,&amp;quot; women &amp;quot;skanks&amp;quot; and &amp;quot;tramps.&amp;quot;&amp;quot;  I don&#039;t know if I would call him a journalist in the traditional &amp;quot;being objective&amp;quot; sense especially after reading some of his articles (although some of his articles seem to be very objective), but I would definitely consider his work to be valuable.  His spin can easily be dissected and the facts can be reevaluated. [[User:Saambat|Saambat]] 19:42, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
For anyone who is curious (I know I was!), here are a couple articles detailing the French court&#039;s decision in the Joseph Weiler/Karin Colvo-Goller libel case.  The case was dismissed, as the court ruled that the review in question did not go beyond the bounds of any normal review, and that Ms. Colvo-Goller did not bring the suit in good faith (meaning that she forum-shopped).&amp;lt;br&amp;gt;&lt;br /&gt;
[http://chronicle.com/article/French-Court-Finds-in-Favor-of/126599/ &amp;quot;French Court Finds in Favor of Journal Editor Sued for Libel Over Book Review&amp;quot; - &#039;&#039;The Chronicle of Higher Education&#039;&#039;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.ejiltalk.org/in-the-dock-in-paris-%E2%80%93-the-judgment-by-joseph-weiler-2/ Prof. Weiler&#039;s blog post about the ruling]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:mcforelle|mcforelle]] 19:22, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another great article on this topic of old vs new media.  Apparently this is a particularly hot button issue right now.  Jay Rosen, from NYU&#039;s J-school, is presenting at SXSW on this topic, and has written an article as a means of soliciting reader&#039;s input on this upcoming presentation.  Today he responded to some reader responses.  The whole thing, including the conversations in the comments section, is worth a read:&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pressthink.org/2011/03/monsters-of-the-newsroom-id-why-bloggers-vs-journalists-is-still-with-us/  Why &amp;quot;Bloggers vs. Journalists&amp;quot; is Still With Us]   [[User:Mcforelle|Mcforelle]] 02:26, 6 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=6745</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=6745"/>
		<updated>2011-05-08T21:00:08Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* John Nichols and Robert W. McChesney, [http://www.thenation.com/article/death-and-life-great-american-newspapers The Life and Death of Great American Newspapers]&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* Nieman Journalism Lab, [http://www.niemanlab.org/2009/06/four-crowdsourcing-lessons-from-the-guardians-spectacular-expenses-scandal-experiment/ Four crowdsourcing lessons from the Guardian’s (spectacular) expenses-scandal experiment]&lt;br /&gt;
* [http://sunlightfoundation.com/ Sunlight Foundation website] - just look around the site to see what they are up to&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.ftc.gov/opp/workshops/news/jun15/docs/new-staff-discussion.pdf FTC Staff Discussion Draft, Potential Policy Recommendations to Support the Reinvention of Journalism] - just skim it&lt;br /&gt;
* Leonard Downie, Jr., and Michael Schudson, [http://www.cjr.org/reconstruction/the_reconstruction_of_american.php?page=all The Reconstruction of American Journalism]&lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
Reading the Knight Commission Report, it is interesting to see how the objectives to achieve informed communities can be found more and more frequently on the new media. As Earboleda notes referring to the recent riots in the Arab world, it is worth to note the ability of individuals to engage with information, communicating what they see with the community. Egypt shut down Internet, beginning with Twitter and Facebook. Primarily as tools for organizing, but they also emerged as one of the most reliable sources of information (and sometimes the only one) from abroad. It was amazing to see how the technology community came to rescue: Google and Twitter joined forces to develop in a weekend a system to convert spoken tweets in text through a phone call (speak2tweet), no need for internet connection. The information society environment is changing, and not just at an individual user level. Given the news blackout, Al Jazeera chose to release its video contents licensed under Creative Commons, making available to any user relevant and credible information (implying creation, distribution and preservation, as the Knight Commission Report states). I guess the decline of journalism has been around for a while, although, as indicated Yu Ri, for most outsiders has gone unnoticed. The acquisition of The Huffington Post by AOL or other movements as the exit of The New York Times in the S&amp;amp;P 500 on Wall Street to make way for other companies such as Netflix... I guess they are signs of the end of an era. [[User:lorenabuin|lorenabuin]] 12:48, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hey all, I hope we don&#039;t mind but I re-organized the comments from this week&#039;s class so there was a clear distinction between &amp;quot;Discussion&amp;quot; and &amp;quot;Links.&amp;quot;  I think having two specific areas each for us to discuss and to share is important; that way we don&#039;t get distracted by links in the middle of a point someone is making, and the links themselves don&#039;t get buried under conversations.  I hope you guys agree! [[User:mcforelle|mcforelle]] 17:06, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just a few comments in response to the material covered in the last slides. It is no doubt that with changes in the function of the media, the society eventually will become reorganized as well. By increasing the amount of information sources, the flow of information through the internet will redistribute our society into variety of constituent groups. Each group will have its own gravitational force that will maintain loyalty of its members. Now, there are two major types of gravities that attract people: one, which involves no money, that is, members are acting based on the ideological cause only; second, in which money-making is the primary objective of the members. There could be a third type, in which members are attracted by both a moderate amount of money and by the good old cause. These segments of the society, may be not all, are going to correlate with each other to the certain degree while maintaining a relationship with the dominating in the nation ideology or perhaps policy such as Federal Law. Hence, the society will thereby become more integrated horizontally rather than vertically. The hierarchic structures will no longer have that monopolistic power as they do have it today. The society will be re-engineered and the shock will certainly take place as Klien describes in the book &amp;quot;The Shock Doctrine&amp;quot;. There are certainly will be turbulences during the emergence of groups influenced by the different types of institutional ecology as Benkler asserts in his book &amp;quot;The Wealth of Networks&amp;quot;. Thus, the utility of the larger group producing the news will suffer due to the process of disintegration, whereas the social benefit of the group receiving the news will rise due to variety of available sources. These are some anticipations that we can make now and prepare to adjust ourselves accordingly. I should have said all this in class, but I do not think that the institutional ecology would allow me. --[[User:VladimirK|VladimirK]] 02:42, 2 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
The  Death and Life of Great American Newspapers article made me ever more thankful for my International Herald Tribune (the international edition of the New York Times).  Top reporting, top writing but at a top price (3 euros – approximately $4.00 cover price), it has become a luxury product targeted to a specific and affluent international readership.  I was horrified when it started including advertisements on the front page, and worse, on the once sacred editorial page - then I understood why: survival.[[User:Mary Van Gils|Mary Van Gils]] 19:03, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Since we are going to talk about the old and new media, I thought that we should have an idea about the sequence of events that have much contributed to the technological development of the internet. By knowing the rate of improvement in hardware and infrastructure, we can hopefully realize an impact the internet has made on the legacy media and what role did the government play in the downfall of the American journalism. Internet Timeline:  http://www.zakon.org/robert/internet/timeline/  --[[User:VladimirK|VladimirK]] 18:29, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I can readily sympathize with this week’s selected authors.  It is unquestionable that the state of journalism is declining, and it was declining long before the Internet was to available to blame.  I had been involved in local politics from the mid 1980’s until a few years ago.  At the start there were always 3 or 4 reporters attending the Selectmen’s and Finance board meetings, and 1 or 2 at every other board or commission meeting.  By the time I “retired” from politics only one local paper remained.  The sole reporter couldn’t (and still can’t) attend the meetings so he would call the local officials to ask what transpired, then write the report based on what he was told without any further fact checking.  Often the newspaper reports are wildly inaccurate.&lt;br /&gt;
While the newspaper was the government watchdog of the past, today it is usually the lone gadfly who attends all the meetings, asks the tough questions, and does whatever he can to make his voice heard.  The Internet is his most powerful amplifier.  [[User:ChrisSura|-Chris Sura]] 00:44, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fact that journalism was already declining long before the widespread of the Internet was novel to me. I assumed that emergence of citizen-led media is taking significant roles of reporting and distributing information away from the conventional media. Was it a lame excuse of the existing journal entities to explain their reduced power which is caused by factors other than the bloggers? --[[User:Yu Ri|Yu Ri]] 09:19, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
It is interesting that a proposed solution to the decline of  American journalism, is to look at  government subsidies.  Would the fact that journalists are subsidized by the government in some fashion, make it a target for political and other influences?  What would stop Congress or the President from cutting off subsidies, or having undue influence on an investigation by a reporter for an article they did not like?  The reality is that the world is changing rapidly, and that includes the way we consume information.  Social media is what helped fuel revolutions across Tunisia, and the Arab world.  This was done by empowering the people with information; not through state subsidized news outlets...  [[User:Earboleda|Earboleda]] 17:09, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
One of the frustrating elements of the discussion of the decline of journalism is that which focuses on global coverage; I am unconvinced that rhetoric regarding pre-Internet global coverage is anything more than nostalgia.  Even the major bureaux often lacked (and still lack) the local knowledge required to cover a locale accurately.  In that sense, I think it&#039;s important to note how social media, citizen journalism, hyperlocal journalism, and other forces have improved upon global coverage of news.&lt;br /&gt;
&lt;br /&gt;
The Nation piece touches on this, certainly, but I don&#039;t think it digs deep enough into the issues surrounding international correspondents and fixers.  [[User:Jyork|Jyork]] 18:57, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
This is no passing fad. The whole world is full of photographers. Cell phones now capture media anywhere at anytime. Newspapers will have to appeal to a niche of society to survive. People have suddenly come to be reporters. but its clear we have lost privacy. Nothing is left alone. Another point is that news is no longer local. The Internet has tuned us into one large community. This is fantastic because now we can understand where people come from and avoid conflicts.&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
&lt;br /&gt;
Slides for class: [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf]&lt;br /&gt;
&lt;br /&gt;
*  Reposting this because, after reading all the material for this week, I&#039;m realizing that it&#039;s outrageously relevant.  Watch it!:&lt;br /&gt;
**  [http://web.mit.edu/comm-forum/forums/online_news.html#abstract ONLINE NEWS: Public Sphere or Echo Chamber?] -   ~~[[User:mcforelle|mcforelle]] 17:00, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
There is an interesting case on appeal in the Belgian courts regarding Yahoo’s aggregate news service that could have further European implications.  A Belgian court ruled in 2007 that Google News’ publishing links breached Belgian copyright laws.  &lt;br /&gt;
See http://www.bloomberg.com/news - search Google Belgium 2011-02-24 “Google Belgian Copyright Case Could Set Europe Policy”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the United States the way one of the founding fathers envisioned free speech was that “the people shall not be deprived or abridged of their right to speak, to write, or to publish their sentiments; and the freedom of the press, as one of the great bulwarks of liberty, shall be inviolable.”&#039; &lt;br /&gt;
&lt;br /&gt;
While the premise of this argument exists in America today, I am unconvinced in the current culture that the majority of citizen “journalism” promotes and/or moves facts forward to actually enhance the greater good in many cases.  We continue to see this during times of difficulty where inaccurate and misleading information is relayed through one source or another.   I think the larger argument that needs to be made is that the separation between opinion and fact is almost virtually extinct in the media today.   In the age of the five-second headline of hyperbole the “quick hit” is king over the investigated fact.&lt;br /&gt;
&lt;br /&gt;
There are only a few large corporations that own the media outlets and they have control over the way news is relayed.    These organizations often relay “news” into the public forum through the prism of political bias and financial expediency.&lt;br /&gt;
http://www.freepress.net/ownership/chart/main&lt;br /&gt;
&lt;br /&gt;
On September 22 2009, Clay Shirky spoke at the Shorenstein Center on accountability journalism.   Shirky noted  &amp;quot;we are headed into a long trough of decline in accountability journalism because the old models are breaking faster than the new models will be put in their place.&amp;quot;     He goes on to note that decisions about what news is being desired, “is now being made more by the consumer of the news than by the producer of the news.”  In an effort to keep up with that constant appetite, media organizations have become sloppy in their reporting.  &lt;br /&gt;
  1.  James Madison, House of Representatives, June 8 1789&lt;br /&gt;
  2.  http://www.youtube.com/watch?v=tnW2Lv8aFGs&lt;br /&gt;
[[User:Camcloughlin|Camcloughlin]] 21:43, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
How a Kansas City blogger made himself the go-to destination for KC info, both for citizens and local journalists.  Where does he fit in the blogger vs. journalist debate?&lt;br /&gt;
[http://www.pitch.com/2011-03-03/news/tonys-kansas-city/ Welcome to Tony&#039;s Kansas City]&lt;br /&gt;
[[User:Mcforelle|Mcforelle]] 17:07, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
This &#039;pitch&#039; article is pretty interesting.  It seems like he operates as a KC pundit: &amp;quot;The Botello of TKC hated Kansas City, for one. He referred to it as &amp;quot;cowtown&amp;quot; and trashed its every institution, from the Chiefs to the art scene to the restaurants. Men were &amp;quot;douchebags,&amp;quot; women &amp;quot;skanks&amp;quot; and &amp;quot;tramps.&amp;quot;&amp;quot;  I don&#039;t know if I would call him a journalist in the traditional &amp;quot;being objective&amp;quot; sense especially after reading some of his articles (although some of his articles seem to be very objective), but I would definitely consider his work to be valuable.  His spin can easily be dissected and the facts can be reevaluated. [[User:Saambat|Saambat]] 19:42, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
For anyone who is curious (I know I was!), here are a couple articles detailing the French court&#039;s decision in the Joseph Weiler/Karin Colvo-Goller libel case.  The case was dismissed, as the court ruled that the review in question did not go beyond the bounds of any normal review, and that Ms. Colvo-Goller did not bring the suit in good faith (meaning that she forum-shopped).&amp;lt;br&amp;gt;&lt;br /&gt;
[http://chronicle.com/article/French-Court-Finds-in-Favor-of/126599/ &amp;quot;French Court Finds in Favor of Journal Editor Sued for Libel Over Book Review&amp;quot; - &#039;&#039;The Chronicle of Higher Education&#039;&#039;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.ejiltalk.org/in-the-dock-in-paris-%E2%80%93-the-judgment-by-joseph-weiler-2/ Prof. Weiler&#039;s blog post about the ruling]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:mcforelle|mcforelle]] 19:22, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another great article on this topic of old vs new media.  Apparently this is a particularly hot button issue right now.  Jay Rosen, from NYU&#039;s J-school, is presenting at SXSW on this topic, and has written an article as a means of soliciting reader&#039;s input on this upcoming presentation.  Today he responded to some reader responses.  The whole thing, including the conversations in the comments section, is worth a read:&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pressthink.org/2011/03/monsters-of-the-newsroom-id-why-bloggers-vs-journalists-is-still-with-us/  Why &amp;quot;Bloggers vs. Journalists&amp;quot; is Still With Us]   [[User:Mcforelle|Mcforelle]] 02:26, 6 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=6744</id>
		<title>Collective Action and Decision-making</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=6744"/>
		<updated>2011-05-08T20:41:35Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Mass collaboration and the aggregation of information enable potentially profound changes in business and politics. In this class, we will compare and contrast the transformations in economic life and collective decision-making processes brought on the information revolution.  The discussions will also explore the role of open information systems on business and the scope for greater transparency and participation in government, politics and public life.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_2:_Prospectus|Assignment 2]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* James Surowiecki, [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html Wisdom of Crowds (excerpt)]&lt;br /&gt;
**[http://www.nytimes.com/2004/05/22/books/review/0523books-mclemee.html?ex=1400644800&amp;amp;en=43bc95eb638bfed2&amp;amp;ei=5007&amp;amp;partner=USERLAND NYT Review]&lt;br /&gt;
&lt;br /&gt;
* [http://ethanzuckerman.com/blog/?p=1125 Ethan Zuckerman&#039;s blog review of Infotopia] Great summary of the issues in the book.&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Federalist_Papers Federalist Papers] published under the pseudonym Publius.&lt;br /&gt;
* [http://www.blogpulse.com/papers/2005/AdamicGlanceBlogWWW.pdf Divided They Blog] - a paper showing trackbacks between political blogs, mentioned by Ethan Zuckerman in his review of Cass Sunstein&#039;s Infotopia&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
This week’s readings prove that groupthink is a powerful but not infallible force.  Surowiecki tells us that the average of group answers always outperforms individuals over time.  (He uses the example of how the audience of Who Wants to be a Millionaire was right 91% of the time when polled.)  Zuckerman, citing the Condorcet Jury Theorem, retorts that the case is true only if the individuals in the group tend to be right more often than not.  (Otherwise the group answer would probably be wrong 91% of the time.)  Collective decision making works only when each individual is more likely than not to make the correct decision on her own.&lt;br /&gt;
We expect an informed individual is better equipped to make a correct decision than an ignorant one, so where do we get our information?  The distinction between the Federalist Papers and the political blogosphere is telling.  While today’s political pundits advocate for their positions with at least the same fervor (if not eloquence) as Hamilton, Madison and Jay, their audiences receive messages differently.  In the 1700’s newspapers printed federalist and anti-federalist letters alongside each other while their readers evaluated both sides of the question.  Today’s blog readers select their feeds which likely matches their predispositions.  The “information cocoon” is real. [[User:ChrisSura|-Chris Sura]] 22:27, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the readings to highlight the differences that have become so polarizing in our society.  Is this because the &amp;quot;crowdsourcing&amp;quot; attitude is working against strategic thought and boosting mob mentality instead?  Maybe, to Yu Ri&#039;s point, people are being more closed in their beliefs because there is just too much information and we are on overload.  Humans in their natural way will always regroup and go to where the comfort level is....my hope is that a middle ground is found so that true intelligent discourse may again be as prevalent as it was when a man got on a soapbox in a town square one hundred years ago.  [[User:Camcloughlin|Camcloughlin]] 21:40, 22 February 2011 (UTC)  camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have praised the emergence of personalized media, so-called &amp;quot;The Daily Me,&amp;quot; as the contribution to efficiency in information gathering and classifying. Thus, it was an perplexing confrontation of reading Sustein&#039;s assertion on information cocoon dwellers. It is true that people like to hear and see what they want to hear and see and that principle applies to the online activities to some degree. While I was pondering on this notion, a certain idea came up to me: now there is this platform for diversity to spread its wings, but aren&#039;t people being more obstinate about their beliefs and tenets? It is just that I could hardly find the interchanges between liberals and conservatives in the Internet forums, except those with acrid animosity. --[[User:Yu Ri|Yu Ri]] 01:44, 22 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I understand the concern over collective action and whether it lowers the quality of the project. My paper has a lot to do with this and the term homophily. Homophilic groups are everywhere but are they beneficial? I&#039;m tackling this in my final paper. camcloughlin mentioned above how polarizing they are.How can we address this? Also, what about the decision making especially when the views are public? I know the old saying, &amp;quot;There is safety in numbers&amp;quot;, but we have to ask ourselves why do we continue to crowd source? Websites such as urbandictionary and Wikipedia rely heavily on such action. But what happens then they are wrong? [[User:Elishasurillo|Elishasurillo]] 20:40, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think that the posted below concern about the purpose and structure is fair enough to draw our attention to the meaning of the curriculum; the meaning that makes a difference between well-informed person and well-educated person. No objections, of course, to the administrators of this course, they did marvelous research on relevant literature, but as some of us began noticing, the material does not follow logically to build up a skill. I know that in some countries people are spending many years to learn how to properly relate material to students, not simply make them memorize everything. In order to guess on our own what pedagogy might have been behind this giant sheer volume, we must align the material in order so that each concept will serve as a preamble for the next one, and all key terms then will be logically connected to the main scheme. It seems that after sorting out all major concepts from the minor key terms, we are aiming to arrive at the issue of ideological, society based, differences within one giant infrastructure called the internet. After examining most ideologically conflicting dimensions, we must derive a method that will keep catalytic reactions between those most extreme ideologies under control. This method, I assume, should include political, policy-based, and technological instruments. In order to build these instruments we must rely on our predecessors whose remarkable writings we have at our disposal. As some of you have already noticed that some of the writings are of a high caliber and some are of a low and average; nevertheless, they do contribute substance to the sphere of the course. It is therefore crucial to distinguish a high caliber conceptual pieces of writing from the low or mediocre type of writings. Then, we should align them in the right sequence so that we can apply our reasoning, not only memory. I guess this is as far as I should go because as we know, some of the writers are working at the Berkman Center - the host of the course. It will be unethical from my side to point out on the perplexity they may create. &lt;br /&gt;
&lt;br /&gt;
Perhaps for those who has enough imagination, imagine that after all readings that we read so far, we are exposed only to several stones on a giant planet in the giant universe with many other planets connected to it. There are terabytes of books on the net. There is so much to read about and discover. Take the DARPA Internet Program archive alone [http://www.darpa.mil/internetbibliography.html] or the internet society resources [http://www.isoc.org/internet/history/cerf.shtml] and they will extrapolate our horizons even farther. If we will search the archives of other countries, we would have not enough lifetime to read everything that is equally worth reading as our class material. It is important however, to have a wise conventional opinion not only about the modern concepts, but also about classic definitions, and Wisdom of Crowds by Surowiecki is an excellent emitter of the &amp;quot;old school&amp;quot; discoveries. His book &#039;&#039;Wisdom of Crowds&#039;&#039; so as &#039;&#039;Wealth of the Networks&#039;&#039; is built on the original concepts he interprets. In the book &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; the Scottish journalist Charles Mackay writes about the first conglomerates of people, not connected with internet, but infatuated by the same idea of rapid enrichment through the stock market. In the first hundred pages author describes the most devastating financial bubbles and schemes instigated by John Law, the son of the banker and a creative financier, who in his &#039;&#039;Proposals and Reasons for Constituting a Council of Trade&#039;&#039;, which he presented to the British Parliament, proposed to issue a loan-for-shares based instrument which has failed a number of times and at several countries due to the rapid and large demand for one type of shares issued for sale. If we think of a stock buyers as of the web sight users, we can understand better the concept of the collective action and decision making process. Surowiecki, of course, makes an excellent example of the bias in the herd instinct when he describes the authority bias in the decision by investigative group of the shuttle&#039;s catastrophe and in the coordination of other groups of people driven by the common goal. I am confident that the experts opinion and the seer-sucker theory is in value when the majority is trying to think. It is exactly what people are trying to do in this course: people are trying to find a cognizable way to comprehend the material by cooperating and coordinating within the group. Nevertheless, I personally believe that &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; is by default the strongest platform to base our understanding both of the concepts of the internet and of the digital economics of the society.  --[[User:VladimirK|VladimirK]] 01:30, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Link to article in today&#039;s NY Times regarding Egypt&#039;s shut down during the revolution of internet within its borders:&lt;br /&gt;
http://www.nytimes.com/2011/02/16/technology/16internet.html?pagewanted=1&amp;amp;_r=2&amp;amp;hp&lt;br /&gt;
&amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 15:53, 16 February 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In reading the Surowiecki excerpt and the summary on Zuckerman&#039;s Infotopia I think it is apparent that they are discussing apples and oranges.  Surowiecki is concentrating on the crowd&#039;s ability to accurately determine a correct answer to a specific question governed by a certain criteria (e.g. how many beans in this jar or which one of these four possible answers is correct).  Zuckerman, on the other hand, is looking at the human behavior and ideology aspect which has no defined criteria or &amp;quot;right&amp;quot; answer.  When asking the crowd what their opinion is regarding a particular issue the answers will undoubtedly depend on the individual&#039;s personal beliefs and past experiences which vary greatly from person to person.  If the ideological question is framed in such a way that there is a limited selection of answers, such as in polling, the individuals will gravitate towards the answer which most fits their personal belief.  While this will allow for an analysis of what the &amp;quot;majority&amp;quot; of the crowd prefers it does not necessarily mean that majority is correct.  Once the human condition is allowed to enter the equation the ability to determine what is correct vs. what is preferred is gone.&lt;br /&gt;
--[[User:Rakundig|Rakundig]] 10:37, 17 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Dear&#039;&#039;&#039; Fellow Internet and Society Classmates:&lt;br /&gt;
&lt;br /&gt;
I am writing with a proposal.  February 22 will be our forth meeting as a class which marks the milestone that  we are more than one quarter of the way through the material we will study during the semester. During the last several classes we have studied examples of commons based production including Wikipedia and we are using a wiki based tool for asynchronous class discussions. Not to take anything away from the quality of the content of those contributions, one thing that has been missing is a structure and purpose.&lt;br /&gt;
 &lt;br /&gt;
My proposal is that starting this week we begin to put into practice some of the things that we have learned to date. That is, below I have constructed a set of notes on what I have taken away from the class. I invite you in the spirit of Wikipedia to edit, comment upon, contribute to and in other ways improve what I have written in a collaborative search for a common understanding of the materials presented in this course. If you are so inclined, I ask you to follow a small set of basic tenets that are described on the [http://cyber.law.harvard.edu/is2011/edit/Talk:Collective_Action_and_Decision-making Discussion page].&lt;br /&gt;
  &lt;br /&gt;
I hope that you will join me in this project. I believe a commons based approach to summarize what we have learned so far will benefit us all in translating the great information Rob and David have introduced to us. No two of us have walked away from any class discussion nor reading, nor listening, nor viewing with the exact same perception of what has been discussed. Below presents a opportunity for us all, those who gather in Cambridge and those who participate at a distance, to come to a closer mutual understanding. &lt;br /&gt;
&lt;br /&gt;
Join me below to flesh out what I have begun. Add references that I have missed, correct statements that are in accurate, add your unique insight so that we can all come to a better common understanding. &lt;br /&gt;
Thank you in advance for your willingness to participate. &lt;br /&gt;
&lt;br /&gt;
Guy --[[User:Gclinch|Gclinch]] 04:06, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can certainly count on my support and participation! I think it&#039;s a great idea to summarize what we have learned &#039;in a mass collaboration approach&#039;; nonetheless, I consider that it would be much better if we can create another page to aggregate all the information from lectures apart from opinions or questions of the discussion section. I might have interpreted your purpose in an unexpected way, so please do not hesitate to share your brilliant ideas! Thank you. --[[User:Yu Ri|Yu Ri]] 08:04, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If each of us have less than a 50% chance of being right about a decision, a group of us will be worse at making a correct decision, with our probability of accuracy increasing towards zero as the size of the group increases.&amp;quot; [http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/]&lt;br /&gt;
&lt;br /&gt;
I thought this quote highlighted what could be a hurdle for Wikipedia, insofar as the potential for an unlimited pool of contributors. While it does not appear to be a problem at present (if anything, they seem eager to include more individuals in the project), I&#039;d be curious if and when they will reach a tipping point. - [[User:Jsanfilippo|Jsanfilippo]] 18:19, 22 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Dear [http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri] ,  Thank you for your kind words. You have interpreted my purpose exactly. Are you suggesting that the topic of Internet and Society would make a good Wikipedia article? If so, I agree.  I checked and someone looks to have begun [http://en.wikipedia.org/wiki/Internet_and_Society one on this exact topic], but contributed only a small amount and has not been modified the informing since 2009. Would you suggest  we pick up where that author left off? --[[User:Gclinch|Gclinch]] 00:24, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Dear Guy,That sounds awesome! Probably we can reconstruct the contents of the article and start filling out relevant information in no time. I would be happy to contribute my effort in improving or re-editing this article on Wikipedia. Feel free to contact me with any suggestion regarding this project. --[[User:Yu Ri|Yu Ri]] 02:18, 22 February 2011 (UTC) &lt;br /&gt;
++++&lt;br /&gt;
&lt;br /&gt;
To use the term from economics, this course is built “on the shoulder of giants.” The three main giants are [http://en.wikipedia.org/wiki/Zittrain Jonathan Zittrain], [http://en.wikipedia.org/wiki/Lawrence_Lessig  Lawrence Lessig], and [http://en.wikipedia.org/wiki/Yochai_Benkler Yochai Benkler]. The course is also supplemented by a number of other influential thinkers who will be mentioned below.&lt;br /&gt;
&lt;br /&gt;
Each of these individuals has contributed a block in the foundation of a set of tools that we students can use to understand the effects that digital technologies are having on our society, culture, government and personal lives today and into the future. &lt;br /&gt;
&lt;br /&gt;
Rob told us that the best way to absorb this material is to begin with Zittrain, progress to Lessig and build to  Benkler.  Along the way we will interject relevant references to other influential thinkers.&lt;br /&gt;
&lt;br /&gt;
In his book, [http://yupnet.org/zittrain/archives/6 The Future of the Internet: and how to stop it] Jonathan Zittrain begins by describing how the Internet emerged at a time when inexpensive fully customizable multiuse computers became available to large numbers of technology tinkerers. The proliferation of these plastic (in the sense of the word that means malleable) platforms combined with unexpected success of the Internet Protocol for connecting these powerhouses of innovation together to link people across time and distance allowed the property of  Generativity to emerge. &lt;br /&gt;
&lt;br /&gt;
Defined as, “[http://en.wikipedia.org/wiki/Generativity an independent ability to create, generate, or produce new content unique to that system without additional help or input from the system&#039;s original creators]” the generative properties of the Internet allowed it to attain “[http://yupnet.org/zittrain/archives/8#2 mainstream dominance] over [http://yupnet.org/zittrain/archives/8#1 proprietary barons such as AOL, CompuServe, and Prodigy.]”&lt;br /&gt;
&lt;br /&gt;
Zittrain describe the following five properties of generativity as important to our discussion: Leverage, Adaptability,  Ease of mastery, Accessibility and Transferability. Important to beginning to build our model, Zittrain describes how the “[http://yupnet.org/zittrain/archives/13#1 hourglass architecture]” of the internet facilitated generativity through a layering property that broke the network into three logical layers. The hourglass is an intellectual concept and not a tangible thing. It helps people who wish to create innovations to focus on their specialty without needing to be concerned how other pieces of the puzzle that are necessary to make things happen work. Layers communicate with each other based on a set of properties that are native to each layer and understood by the others. In essence a digital [http://en.wikipedia.org/wiki/Esperanto Esperanto] or commonly understood language between layers.&lt;br /&gt;
&lt;br /&gt;
The model features “[http://yupnet.org/zittrain/archives/13#3 an ‘application layer,’ representing the tasks people might want to perform on the network].” The foundation of the hourglass is “[http://yupnet.org/zittrain/archives/13#3 the ‘physical layer,’ the actual wires or airwaves over which data will flow].” The middle layer is where the true ingenuity of the model lives. It is “[http://yupnet.org/zittrain/archives/13#3 the ‘protocol layer,’ which establishes consistent ways for data to flow so that the sender, the receiver, and anyone necessary in the middle can know the basics of who the data is from and where the data is going].”&lt;br /&gt;
&lt;br /&gt;
Combined the power of the plastic processing platforms on the edge and unrestrained flow of information across the digital network unleashed a wave of innovation and creativity never before seen in the history of humanity. There is more important information in Zittrain’s about how the combination of economic, cultural security concerns and other forces are today combining to extinguish the generative nature that the Internet created. I am sure we will return to these topics later in the course. &lt;br /&gt;
&lt;br /&gt;
The next element of our foundational model comes from Lawrence Lessig. In his book [http://codev2.cc/download+remix/Lessig-Codev2.pdf  Code: version 2.0] professor Lessig describes that the Internet is what it is because of decisions that have been made by the designers of the system about how the system will work.  This means that the Internet is not of some natural evolution or from some divine design, it is a creation of human invention. &lt;br /&gt;
&lt;br /&gt;
In the early days of the Internet there was an overriding ethos that the Internet was ungovernable and beyond regulation. Notable thinkers including [http://en.wikipedia.org/wiki/John_Perry_Barlow John Perry Barlow] spoke “behalf of the future” to say, “[http://ww2.cs.mu.oz.au/~zs/decl.html no moral right to rule us nor do you possess any methods of enforcement .]“&lt;br /&gt;
&lt;br /&gt;
Lessig defeats the claim of no methods of control by describing a combination of factors including commercial motivations, user acquiescence to improve convenience, security, regulatory and other concerns that have resulted in innovation in the application layer that in turn has resulted in the implementation of features that are creating the opportunity for significant control. &lt;br /&gt;
&lt;br /&gt;
We also discussed how [http://en.wikipedia.org/wiki/Jack_Goldsmith Harvard Law School professor Jack Goldsmith] and [http://en.wikipedia.org/wiki/Tim_Wu Columbia Law School Tim Wu] showed not only do laws of local jurisdictions impose regulation on the internet and its users  so do local geographical cultural and other factors [http://www.legalaffairs.org/printerfriendly.msp?id=961].&lt;br /&gt;
&lt;br /&gt;
Lessig describes how the cumulative effect of Markets, Laws, Social norms result in the equation that Code = law. In other words, the decisions made by those who create the underlying code that makes the Internet possible result in a cumulative effect of establishing governance. The format of that governance is a direct result of the conscious choices made by those who design and implement the system. The decisions on what goes into the code are a result of Markets, Laws and Social norms.&lt;br /&gt;
&lt;br /&gt;
The third element of the foundation of the way we are describing the effects of digital technologies on our society comes from the seminal work by Yochai Benkler, [http://yupnet.org/benkler/ The Wealth of Networks]. Benkler informs us that digital technologies are creating an environment in which a, &amp;quot;[http://mitworld.mit.edu/video/396 radical decentralization of capitalization and computing resources is allowing every connected person, some 600 million to a billion people, to have the means to engage in info knowledge and cultural production].” Benkler argues that the “industrial information economy” is giving way to a new model of human contribution based upon a “commons” approach to innovation.&lt;br /&gt;
 &lt;br /&gt;
He painstakingly documents how the system for protecting  what is commonly known as intellectual property  that was originally  meant to foster economic growth is actually considerable less efficient on a macroeconomic level  than a model in which innovation is freely contributed.  &lt;br /&gt;
&lt;br /&gt;
Benkler argues that the prevailing theory of protecting an individual and organization’s right to control how their innovations are used (and influence how they are compensated for such use) creates such considerable transaction costs for those who might otherwise build upon previous innovations to create new products, services, works of art and other contributions to the betterment of society as a whole that they choose not to do so because of the imposed cost burden.  &lt;br /&gt;
Benkler provides numerous examples that show how a commons based approach has resulted in significantly better, richer and more beneficial layers of innovation.&lt;br /&gt;
  &lt;br /&gt;
[http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php#  Kevin Kelly] demonstrates that in a “Benkleresque” world where information might be freer and ideas less subject to the artificial scarcity created by “Intellectual Property and Copyright” laws overall wealth in the economy would be greater due to the generative effects discussed by Zittrain. Kelly states that  producers would still be enriched because people are still be willing to pay monies associated to various factor involved in the conveyance of information.  In additional new forms of distribution would further increase overall good. &lt;br /&gt;
&lt;br /&gt;
Along the way we have also talked about several recurring themes. These include:&lt;br /&gt;
&lt;br /&gt;
- Internet infrastructure which is foundational, multipurpose; &lt;br /&gt;
- Innovation and public spaces&lt;br /&gt;
- Networks, openness, distributed, decentralized&lt;br /&gt;
- Digital disruption: challenges to existing institutions&lt;br /&gt;
&lt;br /&gt;
Under the topic of Digital disruption, we talked about how the &amp;quot;[http://en.wikipedia.org/wiki/Dot-com_bubble dot-com bubble]&amp;quot;  a surge in financial speculation in digital technologies from roughly 1995 to 2000 resulted in a financial market crash that disrupted economies across the globe.&lt;br /&gt;
&lt;br /&gt;
We discussed how Chris Anderson, author and editor-in-chief of Wired Magazine has shown how digital technologies have unleashed a “[http://www.wired.com/wired/archive/12.10/tail.html long tail of innovation]” that is resulting in fundamental shifts in markets. &lt;br /&gt;
&lt;br /&gt;
[http://forum-network.org/lecture/boston-ideas-2005-eric-von-hippel Eric von Hippel]  shows, in relative parallel to the Benkler proposition, that digital technologies are empowering society and increasing social welfare by shifting innovation up into the user layer. That is digital technologies are shifting the source of innovations from the traditional manufacturer to user generated creation.  He shows how end users, who know intimately more about the ways something is important and how it can be improved are becoming a dynamic source for new creation and improvement.&lt;br /&gt;
&lt;br /&gt;
(New post) Ethan Zuckerman&#039;s review of &#039;&#039;Infotopia&#039;&#039; made me want to read Sunstein&#039;s book. The breadth of topics that Sunstein explores is impressive. From my organizational behavior perch, I especially liked the coverage of group think and cocooning. As an added bonus, Zuckerman contributes another layer of insight in his treatment of Sunstein&#039;s themes.--[[User:SCL|SCL]] 03:29, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hey all!  I found this really interesting little study I found on a woman&#039;s personal blog, which she called &amp;quot;[http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!],&amp;quot; that I thought might be interesting to share.  Courtney Stanton wrote a post on her WordPress blog about women, haters, and rape culture in online gaming, and was so astounded by the responses to the post that she decided to do a wee study on the trolls of those comments.  I thought it was neat to see her methodology, how she broke things down and the conclusions she came to - basically, that trolls contribute nothing (which we all already knew, but now we know the characteristics of their nothingness), and that allowing thoughtful responses to a contentious topic, whether or not you agree with them, can actually foster respectful conversation and be good for you and your blog.  I thought this was particularly relevant giving the theme of &amp;quot;cocooning&amp;quot; in this week&#039;s readings.  Would it be appropriate for me to add this under the &amp;quot;Links&amp;quot; section of this page, with a little description and a disclaimer that it is student-submitted and not from the profs/TAs? --[[User:mcforelle|mcforelle]] 19:03, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In earlier discussions today, there was a mention of manufacturers such as Apple trying to ensure that customers do not modify/hack their products.  They faced the potential of having their phones (IPhone) shut off by their carrier.  This atmosphere of fear seems to be pervasive across manufacturers to keep their customer “in line” at times.  The “fear” of potential safety issues is one that has worked on me more than once.  Naturally if customers can modify existing products on their own,  they may not need to buy the next version of a manufacturer&#039;s product.  [[User:Earboleda|Earboleda]] 00:24, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai folx -----=:) In light of a seemingly negative perception of what hackers do, and also as a demonstration of positive collective action I thought that I would share a bit about a primarily European hacker group named Telecomix that recently rallied to provide low tech communications such as fax numbers, dial-up modems, and even HAM radio coms for the Egyptian people during the internet blackout days of the anti-Mubarak protests.  This was a video they made at the beginning of the uprising: &amp;quot;[http://www.youtube.com/watch?v=Tz4ECbj3dkY| Telecomix Message to North Africa and the Middle East]&amp;quot;.  Later they were mentioned by the Electronic Frontier Foundation along with the French Data Network as organizations that provided technical workarounds and support during the black out.  The EFF article can be found here: &amp;quot;[http://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak | Egypt&#039;s Internet Blackout Highlights Danger of Weak Links Usefulness of Quick Links&amp;quot;].  Telecomix is currently providing a variety of similar technologies for the people of Libya.  They are about the datalove and keeping it free and flowing. (:=----- kthxbai [[User: deinous|deinous]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hai again!  In class last night I had mentioned the two different approaches that Microsoft and Sony are taking toward hackers hacking their gaming consoles. In a recent Mashable article, &amp;quot;[http://mashable.com/2011/02/21/kinect-sdk/ |Xbox Kinect vs. Sony PS3: How 2 Companies Handle Hacking]&amp;quot;, they described these approaches.  Microsoft is encouraging hackers to innovate and push the limitations of their new motion sensoring peripheral, Kinect, by hosting hacking contests and the upcoming commercial release of a developing platform, SDK, for hacker to use. About a week after the public release of the Kinect last fall there was a huge buzz in the gaming community that the Kinect had been hacked to play World of Warcraft. Being an avid member of the WoW community I was very excited about this and searched to find out what the hack did.  As it turned out the Institute for Creative Technology of USC had created a customizable user interface and had applied it to the game controls for WoW.  The result and explanation of this inspiring hack can be seen in their YouTube video here: &amp;quot;[http://www.youtube.com/watch?v=62wj8eJ0FHw | World of Warcraft with Microsoft Kinect using FAAST and OpenNI&#039;]. There is also already a commercially release development platform for creating homebrewed Xbox360 games, and again, there are many hosted contests for talented hackers.  Conversely, companies like Sony do not encourage hacking their systems, and are currently suing George Holt for jailbreaking the PS3 for homebrew game design. This closed attitude raises the important question: if you purchased the product, why are you not allowed to do with it as you please? Recently, at least in the common practice of jailbreaking Apple&#039;s iPhones and iPads for open development, and unapproved software from Apple, it is not illegal to do so and will not result in lawsuits or terminations of your phone and data services.  It does however void Apple warranties.  I personally am in support of the &amp;quot;you buy it, you can do what you want with it&amp;quot; argument, and look forward to more companies adopting attitudes and policies much like Microsoft has with their releasing of commercial developing tools that promote the generative process of creating new hardware uses and homebrew game design.  If these consoles and gadgets remain so closed I agree with Zittrain that there will become a stagnation with in creative technology. ---=:) kthxbai [[User:Deinous|Deinous]] 20:43, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*  [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html/ Clay Shirky TED Talk]&lt;br /&gt;
* [http://www.businessweek.com/innovate/content/feb2007/id20070201_774736.htm goldcorp story] (worth reading)&lt;br /&gt;
* [http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!] - Courtney Stanton&#039;s study of responses to a blog post about women and rape culture in gaming, focusing on the content of the comments and comparing civil discussion to trolling.  A quick read, interesting analysis.  --[[User:mcforelle|mcforelle]] 22:01, 22 February 2011 (UTC)&lt;br /&gt;
* some links on Apple&#039;s new subscription model:&lt;br /&gt;
** [http://mashable.com/2011/02/15/apple-subscription-model/ Apple&#039;s New Subscription Model]: Christina Warren, Mashable&lt;br /&gt;
** [http://www.readwriteweb.com/archives/apple_subscription_model.php The New New Media: Apple&#039;s Subscription Model]: Richard MacManus, ReadWriteWeb&lt;br /&gt;
** [http://www.pcmag.com/article2/0,2817,2380742,00.asp Top 4 Publisher Objections to Apple Subscriptions]: Peter Pachal, PCMag&lt;br /&gt;
** [http://mediadecoder.blogs.nytimes.com/2011/02/15/apple-offers-subscriptions-for-all-ipad-publications/?partner=rss&amp;amp;emc=rss Apple Offers Subscriptions for Apps]: JEREMY W. PETERS and MIGUEL HELFT, NYTimes&lt;br /&gt;
* Ethan Zuckerman on [http://www.ethanzuckerman.com/blog/2008/04/25/homophily-serendipity-xenophilia/ Homophily, serendipity, and xenophilia] -- an interesting response to the &amp;quot;silo&amp;quot; theory (aka homophily) we discussed in class. --[[User:RebekahHeacock|RebekahHeacock]] 00:15, 23 February 2011 (UTC)&lt;br /&gt;
* Here is a link from yesterday&#039;s New York Times, http://nyti.ms/fBtKpz more wikileaks this time referring to the Qaddafi family’s exploits [[User:FMRR|FMRR]] 16:02, 24 February 2011 (UTC)&lt;br /&gt;
*  Interesting talk tonight (24 Feb), open to the public from what I can tell.  Video will be posted afterwards, if you can&#039;t make it:&lt;br /&gt;
**  [http://web.mit.edu/comm-forum/forums/online_news.html#abstract ONLINE NEWS: Public Sphere or Echo Chamber?] - 5-7pm, [http://whereis.mit.edu/?go=3 3-270]  ~~[[User:mcforelle|mcforelle]] 20:00, 24 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=6743</id>
		<title>Collective Action and Decision-making</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=6743"/>
		<updated>2011-05-08T20:40:35Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Mass collaboration and the aggregation of information enable potentially profound changes in business and politics. In this class, we will compare and contrast the transformations in economic life and collective decision-making processes brought on the information revolution.  The discussions will also explore the role of open information systems on business and the scope for greater transparency and participation in government, politics and public life.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_2:_Prospectus|Assignment 2]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* James Surowiecki, [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html Wisdom of Crowds (excerpt)]&lt;br /&gt;
**[http://www.nytimes.com/2004/05/22/books/review/0523books-mclemee.html?ex=1400644800&amp;amp;en=43bc95eb638bfed2&amp;amp;ei=5007&amp;amp;partner=USERLAND NYT Review]&lt;br /&gt;
&lt;br /&gt;
* [http://ethanzuckerman.com/blog/?p=1125 Ethan Zuckerman&#039;s blog review of Infotopia] Great summary of the issues in the book.&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Federalist_Papers Federalist Papers] published under the pseudonym Publius.&lt;br /&gt;
* [http://www.blogpulse.com/papers/2005/AdamicGlanceBlogWWW.pdf Divided They Blog] - a paper showing trackbacks between political blogs, mentioned by Ethan Zuckerman in his review of Cass Sunstein&#039;s Infotopia&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
This week’s readings prove that groupthink is a powerful but not infallible force.  Surowiecki tells us that the average of group answers always outperforms individuals over time.  (He uses the example of how the audience of Who Wants to be a Millionaire was right 91% of the time when polled.)  Zuckerman, citing the Condorcet Jury Theorem, retorts that the case is true only if the individuals in the group tend to be right more often than not.  (Otherwise the group answer would probably be wrong 91% of the time.)  Collective decision making works only when each individual is more likely than not to make the correct decision on her own.&lt;br /&gt;
We expect an informed individual is better equipped to make a correct decision than an ignorant one, so where do we get our information?  The distinction between the Federalist Papers and the political blogosphere is telling.  While today’s political pundits advocate for their positions with at least the same fervor (if not eloquence) as Hamilton, Madison and Jay, their audiences receive messages differently.  In the 1700’s newspapers printed federalist and anti-federalist letters alongside each other while their readers evaluated both sides of the question.  Today’s blog readers select their feeds which likely matches their predispositions.  The “information cocoon” is real. [[User:ChrisSura|-Chris Sura]] 22:27, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the readings to highlight the differences that have become so polarizing in our society.  Is this because the &amp;quot;crowdsourcing&amp;quot; attitude is working against strategic thought and boosting mob mentality instead?  Maybe, to Yu Ri&#039;s point, people are being more closed in their beliefs because there is just too much information and we are on overload.  Humans in their natural way will always regroup and go to where the comfort level is....my hope is that a middle ground is found so that true intelligent discourse may again be as prevalent as it was when a man got on a soapbox in a town square one hundred years ago.  [[User:Camcloughlin|Camcloughlin]] 21:40, 22 February 2011 (UTC)  camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have praised the emergence of personalized media, so-called &amp;quot;The Daily Me,&amp;quot; as the contribution to efficiency in information gathering and classifying. Thus, it was an perplexing confrontation of reading Sustein&#039;s assertion on information cocoon dwellers. It is true that people like to hear and see what they want to hear and see and that principle applies to the online activities to some degree. While I was pondering on this notion, a certain idea came up to me: now there is this platform for diversity to spread its wings, but aren&#039;t people being more obstinate about their beliefs and tenets? It is just that I could hardly find the interchanges between liberals and conservatives in the Internet forums, except those with acrid animosity. --[[User:Yu Ri|Yu Ri]] 01:44, 22 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I understand the concern over collective action and whether it lowers the quality of the project. My paper has a lot to do with this and the term homophily. Homophilic groups are everywhere but are they beneficial? I&#039;m tackling this in my final paper. camcloughlin mentioned above how polarizing they are.How can we address this? Also, what about the decision making especially when the views are public? I know the old saying, &amp;quot;There is safety in numbers&amp;quot;, but we have to ask ourselves ask do we continue to crowd source? Websites such as urbandictionary and Wikipedia rely heavily on such action. But what happens then they are wrong? [[User:Elishasurillo|Elishasurillo]] 20:40, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think that the posted below concern about the purpose and structure is fair enough to draw our attention to the meaning of the curriculum; the meaning that makes a difference between well-informed person and well-educated person. No objections, of course, to the administrators of this course, they did marvelous research on relevant literature, but as some of us began noticing, the material does not follow logically to build up a skill. I know that in some countries people are spending many years to learn how to properly relate material to students, not simply make them memorize everything. In order to guess on our own what pedagogy might have been behind this giant sheer volume, we must align the material in order so that each concept will serve as a preamble for the next one, and all key terms then will be logically connected to the main scheme. It seems that after sorting out all major concepts from the minor key terms, we are aiming to arrive at the issue of ideological, society based, differences within one giant infrastructure called the internet. After examining most ideologically conflicting dimensions, we must derive a method that will keep catalytic reactions between those most extreme ideologies under control. This method, I assume, should include political, policy-based, and technological instruments. In order to build these instruments we must rely on our predecessors whose remarkable writings we have at our disposal. As some of you have already noticed that some of the writings are of a high caliber and some are of a low and average; nevertheless, they do contribute substance to the sphere of the course. It is therefore crucial to distinguish a high caliber conceptual pieces of writing from the low or mediocre type of writings. Then, we should align them in the right sequence so that we can apply our reasoning, not only memory. I guess this is as far as I should go because as we know, some of the writers are working at the Berkman Center - the host of the course. It will be unethical from my side to point out on the perplexity they may create. &lt;br /&gt;
&lt;br /&gt;
Perhaps for those who has enough imagination, imagine that after all readings that we read so far, we are exposed only to several stones on a giant planet in the giant universe with many other planets connected to it. There are terabytes of books on the net. There is so much to read about and discover. Take the DARPA Internet Program archive alone [http://www.darpa.mil/internetbibliography.html] or the internet society resources [http://www.isoc.org/internet/history/cerf.shtml] and they will extrapolate our horizons even farther. If we will search the archives of other countries, we would have not enough lifetime to read everything that is equally worth reading as our class material. It is important however, to have a wise conventional opinion not only about the modern concepts, but also about classic definitions, and Wisdom of Crowds by Surowiecki is an excellent emitter of the &amp;quot;old school&amp;quot; discoveries. His book &#039;&#039;Wisdom of Crowds&#039;&#039; so as &#039;&#039;Wealth of the Networks&#039;&#039; is built on the original concepts he interprets. In the book &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; the Scottish journalist Charles Mackay writes about the first conglomerates of people, not connected with internet, but infatuated by the same idea of rapid enrichment through the stock market. In the first hundred pages author describes the most devastating financial bubbles and schemes instigated by John Law, the son of the banker and a creative financier, who in his &#039;&#039;Proposals and Reasons for Constituting a Council of Trade&#039;&#039;, which he presented to the British Parliament, proposed to issue a loan-for-shares based instrument which has failed a number of times and at several countries due to the rapid and large demand for one type of shares issued for sale. If we think of a stock buyers as of the web sight users, we can understand better the concept of the collective action and decision making process. Surowiecki, of course, makes an excellent example of the bias in the herd instinct when he describes the authority bias in the decision by investigative group of the shuttle&#039;s catastrophe and in the coordination of other groups of people driven by the common goal. I am confident that the experts opinion and the seer-sucker theory is in value when the majority is trying to think. It is exactly what people are trying to do in this course: people are trying to find a cognizable way to comprehend the material by cooperating and coordinating within the group. Nevertheless, I personally believe that &#039;&#039;Extraordinary Popular Delusions and the Madness of Crowds&#039;&#039; is by default the strongest platform to base our understanding both of the concepts of the internet and of the digital economics of the society.  --[[User:VladimirK|VladimirK]] 01:30, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Link to article in today&#039;s NY Times regarding Egypt&#039;s shut down during the revolution of internet within its borders:&lt;br /&gt;
http://www.nytimes.com/2011/02/16/technology/16internet.html?pagewanted=1&amp;amp;_r=2&amp;amp;hp&lt;br /&gt;
&amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 15:53, 16 February 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In reading the Surowiecki excerpt and the summary on Zuckerman&#039;s Infotopia I think it is apparent that they are discussing apples and oranges.  Surowiecki is concentrating on the crowd&#039;s ability to accurately determine a correct answer to a specific question governed by a certain criteria (e.g. how many beans in this jar or which one of these four possible answers is correct).  Zuckerman, on the other hand, is looking at the human behavior and ideology aspect which has no defined criteria or &amp;quot;right&amp;quot; answer.  When asking the crowd what their opinion is regarding a particular issue the answers will undoubtedly depend on the individual&#039;s personal beliefs and past experiences which vary greatly from person to person.  If the ideological question is framed in such a way that there is a limited selection of answers, such as in polling, the individuals will gravitate towards the answer which most fits their personal belief.  While this will allow for an analysis of what the &amp;quot;majority&amp;quot; of the crowd prefers it does not necessarily mean that majority is correct.  Once the human condition is allowed to enter the equation the ability to determine what is correct vs. what is preferred is gone.&lt;br /&gt;
--[[User:Rakundig|Rakundig]] 10:37, 17 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Dear&#039;&#039;&#039; Fellow Internet and Society Classmates:&lt;br /&gt;
&lt;br /&gt;
I am writing with a proposal.  February 22 will be our forth meeting as a class which marks the milestone that  we are more than one quarter of the way through the material we will study during the semester. During the last several classes we have studied examples of commons based production including Wikipedia and we are using a wiki based tool for asynchronous class discussions. Not to take anything away from the quality of the content of those contributions, one thing that has been missing is a structure and purpose.&lt;br /&gt;
 &lt;br /&gt;
My proposal is that starting this week we begin to put into practice some of the things that we have learned to date. That is, below I have constructed a set of notes on what I have taken away from the class. I invite you in the spirit of Wikipedia to edit, comment upon, contribute to and in other ways improve what I have written in a collaborative search for a common understanding of the materials presented in this course. If you are so inclined, I ask you to follow a small set of basic tenets that are described on the [http://cyber.law.harvard.edu/is2011/edit/Talk:Collective_Action_and_Decision-making Discussion page].&lt;br /&gt;
  &lt;br /&gt;
I hope that you will join me in this project. I believe a commons based approach to summarize what we have learned so far will benefit us all in translating the great information Rob and David have introduced to us. No two of us have walked away from any class discussion nor reading, nor listening, nor viewing with the exact same perception of what has been discussed. Below presents a opportunity for us all, those who gather in Cambridge and those who participate at a distance, to come to a closer mutual understanding. &lt;br /&gt;
&lt;br /&gt;
Join me below to flesh out what I have begun. Add references that I have missed, correct statements that are in accurate, add your unique insight so that we can all come to a better common understanding. &lt;br /&gt;
Thank you in advance for your willingness to participate. &lt;br /&gt;
&lt;br /&gt;
Guy --[[User:Gclinch|Gclinch]] 04:06, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can certainly count on my support and participation! I think it&#039;s a great idea to summarize what we have learned &#039;in a mass collaboration approach&#039;; nonetheless, I consider that it would be much better if we can create another page to aggregate all the information from lectures apart from opinions or questions of the discussion section. I might have interpreted your purpose in an unexpected way, so please do not hesitate to share your brilliant ideas! Thank you. --[[User:Yu Ri|Yu Ri]] 08:04, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;If each of us have less than a 50% chance of being right about a decision, a group of us will be worse at making a correct decision, with our probability of accuracy increasing towards zero as the size of the group increases.&amp;quot; [http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/]&lt;br /&gt;
&lt;br /&gt;
I thought this quote highlighted what could be a hurdle for Wikipedia, insofar as the potential for an unlimited pool of contributors. While it does not appear to be a problem at present (if anything, they seem eager to include more individuals in the project), I&#039;d be curious if and when they will reach a tipping point. - [[User:Jsanfilippo|Jsanfilippo]] 18:19, 22 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Dear [http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri] ,  Thank you for your kind words. You have interpreted my purpose exactly. Are you suggesting that the topic of Internet and Society would make a good Wikipedia article? If so, I agree.  I checked and someone looks to have begun [http://en.wikipedia.org/wiki/Internet_and_Society one on this exact topic], but contributed only a small amount and has not been modified the informing since 2009. Would you suggest  we pick up where that author left off? --[[User:Gclinch|Gclinch]] 00:24, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Dear Guy,That sounds awesome! Probably we can reconstruct the contents of the article and start filling out relevant information in no time. I would be happy to contribute my effort in improving or re-editing this article on Wikipedia. Feel free to contact me with any suggestion regarding this project. --[[User:Yu Ri|Yu Ri]] 02:18, 22 February 2011 (UTC) &lt;br /&gt;
++++&lt;br /&gt;
&lt;br /&gt;
To use the term from economics, this course is built “on the shoulder of giants.” The three main giants are [http://en.wikipedia.org/wiki/Zittrain Jonathan Zittrain], [http://en.wikipedia.org/wiki/Lawrence_Lessig  Lawrence Lessig], and [http://en.wikipedia.org/wiki/Yochai_Benkler Yochai Benkler]. The course is also supplemented by a number of other influential thinkers who will be mentioned below.&lt;br /&gt;
&lt;br /&gt;
Each of these individuals has contributed a block in the foundation of a set of tools that we students can use to understand the effects that digital technologies are having on our society, culture, government and personal lives today and into the future. &lt;br /&gt;
&lt;br /&gt;
Rob told us that the best way to absorb this material is to begin with Zittrain, progress to Lessig and build to  Benkler.  Along the way we will interject relevant references to other influential thinkers.&lt;br /&gt;
&lt;br /&gt;
In his book, [http://yupnet.org/zittrain/archives/6 The Future of the Internet: and how to stop it] Jonathan Zittrain begins by describing how the Internet emerged at a time when inexpensive fully customizable multiuse computers became available to large numbers of technology tinkerers. The proliferation of these plastic (in the sense of the word that means malleable) platforms combined with unexpected success of the Internet Protocol for connecting these powerhouses of innovation together to link people across time and distance allowed the property of  Generativity to emerge. &lt;br /&gt;
&lt;br /&gt;
Defined as, “[http://en.wikipedia.org/wiki/Generativity an independent ability to create, generate, or produce new content unique to that system without additional help or input from the system&#039;s original creators]” the generative properties of the Internet allowed it to attain “[http://yupnet.org/zittrain/archives/8#2 mainstream dominance] over [http://yupnet.org/zittrain/archives/8#1 proprietary barons such as AOL, CompuServe, and Prodigy.]”&lt;br /&gt;
&lt;br /&gt;
Zittrain describe the following five properties of generativity as important to our discussion: Leverage, Adaptability,  Ease of mastery, Accessibility and Transferability. Important to beginning to build our model, Zittrain describes how the “[http://yupnet.org/zittrain/archives/13#1 hourglass architecture]” of the internet facilitated generativity through a layering property that broke the network into three logical layers. The hourglass is an intellectual concept and not a tangible thing. It helps people who wish to create innovations to focus on their specialty without needing to be concerned how other pieces of the puzzle that are necessary to make things happen work. Layers communicate with each other based on a set of properties that are native to each layer and understood by the others. In essence a digital [http://en.wikipedia.org/wiki/Esperanto Esperanto] or commonly understood language between layers.&lt;br /&gt;
&lt;br /&gt;
The model features “[http://yupnet.org/zittrain/archives/13#3 an ‘application layer,’ representing the tasks people might want to perform on the network].” The foundation of the hourglass is “[http://yupnet.org/zittrain/archives/13#3 the ‘physical layer,’ the actual wires or airwaves over which data will flow].” The middle layer is where the true ingenuity of the model lives. It is “[http://yupnet.org/zittrain/archives/13#3 the ‘protocol layer,’ which establishes consistent ways for data to flow so that the sender, the receiver, and anyone necessary in the middle can know the basics of who the data is from and where the data is going].”&lt;br /&gt;
&lt;br /&gt;
Combined the power of the plastic processing platforms on the edge and unrestrained flow of information across the digital network unleashed a wave of innovation and creativity never before seen in the history of humanity. There is more important information in Zittrain’s about how the combination of economic, cultural security concerns and other forces are today combining to extinguish the generative nature that the Internet created. I am sure we will return to these topics later in the course. &lt;br /&gt;
&lt;br /&gt;
The next element of our foundational model comes from Lawrence Lessig. In his book [http://codev2.cc/download+remix/Lessig-Codev2.pdf  Code: version 2.0] professor Lessig describes that the Internet is what it is because of decisions that have been made by the designers of the system about how the system will work.  This means that the Internet is not of some natural evolution or from some divine design, it is a creation of human invention. &lt;br /&gt;
&lt;br /&gt;
In the early days of the Internet there was an overriding ethos that the Internet was ungovernable and beyond regulation. Notable thinkers including [http://en.wikipedia.org/wiki/John_Perry_Barlow John Perry Barlow] spoke “behalf of the future” to say, “[http://ww2.cs.mu.oz.au/~zs/decl.html no moral right to rule us nor do you possess any methods of enforcement .]“&lt;br /&gt;
&lt;br /&gt;
Lessig defeats the claim of no methods of control by describing a combination of factors including commercial motivations, user acquiescence to improve convenience, security, regulatory and other concerns that have resulted in innovation in the application layer that in turn has resulted in the implementation of features that are creating the opportunity for significant control. &lt;br /&gt;
&lt;br /&gt;
We also discussed how [http://en.wikipedia.org/wiki/Jack_Goldsmith Harvard Law School professor Jack Goldsmith] and [http://en.wikipedia.org/wiki/Tim_Wu Columbia Law School Tim Wu] showed not only do laws of local jurisdictions impose regulation on the internet and its users  so do local geographical cultural and other factors [http://www.legalaffairs.org/printerfriendly.msp?id=961].&lt;br /&gt;
&lt;br /&gt;
Lessig describes how the cumulative effect of Markets, Laws, Social norms result in the equation that Code = law. In other words, the decisions made by those who create the underlying code that makes the Internet possible result in a cumulative effect of establishing governance. The format of that governance is a direct result of the conscious choices made by those who design and implement the system. The decisions on what goes into the code are a result of Markets, Laws and Social norms.&lt;br /&gt;
&lt;br /&gt;
The third element of the foundation of the way we are describing the effects of digital technologies on our society comes from the seminal work by Yochai Benkler, [http://yupnet.org/benkler/ The Wealth of Networks]. Benkler informs us that digital technologies are creating an environment in which a, &amp;quot;[http://mitworld.mit.edu/video/396 radical decentralization of capitalization and computing resources is allowing every connected person, some 600 million to a billion people, to have the means to engage in info knowledge and cultural production].” Benkler argues that the “industrial information economy” is giving way to a new model of human contribution based upon a “commons” approach to innovation.&lt;br /&gt;
 &lt;br /&gt;
He painstakingly documents how the system for protecting  what is commonly known as intellectual property  that was originally  meant to foster economic growth is actually considerable less efficient on a macroeconomic level  than a model in which innovation is freely contributed.  &lt;br /&gt;
&lt;br /&gt;
Benkler argues that the prevailing theory of protecting an individual and organization’s right to control how their innovations are used (and influence how they are compensated for such use) creates such considerable transaction costs for those who might otherwise build upon previous innovations to create new products, services, works of art and other contributions to the betterment of society as a whole that they choose not to do so because of the imposed cost burden.  &lt;br /&gt;
Benkler provides numerous examples that show how a commons based approach has resulted in significantly better, richer and more beneficial layers of innovation.&lt;br /&gt;
  &lt;br /&gt;
[http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php#  Kevin Kelly] demonstrates that in a “Benkleresque” world where information might be freer and ideas less subject to the artificial scarcity created by “Intellectual Property and Copyright” laws overall wealth in the economy would be greater due to the generative effects discussed by Zittrain. Kelly states that  producers would still be enriched because people are still be willing to pay monies associated to various factor involved in the conveyance of information.  In additional new forms of distribution would further increase overall good. &lt;br /&gt;
&lt;br /&gt;
Along the way we have also talked about several recurring themes. These include:&lt;br /&gt;
&lt;br /&gt;
- Internet infrastructure which is foundational, multipurpose; &lt;br /&gt;
- Innovation and public spaces&lt;br /&gt;
- Networks, openness, distributed, decentralized&lt;br /&gt;
- Digital disruption: challenges to existing institutions&lt;br /&gt;
&lt;br /&gt;
Under the topic of Digital disruption, we talked about how the &amp;quot;[http://en.wikipedia.org/wiki/Dot-com_bubble dot-com bubble]&amp;quot;  a surge in financial speculation in digital technologies from roughly 1995 to 2000 resulted in a financial market crash that disrupted economies across the globe.&lt;br /&gt;
&lt;br /&gt;
We discussed how Chris Anderson, author and editor-in-chief of Wired Magazine has shown how digital technologies have unleashed a “[http://www.wired.com/wired/archive/12.10/tail.html long tail of innovation]” that is resulting in fundamental shifts in markets. &lt;br /&gt;
&lt;br /&gt;
[http://forum-network.org/lecture/boston-ideas-2005-eric-von-hippel Eric von Hippel]  shows, in relative parallel to the Benkler proposition, that digital technologies are empowering society and increasing social welfare by shifting innovation up into the user layer. That is digital technologies are shifting the source of innovations from the traditional manufacturer to user generated creation.  He shows how end users, who know intimately more about the ways something is important and how it can be improved are becoming a dynamic source for new creation and improvement.&lt;br /&gt;
&lt;br /&gt;
(New post) Ethan Zuckerman&#039;s review of &#039;&#039;Infotopia&#039;&#039; made me want to read Sunstein&#039;s book. The breadth of topics that Sunstein explores is impressive. From my organizational behavior perch, I especially liked the coverage of group think and cocooning. As an added bonus, Zuckerman contributes another layer of insight in his treatment of Sunstein&#039;s themes.--[[User:SCL|SCL]] 03:29, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hey all!  I found this really interesting little study I found on a woman&#039;s personal blog, which she called &amp;quot;[http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!],&amp;quot; that I thought might be interesting to share.  Courtney Stanton wrote a post on her WordPress blog about women, haters, and rape culture in online gaming, and was so astounded by the responses to the post that she decided to do a wee study on the trolls of those comments.  I thought it was neat to see her methodology, how she broke things down and the conclusions she came to - basically, that trolls contribute nothing (which we all already knew, but now we know the characteristics of their nothingness), and that allowing thoughtful responses to a contentious topic, whether or not you agree with them, can actually foster respectful conversation and be good for you and your blog.  I thought this was particularly relevant giving the theme of &amp;quot;cocooning&amp;quot; in this week&#039;s readings.  Would it be appropriate for me to add this under the &amp;quot;Links&amp;quot; section of this page, with a little description and a disclaimer that it is student-submitted and not from the profs/TAs? --[[User:mcforelle|mcforelle]] 19:03, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In earlier discussions today, there was a mention of manufacturers such as Apple trying to ensure that customers do not modify/hack their products.  They faced the potential of having their phones (IPhone) shut off by their carrier.  This atmosphere of fear seems to be pervasive across manufacturers to keep their customer “in line” at times.  The “fear” of potential safety issues is one that has worked on me more than once.  Naturally if customers can modify existing products on their own,  they may not need to buy the next version of a manufacturer&#039;s product.  [[User:Earboleda|Earboleda]] 00:24, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai folx -----=:) In light of a seemingly negative perception of what hackers do, and also as a demonstration of positive collective action I thought that I would share a bit about a primarily European hacker group named Telecomix that recently rallied to provide low tech communications such as fax numbers, dial-up modems, and even HAM radio coms for the Egyptian people during the internet blackout days of the anti-Mubarak protests.  This was a video they made at the beginning of the uprising: &amp;quot;[http://www.youtube.com/watch?v=Tz4ECbj3dkY| Telecomix Message to North Africa and the Middle East]&amp;quot;.  Later they were mentioned by the Electronic Frontier Foundation along with the French Data Network as organizations that provided technical workarounds and support during the black out.  The EFF article can be found here: &amp;quot;[http://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak | Egypt&#039;s Internet Blackout Highlights Danger of Weak Links Usefulness of Quick Links&amp;quot;].  Telecomix is currently providing a variety of similar technologies for the people of Libya.  They are about the datalove and keeping it free and flowing. (:=----- kthxbai [[User: deinous|deinous]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hai again!  In class last night I had mentioned the two different approaches that Microsoft and Sony are taking toward hackers hacking their gaming consoles. In a recent Mashable article, &amp;quot;[http://mashable.com/2011/02/21/kinect-sdk/ |Xbox Kinect vs. Sony PS3: How 2 Companies Handle Hacking]&amp;quot;, they described these approaches.  Microsoft is encouraging hackers to innovate and push the limitations of their new motion sensoring peripheral, Kinect, by hosting hacking contests and the upcoming commercial release of a developing platform, SDK, for hacker to use. About a week after the public release of the Kinect last fall there was a huge buzz in the gaming community that the Kinect had been hacked to play World of Warcraft. Being an avid member of the WoW community I was very excited about this and searched to find out what the hack did.  As it turned out the Institute for Creative Technology of USC had created a customizable user interface and had applied it to the game controls for WoW.  The result and explanation of this inspiring hack can be seen in their YouTube video here: &amp;quot;[http://www.youtube.com/watch?v=62wj8eJ0FHw | World of Warcraft with Microsoft Kinect using FAAST and OpenNI&#039;]. There is also already a commercially release development platform for creating homebrewed Xbox360 games, and again, there are many hosted contests for talented hackers.  Conversely, companies like Sony do not encourage hacking their systems, and are currently suing George Holt for jailbreaking the PS3 for homebrew game design. This closed attitude raises the important question: if you purchased the product, why are you not allowed to do with it as you please? Recently, at least in the common practice of jailbreaking Apple&#039;s iPhones and iPads for open development, and unapproved software from Apple, it is not illegal to do so and will not result in lawsuits or terminations of your phone and data services.  It does however void Apple warranties.  I personally am in support of the &amp;quot;you buy it, you can do what you want with it&amp;quot; argument, and look forward to more companies adopting attitudes and policies much like Microsoft has with their releasing of commercial developing tools that promote the generative process of creating new hardware uses and homebrew game design.  If these consoles and gadgets remain so closed I agree with Zittrain that there will become a stagnation with in creative technology. ---=:) kthxbai [[User:Deinous|Deinous]] 20:43, 23 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*  [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html/ Clay Shirky TED Talk]&lt;br /&gt;
* [http://www.businessweek.com/innovate/content/feb2007/id20070201_774736.htm goldcorp story] (worth reading)&lt;br /&gt;
* [http://kirbybits.wordpress.com/2011/02/08/here-is-a-project-troll-data-analysis/ Troll! Data! Analysis!] - Courtney Stanton&#039;s study of responses to a blog post about women and rape culture in gaming, focusing on the content of the comments and comparing civil discussion to trolling.  A quick read, interesting analysis.  --[[User:mcforelle|mcforelle]] 22:01, 22 February 2011 (UTC)&lt;br /&gt;
* some links on Apple&#039;s new subscription model:&lt;br /&gt;
** [http://mashable.com/2011/02/15/apple-subscription-model/ Apple&#039;s New Subscription Model]: Christina Warren, Mashable&lt;br /&gt;
** [http://www.readwriteweb.com/archives/apple_subscription_model.php The New New Media: Apple&#039;s Subscription Model]: Richard MacManus, ReadWriteWeb&lt;br /&gt;
** [http://www.pcmag.com/article2/0,2817,2380742,00.asp Top 4 Publisher Objections to Apple Subscriptions]: Peter Pachal, PCMag&lt;br /&gt;
** [http://mediadecoder.blogs.nytimes.com/2011/02/15/apple-offers-subscriptions-for-all-ipad-publications/?partner=rss&amp;amp;emc=rss Apple Offers Subscriptions for Apps]: JEREMY W. PETERS and MIGUEL HELFT, NYTimes&lt;br /&gt;
* Ethan Zuckerman on [http://www.ethanzuckerman.com/blog/2008/04/25/homophily-serendipity-xenophilia/ Homophily, serendipity, and xenophilia] -- an interesting response to the &amp;quot;silo&amp;quot; theory (aka homophily) we discussed in class. --[[User:RebekahHeacock|RebekahHeacock]] 00:15, 23 February 2011 (UTC)&lt;br /&gt;
* Here is a link from yesterday&#039;s New York Times, http://nyti.ms/fBtKpz more wikileaks this time referring to the Qaddafi family’s exploits [[User:FMRR|FMRR]] 16:02, 24 February 2011 (UTC)&lt;br /&gt;
*  Interesting talk tonight (24 Feb), open to the public from what I can tell.  Video will be posted afterwards, if you can&#039;t make it:&lt;br /&gt;
**  [http://web.mit.edu/comm-forum/forums/online_news.html#abstract ONLINE NEWS: Public Sphere or Echo Chamber?] - 5-7pm, [http://whereis.mit.edu/?go=3 3-270]  ~~[[User:mcforelle|mcforelle]] 20:00, 24 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=6731</id>
		<title>Peer Production and Collaboration</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=6731"/>
		<updated>2011-05-06T17:14:06Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 15&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: To make up for the snow day on February 1, tonight&#039;s class will run an extra hour, until 8:30pm.&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
The free software movement is one example of a trend towards distributed volunteer networks of individuals collaborating on collective projects that were formerly the domain of the for-profit private sector.  In this session, we explore how far such peer production can go in redefining the economic and social structures of modern society. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
* Yochai Benkler, [http://mitworld.mit.edu/play/394/ News, Information and the Wealth of Networks] (watch from 8:32 to 26:07)&lt;br /&gt;
* Zittrain, [http://yupnet.org/zittrain/archives/13 Chapter 4: The Generative Pattern]&lt;br /&gt;
* Joseph Reagle, [http://reagle.org/joseph/2010/06/reagle-nrhm-special-collab-norms.html ”Be Nice”: Wikipedia Norms for Supportive Communication]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
Joseph Reagle&#039;s book: [http://reagle.org/joseph/2010/gfc/ Good Faith Collaboration: The Culture of Wikipedia]&lt;br /&gt;
&lt;br /&gt;
The following audio streams from NPR may be interesting:&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4986453 Wikipedia, Open Source and the Future of the Web]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=6051103 Wikipedia Wins Users and Critics by Jenny Lawton]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4506421 Wikipedia&#039;s Growth Comes with Concerns by Laura Sydell]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
Wikipedia’s norms were the most thought provoking and entertaining subjects of last weeks readings for me.  The emergence of the rules of behavior for Wikipedia, many of which seem to be just as valid and useful during the non-plugged in moments of our daily life, strikes me as being as unique and interesting as the overall notion of Wikipedia it self, if not more so.  Some of the basics like apology and civility are pretty standard and not overly surprising in their development.  Others however, like, “Drop the stick and back slowly away from the horse carcass” are excellent, and I would like to post on my companies intranet as a new code of conduct, (http://en.wikipedia.org/wiki/Wikipedia:Drop_the_stick_and_back_slowly_away_from_the_horse_carcass) .  Of equal importance is humor as a norm.  A norm which I believe if given more play in our daily (political) lives, might save lives around the globe.  Such as, the, “No one cares about your garage band norm,” (http://en.wikipedia.org/wiki/Wikipedia:No_one_cares_about_your_garage_band).  Read: &amp;quot;Keep yourself in perspective.&amp;quot;  Again, not to state the obvious, but I would imagine others who read this may have been struck by the attractiveness of applying these or very similar norms to our daily working environment outside of the Wikipedia world. [[User:Coreymacd|Coreymacd]] 21:27, 17 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The pattern of emerging of a Generative System was particularly interesting. The power of the five qualities (leverage, adaptability, ease of mastery, accessibility and transferability) and the reciprocity between them allowed a better understanding of the Generative pattern and how it can influence innovation both in positive and negative ways. &lt;br /&gt;
Already, the emergence of a collective, collaborative generative system is apparent in diverse forms in the cyberspace. However what I found most interesting (and enthusiastically agree with) is Zittrain’s mention of how this change in the cyberspace is making general societal, cultural and political changes in the real, non-cyberspace world.&lt;br /&gt;
[[User:Quill80|Quill80]] 20:04, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As per Zittrain&#039;s argument, I found that his reasoning about &amp;quot;affordance&amp;quot; and &amp;quot;adoptabilty&amp;quot;, although defined with great deal of common sense, has enough ambiguity to start questioning ourselves about that tipping point at which the environment&#039;s affardances take over the user&#039;s adoptability. The point is difficult to trace in the light of constantly changing user interfaces that in turn are sensitive to changes in hardware. It seems that Zittrain wants the reader to complete his thought. As in the bicycle example, the environment is meant to compete for more users by adding value in a form of a new hardware and then dressing it up with a new, often more complex user interface. This motion triggers the action on the user&#039;s side where after the initial opportunity cost, users attempt to improve the interface, often falling behind on the hardware due to its cost. This is where the peer-production and collaboration takes place that is defined by users&#039; &amp;quot;four-freedoms&amp;quot; and stimulated by systems&#039; &amp;quot;generativity&amp;quot;. Now everything seems reasonable in the market terms, but when the added-value concept is applied to Wikipedia, it just does not make sense because there is no classic law of supply and demand can be applicable to the intellectual property market, nor there is a right of ownership. There is a marginal social benefit however, but again, it is unmanaged and therefore no accuracy guaranteed and thus it cannot be a beneficial nomenclature as for instance a library is.  &lt;br /&gt;
&lt;br /&gt;
After yesterday&#039;s meeting with a guy who has a doctorate in the field of Wikipedia, it remains unclear, or perhaps completely unanswered, whether Wikipedia, as any other entity on the market of &amp;quot;intellectual goods and services&amp;quot;, should have its ultimate authority and who that authority might be. I often wonder how else I could have phrased the question on a person&#039;s native language to obtain a straightforward answer. I know one thing for sure based on years of seminar experience that if a scholar is not answering the question directly or asking for reinterpretation, he or she is probably a dilettante. Anyway, I am thankful for his marvelous answers and his efforts to take a trip to Cambridge, Massachusetts.  --[[User:VladimirK|VladimirK]] 20:55, 16 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A common but still under-developed theme throughout the readings is a comparative look at how traditional companies are adapting to the technological and social changes brought about by the internet.  As described by Zittrain and Benckler, incumbent firms are essentially undergoing a massive increase in competition from generative systems.  There look to be three sorts of reaction. Some firms are treating this as a traditional attack and their strategy is to undermine the competing product based on quality (i.e. Encyclopedia Britannica vs. Wikipedia.)  Others are co-opting newly-developed methods and changing or developing new products (Google’s embrace of Linux to create Android and drive search revenue.)  A third set is building whole new businesses on top of the generative processes (IBM’s extension of open-source software into services.) [[User:Smithbc|Smithbc]] 22:14, 15 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Listening to, and reading, various pieces on Wikipedia I am struck by the amount of effort that Jimmy Wales seems to put into promoting the idea of Wikipedia as, to paraphrase, &amp;quot;a close-knit community of dedicated users&amp;quot; with emphasis on user reputation and his role as &amp;quot;benevolent dictator&amp;quot;, and distancing himself from the more &amp;quot;democratic&amp;quot; (read: anonymous contributors) aspects of the site which (I assume) are generally the first things that come to most peoples&#039; minds when Wikipedia is mentioned. I wonder if this attitude was always a core part of the site&#039;s conception, or whether it was developed in response to outside criticism of the encyclopedia’s (lack of) credibility. Or if it is merely an accurate description of how the site has evolved... I would hazard to guess that Wikipedia, despite what Mr. Wales may say, is *both* a close-knit community *and* a conglomeration of faceless, unorganized (naturally organizing?) &amp;quot;ants&amp;quot;; I doubt the site could survive without both aspects. I am also struck by the parallel between this view and the criticism of Wikipedia skeptics: they see &amp;quot;peer review&amp;quot; being essential, where a &amp;quot;peer&amp;quot; is a responsible member of the academic community, while Mr. Wales sees &amp;quot;peer review&amp;quot; as equally essential, only with &amp;quot;peer&amp;quot; defined as a responsible member of the Wikipedia community. I wonder that seems to occur to no one that the &amp;quot;Wikipedia community&amp;quot; (let alone the &amp;quot;faceless ants&amp;quot;) might very well contain those self-same learned academics who compose and edit articles for Britanica. And if companies are hiring PR agents to &amp;quot;protect&amp;quot; their image on Wikipedia, then I wonder why University faculties have not taken it upon themselves to jointly, publicly venture into Wikipedia to improve the quality of the articles found there in. Surely, after 10 years we should have started to take this thing seriously.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:57, 15 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What has struck me most about the readings from this week has been the innate desire of most people to help and be helpful.  &amp;quot;Be Nice&amp;quot; was particularly interesting because of how thorough the author was in examining these behaviors; I&#039;ve never read social theory like that before and it&#039;s great to get a good foundation to start working from.  However, beyond the obvious example of the Wikipedia community, there are dozens of other communities and companies that I did not realize were taking advantage of people&#039;s urge to contribute constructively, including the importance of peer reviews for sites like Amazon and Yelp, and the adoption of consumer-generated innovations by companies like LEGO.  The article from Business Week, &amp;quot;The Power of Us,&amp;quot; contained one quote, from Yochai Benkler, natch, that really caught my attention: &amp;quot;The economic role of social behavior is increasing.&amp;quot;  Today, consumer input is not just useful, it&#039;s almost mandatory in order for a company to be successful.  This made me consider what Hollywood and the record and publishing industries are doing with themselves.  They have been referenced in nearly ever reading we&#039;ve had so far as the industry most affected by the easy sharing of information via the Internet, and yet not one article has discussed what that industry is doing to counter that damage.  Is this a simple omission by these authors, or has the industry not responded at all?  [[User:mcforelle|mcforelle]] 3:32, 15 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
McKensey has conducted annual surveys the past several years on companies&#039; use of web 2.0 in various ways.  This year&#039;s report is on its web page at http://www.mckinseyquarterly.com/The_rise_of_the_networked_enterprise_Web_20_finds_its_payday_2716.  Interesting to see the number of companies reporting increased number of successful innovations and decreased product development costs when fully utilizing the web.  After reading this week&#039;s assignments, I went back to re-read this article and wondered why it had not impressed me as much on my first read-through. [[[[User:Sjennings|sjennings]] 16:01, 15 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As for the books of this month, I am reading [http://en.wikipedia.org/wiki/Wikinomics Wikinomics] by [http://en.wikipedia.org/wiki/Don_Tapscott Don Tapscott] &amp;amp; [http://en.wikipedia.org/wiki/Anthony_D._Williams Anthony D. Williams] and [http://en.wikipedia.org/wiki/Here_Comes_Everybody Here Comes Everybody] by [http://en.wikipedia.org/wiki/Clay_Shirky Clay Shirky]. Coincidentally, these two books describe and reveal amazing aspects of peer collaboration and its consequences. Regarding the mass collaboration&#039;s economic effects, the Goldcorp Challenge can be deemed a symbolic case. To summarize a long story behind the success of [http://en.wikipedia.org/wiki/Goldcorp Goldcorp], sending an SOS to people outside of the company significantly contributed to discovery of new gold mines and boosted its financial growth. In a common sense, showing any sign of a company in a trouble is looked as a disaster in business management. Nonetheless, [http://en.wikipedia.org/wiki/Rob_McEwen Rob McEwen], at then the CEO of Goldcorp Inc., risked asking for a help and announced the Goldcorp Challenge to look for undeveloped mineral properties; and it worked out incredibly well. These books are absolutely recommended for someone who is looking for a detailed explanation on our class topic. --[[User:Yu Ri|Yu Ri]] 17:55, 15 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So much for Wikipedia and so little about Academia as we&#039;ve been hearing and reading so far. It could probably mean that there is a clash of ambitions between scholars and free lancers. Each of us has attempted to measure the intellectual climate, sort of speak, in the area of our interests and now we have formed our reports and opinions about which no body really cares. Our opinions are only for the purpose of this course, not for the purpose of creation of policy, so as opinions of millions of others who attempted to make changes to Wikipedia but lost their rights due to lack of authority. This is what ultimately matters the most as Chris Anderson is simply begging the question on [[NPR]] about the efficiency of the review process: a review by three fellows with a doctorate versus a review by the bunch of scholars with degrees from the university of life is the quantitative approach. The qualitative approach perhaps, not of the major concern but participation is. Ok, an average user might say, the participation will build a virtual community that could educate itself after time. Well, good luck with that virtual degree, virtual job, and virtual personal life, an average scholar might say. The reality just does not work that way and fiction should not be a part of it. The web governing organization, as Henry Jenkins describes in his article &amp;quot;Science Fiction and Smart Mobs&amp;quot; [http://www.technologyreview.com/web/13053/page1/], remains unofficial but its possible function is sketched out in the Ellis&#039;s book &amp;quot;Global Frequency&amp;quot;[http://en.wikipedia.org/wiki/Global_Frequency]. The real Wikipedia agents however, unlike agents of &amp;quot;Global Frequency&amp;quot;, are unable to enforce the policy and contribute their intelligence to the real society. Then, the question rises why we even considering Wikipedia as a model of a wider web space a proper control of which we are attempting to establish? --[[User:VladimirK|VladimirK]] 20:45, 15 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wikipedia is a is a fine model of our society. It shows how well the democratic process works, and how we can adapt it to any scale, large or small. Jimmy Wales realized that multiple heads are better than one, and has acted accordingly by creating an open base. He literally has a free staff of hundreds of millions. What is the end result? Vladimir alluded to to two important schools of thought that clash. Qualitative vs. quantative- which is superior? There is plenty of misinformation on Wikipedia. I attached a link of Wales talking about it- http://vimeo.com/23348756 While it still needs to be perfected, it is a fine model for other companies to follow. Ice cream chain Baskin-Robbins plans to open an online service where customers mix and match their own flavors and give input how to improve. Most companies will eventually go the route of having the masses play the role of the main contributers. [[User:Elishasurillo|Elishasurillo]] 17:14, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As I was searching for materials related to Prof. Zittrain&#039;s Generativity theory, I found quite interesting websites that might help other classmates who want to better understand this term. &lt;br /&gt;
*[http://ssrn.com/abstract=847124 Zittrain, Jonathan, The Generative Internet. Harvard Law Review, Vol. 119, p. 1974, May 2006; Oxford Legal Studies Research Paper No. 28/2006; Berkman Center Research Publication No. 2006/1]&lt;br /&gt;
*[http://www.concurringopinions.com/archives/2010/09/future-of-the-internet-symposium-generative-end-hosts-vs-generative-networks.html &#039;Future of the Internet Symposium: Generative End Hosts vs. Generative Networks?&#039; posted by Barbara van Schewick]&lt;br /&gt;
In particular, I was intrigued by the double natures of generativity of the Internet. According to Zittrain&#039;s explanation, generativity - the platform for creation and innovation - also possesses threats in itself (e.g. widespread of viruses and other badwares). Would it be possible to maintain generativity without compromising to reduce malicious codes floating around the digital world? --[[User:Yu Ri|Yu Ri]] 14:21, 20 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links  ==&lt;br /&gt;
Chris Anderson: [http://www.wired.com/wired/archive/14.07/people.html People Power]&lt;br /&gt;
&lt;br /&gt;
Business Week: [http://www.businessweek.com/magazine/content/05_25/b3938601.htm The Power of Us]&lt;br /&gt;
&lt;br /&gt;
Nasa: [http://clickworkers.arc.nasa.gov/top Clickworkers Study]&lt;br /&gt;
* the link to the NASA Clickworkers Study seems to be broken. Here is a link to the [http://www.nasa.gov/open/plan/peo.html program&#039;s home page] --[[User:Gclinch|Gclinch]] 13:14, 14 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Yochai Benkler&#039;s Seminal Work on Peer Production: [http://www.benkler.org/CoasesPenguin.html Coase&#039;s Penguin]&lt;br /&gt;
&lt;br /&gt;
Jimbo Wales: [http://webcast.oii.ox.ac.uk/?view=Webcast&amp;amp;ID=20050711_76 Talk on the Wikipedia Community]&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_Economic_Models&amp;diff=6730</id>
		<title>New Economic Models</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_Economic_Models&amp;diff=6730"/>
		<updated>2011-05-06T14:34:44Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 8&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: To make up for the snow day on February 1, tonight&#039;s class will run an extra hour, until 8:30pm.&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The rise of the networked economy is changing economic possibilities around the world.  From the call centers in India to eBay and the new Internet entrepreneurs, there are many signs that suggest a flatter world fueled by innovative production and marketing strategies.  In this session, we will explore the promise and reality of the changing economic tides associated with rising Internet use including those marketing to the long tail and the new oligopolists.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_1:_Wikipedia|Assignment 1]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Wikipedia, [http://en.wikipedia.org/wiki/Dot-com_bubble Dot-com Bubble]&lt;br /&gt;
* Chris Anderson, [http://www.wired.com/wired/archive/12.10/tail.html The Long Tail]&lt;br /&gt;
* Kevin Kelly, [http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php Better than Free]&lt;br /&gt;
* Eric von Hippel:&lt;br /&gt;
** The Economics of Open Content Symposium: New Models of Creative Production in the Digital Age Collaboration and the Marketplace - &#039;&#039;&#039;Video stream of the 30-minute presentation: [http://forum-network.org/lecture/boston-ideas-2005-eric-von-hippel new improved link!]&#039;&#039;&#039; (requires [http://real.com/ RealPlayer]). See below for alternate links to the presentation in video and audio format.&lt;br /&gt;
** [http://web.mit.edu/evhippel/www/books/DI/Chapter8.pdf Democratizing Innovation, Chapter 8: Adapting Policy to User Innovation]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/The_Long_Tail &amp;quot;Wikipedia Long Tail&amp;quot;]&lt;br /&gt;
* Free by Chris Anderson[http://www.audible.com/adbl/site/products/ProductDetail.jsp?]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
* Larry Lessig&#039;s [http://codev2.cc/ Code 2.0]&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
All three articles carry a common theme: there&#039;s a finite number of dollars in the consumer&#039;s pocket and old school marketing demographics are not sufficient.  Instead, the key differentiator for success is personalized marketing.  Rather than broadcasting advertisements to the general population, each Internet user can be presented with a personalized market basket tailored to his or her precise wants and needs.  On one hand, this individualized service can be quite useful and convenient -- like having your own digital gentlemen&#039;s gentlemen.  On the other hand, personalized service can only be delivered when they possess intimate knowledge of your behavior and desires.  It can become quite uncomfortable to consider how much personal information is available on the Internet, and how uncontrolled the sharing of that information has become. [[User:ChrisSura|-Chris Sura]] 02:56, 8 February 2011 (UTC)&lt;br /&gt;
I really like this TED video of Larry Lessig. Not only is the content applicable to the class, but the presentation is extraordinary.&lt;br /&gt;
[[http://www.ted.com/talks/lang/eng/larry_lessig_says_the_law_is_strangling_creativity.html Larry Lessig on the laws that choke creativity]]--[[User:SCL|SCL]] 02:29, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kevin Kelly&#039;s [http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php# Better Than Free] was particularly interesting to me. He said, &amp;quot;Nor are legal skills surrounding Intellectual Property and Copyright very useful anymore.&amp;quot; As a student who wishes to be an IP lawyer, I consider it quite important to examine his assertion and the future of IP Law field as well. In his writing, he insisted that super-distribution system of the Internet is leading to excessive abundance of information and thus creating limitless free copies floating around the digital world. I wonder whether he assumed that legal knowledge is also one of the things that can be easily duplicated, used, and applied without any academic devotion to the subject. Was he implying that the prevalence of wrongdoing - distributing creative works without due process or permission - can justify such act and nullifies existence of legal principles? Classmates, I would love to hear your opinions. Thanks! --[[User:Yu Ri|Yu Ri]] 12:49, 12 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the podcasts I listened to today was Chris Anderson&#039;s speech on &amp;quot;The Long Tail&amp;quot; for Center for Internet and Society at Stanford Law School. His presentation mainly talks about how our economy has changed from the &#039;blockbuster-hit culture&#039; to the diverse long tail model. While following his explanation, I realized that I also accepted the so-called bestsellers as the comprehensive reflection of society&#039;s demand - without any doubt. But looking back from now, I ask, was it the actual compendium of people&#039;s taste? According to the logic behind [http://en.wikipedia.org/wiki/Birthday_problem Brithday Problem], it is no exaggeration to say that reaching an agreement among millions of people is literally impossible. Considering such fact, the margin of error in a bestseller chart must be enormously large. Borrowing from Yonchai Benkler&#039;s terms, &amp;quot;Long Tail&amp;quot; can be defined as the phenomenon of what was &amp;quot;once on periphery of economy moving to the core of economic life.&amp;quot; Today is truly the era in which diversity is supported and even emphasized for economic profits, the circumstance quite different from Industrial Era when mass production was the sole God. --[[User:Yu Ri|Yu Ri]] 12:38, 21 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I enjoyed the Lessig video Chris posted above as well as the von Hippel video. Lessig labeling &amp;quot;amateur&amp;quot; (not amateurish) and &amp;quot;remix&amp;quot; as our modern-day culture is particularly interesting in that we have the opportunity to promote and innovate not only the &amp;quot;hits&amp;quot; but also the &amp;quot;misses&amp;quot;--as Anderson mentions in the &amp;quot;The Long Tail.&amp;quot; The remixing then seems limitless, and while this is a world of abundance in technology and communication, with that, there will always be the issue of prohibition and control. RE Von Hippel&#039;s video, when he first cautioned that we need to shift business to the user (as opposed to the manufacturer) layer, I thought he was going to delve into future business practices; but then he referred to past innovations that began with the users who developed their own products for their own funtionality. By the time those got to the manufacturer and had been tweaked, the innovative products were presentable and tailored to groups (the masses)--then branded and sold. It is interesting how the initial innovator (the user) seems to lose out on the credit in the end, even though synergy can be possible for both the company and their consumers. [[User:Myra|Myra]] 17:43, 26 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I was interested by the video by von Hippel and am surprised by the theory of the Long Tail. The Long Tail is clarly evident in online shopping everyehere. When I first bought a replacement power cord for my computer 3 years ago, I went to a local Apple store and bought what was in stock at a high price. Last week I bought another cord from a third party online from another state. The price was much lower and better quailty but I doubt they get as much traffic as the Apple store.  This low price enabled me to go purchase a nice case I wouldn&#039;t have bought before. The article detailed how the Long Tail applies to music and books, and it won&#039;t be long before it happens to the entire marketplace as weel. Look at the cinema market. Netflix enables you to watch movies anywhere at antime, opening markets for movies forgotten. The tail reaches very far. But is it benificial? I&#039;m sure Mom and Pop stores would like to keep some of there markets for sure. [[User:Elishasurillo|Elishasurillo]] 14:34, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* Center for Internet and Society Podcast By Stanford Law School Center for Internet and Society&lt;br /&gt;
[http://itunes.apple.com/us/podcast/center-for-internet-society/id131237275]&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Paradigms_for_Studying_the_Internet&amp;diff=6729</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Paradigms_for_Studying_the_Internet&amp;diff=6729"/>
		<updated>2011-05-06T14:21:39Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 1&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: Due to snow in Cambridge, class is canceled today.  To make up for the cancellation, we&#039;ll be adding an hour to each of the next two class sessions (February 8 and 15).&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s -- we need to answer the critical question of &#039;&#039;&#039;how.&#039;&#039;&#039; Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to &#039;&#039;understand&#039;&#039; what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought.&lt;br /&gt;
&lt;br /&gt;
This class will propose and develop one framework for the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (Read pages 379-396. The rest of this chapter expands the discussions of each layer in more detail, if you want to read more about them)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.mu.oz.au/~zs/decl.html John Perry Barlow, A Declaration of Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/printerfriendly.msp?id=961 Jack Goldsmith &amp;amp; Tim Wu, Digital Borders]&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/ Jonathan Zittrain, The Future of the Internet - Chapters 1 &amp;amp; 2]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
For people interested in a more technical primer on the architecture of the web, how email works, etc. check out ethan zuckerman and andrew mclaughlin&#039;s [http://cyber.law.harvard.edu/digitaldemocracy/internetarchitecture.html Introduction to Internet Architecture and Institutions]&lt;br /&gt;
&lt;br /&gt;
Some fred turner resources: [http://blip.tv/file/125930 video presentation], [http://blogs.law.harvard.edu/mediaberkman/2006/12/01/from-counterculture-to-cyberculture-the-rise-of-digital-utopianism/ audio presentation], and [http://www.stanford.edu/group/fredturner/cgi-bin/drupal/ homepage]&lt;br /&gt;
&lt;br /&gt;
[http://en.citizendium.org/wiki/Welcome_to_Citizendium Citizendium]&lt;br /&gt;
&lt;br /&gt;
Jason Scott on [http://ascii.textfiles.com/archives/808 The Great Failure of Wikipedia] (2004)&lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/news/2011/012611-internet-providers-are-the-new.html Internet providers are the new secret police, says report]&lt;br /&gt;
 &lt;br /&gt;
[http://www.nytimes.com/2011/01/31/business/media/31link.html Define Gender Gap? Look Up Wikipedia&#039;s Contributor List] &lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/community/blog/open-source-fail Open Source #FAIL]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For all its allure, the Internet can be a dangerous place with electronic pipelines that run directly into everything from our personal bank accounts to key infrastructure to government and industrial secrets.&amp;quot; - US Senator Joe Lieberman, chairman of the U.S. Homeland Security Committee [http://www.dailymail.co.uk/news/article-1352375/Plan-Obama-kill-switch-powers-cut-internet-access-event-national-cyber-crisis.html Call to give Obama &#039;kill switch&#039; powers to cut internet access in the event of national cyber crisis] 1 Feb 2011&lt;br /&gt;
&lt;br /&gt;
[http://www.nytimes.com/2011/01/30/weekinreview/30shane.html  Spotlight Again Falls on Web Tools and Change - article on how repressive regimes can use the internet and new media to their advantage]&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:RebekahHeacock|RebekahHeacock]] 14:15, 27 January 2011 (UTC)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I agree that the Cluetrain manifesto did predicate the shift in new media communication models from a ‘one to many’ model (where an organisation communicates a standard message to a large non-responsive audience) to a ‘one on one’ mode of communication (where companies aim to have a conversation with individuals). I would argue, however that the early developments in the adoption of social media adoption relied on self-empowered individuals who were communicating their views as most employees are not motivated to communicate in the way that the manifesto suggests. [[User:Ltconnell|Ltconnell]] 21:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Quill80 rasies a great point for the internet to truly be equalizer we need to provide access to the most marginalize. One great recent example has been Egypt. Turning off the voice of the people by eliminating their ability to express them selves via the web. In my mind it would have been so much more productive if they would have engaged in dialogue. [[User:Buie|Buie]] 22:35, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Reading the Cluetrain Manifesto, I could not help but to remember what Henry Ford said, “Any customer can have a car painted any colour that he wants so long as it is black.” Clearly, this kind of top-down approach no longer has its place in the modern world. The fact that the Internet has changed the way companies interact with their customers is as widespread as undeniable. However, I want to remark that the lack of universal access to technology has actually marginalized those consumers without the means or skills of getting themselves heard through the cyberspace more ever than before. Businesses are adapting quickly to the new changes in the market. However, I want to question, how well are we, as a society, sharing the benefits of technology to those who do not have access? [[User:Quill80|Quill80]] 19:12, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The Cluetrain Manifesto blurs the lines between who is considered the market, employee, corporation and the communication between the three.  A key point in my mind is that each one has a human voice despite it&#039;s position, so many theses are fundamentally flawed. Trust builds loyalty in markets, online markets are not immune to advertisements.  Online advertising is changing in dramatic, more personal ways as uses of the Internet evolve.--[[User:Dreed07|-dreed07]] 20:04, 8 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
While reading this Declaration of Independence of Cyberspace i can not shake a thought of Technological Singularity which is supposed to come by the earliest estimates around the year 2020... Science fiction or a true possibility? --[[User:Jastify|Jastify]] 22:28, 29 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Although Wikipedia offers knowledge on extensive topics, holding the better model, is there not a huge concern that there is no longer postings of validated facts versus mere opinion?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a link to the BBC World Service documentary Wikipedia at 10 - a 22.5 minute retrospective on the occasion of Wikipedia’s 10th anniversary. It covers a number of topics, some of which may be relevant to the upcoming Wikipedia editing assignment. &#039;&#039;(Reposted from the January 25th discussion page, as it seems more appropriate here. - BrandonAndrzej)&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://www.bbc.co.uk/worldservice/documentaries/2011/01/110111_wikipedia_at_10.shtml&lt;br /&gt;
&lt;br /&gt;
The rhetorical use of the euphemism of the monolithic corporation in the [http://www.cluetrain.com/ Cluetrain Manifesto] undermines the effectiveness its message. Thesis number two states, “Markets consist of human beings...” Last time I looked, so do corporations. &lt;br /&gt;
&lt;br /&gt;
In fact corporations are highly organized social creatures with diverse internal cultures, rules, mores and recognized standards of behavior. They respond to a broad spectrum of internal and external influence. If only solving today’s problems were so easy as to point our finger and say “off with their heads.” The real challenge, however, is much more complicated and a matter of personal responsibility. &lt;br /&gt;
&lt;br /&gt;
Corporations come in all flavors. Some are highly democratic. As requirements of participating in the public capital markets all have democratic institutions: a constitution (articles of incorporation), boards of directors, shareholders, external advocates and most importantly customers. The Manifesto takes the all too easy out of blaming the generic “them.” The truth is that the reason corporations are as they are today is because the majority of corporate stakeholders abdicate their responsibility to guide the direction of the organization through exercise of their enfranchisement as shareholders and customers. &lt;br /&gt;
&lt;br /&gt;
The behavior of corporations is a function of &#039;&#039;our&#039;&#039; collective actions and inactions.  We have cheap goods made by slave labor because in the exercise of our conspicuous consumption we don’t want to - or without sacrificing our consumption volume can’t afford to - pay the price of having the same goods manufactured by the un-oppressed. The result is that we send our dollars to evil places rather than fund the social infrastructure that improves the standard of living of more humane societies. &lt;br /&gt;
&lt;br /&gt;
Further we have out-of-control executive salaries, unrestrained executive actions, boards of directors driven by motivations other than the interests of the shareholders and other unsavory corporate behaviors because we fail to fulfill our responsibilities. Too few read the prospectus, attend shareholder meetings, or even vote shares beyond granting proxy to the someone else. I am guilty as charged when like so many, I seek to maximize my ability to profit by pooling my finances in investment cartels while leaving decision making to fund managers, investment advisors and other members of the vested interest.  &lt;br /&gt;
&lt;br /&gt;
Many say we need more regulations. I say we have the regulations that we desire. This is true because through our collective actions we drive corporate investment decisions. If we did not want corporations to spend scarce investment dollars to employ the more than 45,000 lobbyists in Washington who water down and fight against regulation, the corporations would find other places to invest. If instead we used our purchasing power and shareholder votes to direct investment elsewhere, there it would flow. &lt;br /&gt;
&lt;br /&gt;
The Icelandic version of Microsoft Windows mentioned in [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] proves the point. On the other hand our abdication of this power as Digital Borders expresses results in the fact that the, “[http://www.legalaffairs.org/printerfriendly.msp?id=961 technologies of control in China are essentially the same technologies designed to satisfy consumer demand for geographically tailored Internet products.]” Due in part to our marketplace behaviors, oppressors are given the tools they so effectively use as an unintended consequence of our desire for applications to tell us how many of our friends are in close proximity who might be interested in a game of beer pong. &lt;br /&gt;
&lt;br /&gt;
Chasing our dollars and with our benign assent, corporations have followed the instruction we have given them. Let’s stop blaming “them;” for we are them and start taking responsibility for the results of our actions.  --[[User:Gclinch|Gclinch]] 00:06, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Enjoyed watching the BBC anniversay documentary on Wikipedia. As businesses start to utilize this media, I wonder how the controls put in place by Wikipedia for neutral content can possibly be effective. I compared an entry for the holding company for which the company where I am employed is a subsidiary and compared it to one of our competitors. The difference was substantial. The competitor&#039;s had a distinct advertising (promotion) flavor along with company&#039;s graphics on the right hand border of the page. My company&#039;s was a four sentence historical overview providing little relevant information to any potential customer or employee. After checking with our PR Department, I was told no one in the company had written the posting. They assume it was done by a third party contributor. Just by comparing these two companies, the lack of uniformity is readily apparent.--[[User:Sjennings|sjennings]] 20:59, 31 January 2011 (UTC) sjennings&lt;br /&gt;
&lt;br /&gt;
Hello. First remark is concerning [http://www.cluetrain.com/ Cluetrain Manifesto]. These 3 &#039;Conversations among human beings sound human. They are conducted in a human voice.&#039; I think that big part of our current comminucation has a sound of &#039;message&#039; or &#039;MS Outlook Email Sound&#039; if you know what I mean. Sad, but true.&lt;br /&gt;
&lt;br /&gt;
Another remark is about [http://ww2.cs.mu.oz.au/~zs/decl.html A Declaration of the Independence of Cyberspace].&#039;You claim there are problems among us that you need to solve.[...]...governance will arise according to the conditions of our world, not yours. Our world is different.&#039; I think this is very good statement for discussion. I am not sure to what extend Internet shoudl be independent from real world. Should not be there governing rules? Should it be for intance ISP who decides what they do with my personal data, or information about what kind of webpages I visit, or even where am I located?We do not need any law for that?&lt;br /&gt;
We do not need Ecommerce directive or DMCA in US? I am not sure whether I get it right but to me it looks like declaration wanted to say somethink like we do not need them (nbot particular those ones but in general). Any suggestions?&lt;br /&gt;
--[[User:VladimirTrojak|VladimirTrojak]] 15:46, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I think reading Yu Ri&#039;s posted articles at the bottom of the page--particularly, &amp;quot;The Internet&#039;s new borders&amp;quot;--will help answer your questions. This article says that while the internet is a &amp;quot;...placeless datasphere, [it&#039;s] part of our real world. Like all frontiers, it was wild for a while, but policemen always show up eventually.&amp;quot; Hence, the &amp;quot;Declaration&amp;quot; was written as a good-humored stunt, trying to capture the excitement about this new frontier. Inevitably, frontiers are conquered and governed by local and national filtering--and even if frontiers are not fully conquered, like actual outer space, nations try to one up each other to stake their claim of territories at least.[[User:Myra|Myra]] 13:58, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I also inferred the lack of need for DMCA, copyright and general intellectual property regulation.  I think we still have a lot of work to do in how the laws are applied, increased improvements in open source and open standards to help users. A system where the creative work itself is protected more so than the medium in which it is used.--[[User:Dreed07|-dreed07]] 20:11, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Principal ideas expressed “The Cluetrain Manifesto“ and „The Great Failure of Wikipedia” I have found in sharp contradiction. The “Cluetrainers” consider the conversation and trading of information and traverse of ideas over the Internet as the essence for present corporations, markets and cultures. On the other hand the author of “Great Failure of Wikipedia” considers gathering and structuring information through communication of masses over the Internet as a work of “wonks”, “twiddlers”, which amount to “ procedural whackjobs”.  &lt;br /&gt;
The clash between these two ideological approaches to the essence of the Internet remind me challenges between the governance of majority expressed in democracy and democratic system and governance of elite represented by oligarchic system. These two philosophical, sociological and political approaches are well reasoned and analyzed in the work of Jose Ortega y Gasset “ The Revolt of the Masses” (http://en.wikipedia.org/wiki/José_Ortega_y_Gasset).  &lt;br /&gt;
To make a short summary of this scholar ś ideas, only elite “content generators” formed by some “barriers of entry” could produces welfare “content” in all aspects of human society “the Internet”. I believe that this struggle would never have the winner. [[User:Zholakova|Zholakova]] 21:02, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Regarding the concept of a “borderless Internet,” the article [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] claims it is reflective of both government and consumer pressure for an Internet that conforms to their individual preferences and laws. I would also argue that such filtered content delivery also arose out of huge corporate demand. Yahoo! has a wealth of user data (geographic, demographic, behavioral, etc) at its disposal, and advertisers are willing to pay a premium to be able to leverage that. So, while a formidable blow to Internet freedom, Mr. Yang and his company have ultimately benefited greatly from the byproduct of their legal defeat, which is a highly profitable business in localized content delivery.&lt;br /&gt;
&lt;br /&gt;
This also raises the controversial topic of how relevant is &#039;&#039;too&#039;&#039; relevant. Internet consumers are keenly aware that their personal information is being collected and repurposed, but it does not seem the boundaries are permanently drawn yet. [[User:Jsanfilippo|Jsanfilippo]] 19:50, 2 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I just had some initial comments before we discuss further in class.  Digital technology and the Internet have revolutionized the cross-border communication and information sharing, and this has benefited everyone unimaginably.  However, the Internet also has created many great issues and problems that are very serious and threatening (i.e.  privacy issues, cyber-terrorism, support for terrorism and other criminal activities, etc.).  In order to maximize/protect the benefits and minimize/eliminate damages caused by the Internet, I feel that law, regulation and censorship sometimes are necessary.  Anarchy eventually leads to destruction, and I do not think the cyberspace is an exception. Thus, I was a bit uncomfortable with the ideas portrayed in either the [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] or the [http://www.cluetrain.com Cluetrain Manifesto].  Moreover, as discussed in the [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders], there are vast differences in laws, regulations, cultures and traditions among countries around the world, and they must be respected in the cyberspace as they are aimed to be as such in the “real world.”  Through this course, I hope I can gain more ideas about the extent to which the Internet should be regulated and controlled by governments.[[User:Edwardshinp|Edwardshinp]] 17:39, 4 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The idea of a free, humanistic and borderless Internet expressed in the Declaration of Independence of Cyberspace and Cluetrain Manifesto is simply romantic but naïve idealism.   Certainly the Internet is a wonderfully powerful communication medium, but we must recognize that it stands upon the shoulders of television, radio and the various printed media.  Egyptians are using twitter to challenge Hosni Mubarak’s authority in the same way Thomas Paine printed Common Sense to challenge the authority of King George III.  But the Internet can just as easily be used as a tool of government to monitor and control its people.  Benkler (The Wealth of Networks), Goldsmith and Wu (Digital Borders) understand the reality that government regulation of the Internet is a natural and inevitable process, and that it’s a messy business.  The ubiquitous nature of the Internet means that it will be subject to both international and every sovereign state’s laws simultaneously.  Of this there can be no doubt, as we have already seen Egypt’s “kill switch” in action. [[User:ChrisSura|-Chris Sura]] 20:30, 5 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/edit/User:ChrisSura?redlink=1 Chris], You are right that there is a lot of “romantic but naïve idealism” expressed in many of the proclamations about what digital technologies mean to the world.  Is it not true that most great movements have often had anthems with flowery rhetoric aimed at inspiring some who may not have acted to action? “[http://www.ushistory.org/Declaration/document/ We hold these truths to be self evident …,&amp;quot;] “[http://www.history.org/almanack/people/bios/biohen.cfm I know not what course others may take, but as for me, give me liberty, or give me death …,&amp;quot;] and “[http://www.youtube.com/watch?v=VB6hLg3PRbY Ask not …&amp;quot;]? &lt;br /&gt;
&lt;br /&gt;
Shouldn&#039;t we ask how we may learn from the evolution of “television, radio and the various printed media” and apply the lessons of those experiences in shaping the future? [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Benkler] pointed out how the early perception of, use and regulation of communications media still shape the way those technologies apply to the world today.  In our discussions I hope we will leave ourselves open to the possibilities that the nature of digital technologies may make a difference. I hope we can free our thinking from preconceptions we may unknowingly hold as we ponder these questions and contribute to the frameworks for the future. &lt;br /&gt;
&lt;br /&gt;
Take for example the idea of an Internet kill switch. Aside from arguing the merits of such an idea the question is: is it even a technical possibility? Paul Ford points out that, “[http://www.popsci.com/science/article/2011-01/what-could-possibly-go-wrong-internet-switch The last time someone could shut down the Internet was probably in 1969, when it consisted of two computers.&amp;quot;] In fact within hours of the Egyptian government throwing the “kill switch,” in Cairo’s Tahir Square “[http://antonyloewenstein.com/2011/01/29/what-egyptian-uprising-says-about-the-desperate-desire-for-freedom/ nearby residents reportedly opened their home Wi-Fi networks to allow protesters to get online”.] As well, “[http://news.cnet.com/8301-27080_3-20029927-245.html activists were faxing WikiLeaks cables into Egypt to bypass the Internet blockade,”] external players [http://www.deathandtaxesmag.com/49101/google-and-twitter-tag-team-for-egypt/ Twitter and Google] were teaming up to provide an alternative and many other factors were at play to provide a workaround for the people of Egypt. Is it not possible that the nature of digital technologies may be a force to push the needle that gauges where we stand at any moment on the spectrum between liberty and oppression more toward liberty thus justifying optimisim? --[[User:Gclinch|Gclinch]] 18:15, 6 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I also agree with Chris that there exists a lot of idealism in the Declaration of the Independence of Cyberspace.  Can a civilization exist without laws? There would be an absence of civility itself.  We can&#039;t lose sight of the fact that there are humans that make up and are the driving force behind Cyberspace.  The social human condition would not allow for a world that lacks intellectual property rights in any form.  I still believe we have a lot of work to do in regards to intellectual property laws and creating platforms that not only protect the rights of the creator, but respect the digital evolution.  --[[User:Dreed07|-dreed07]] 19:56, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Some thoughts regarding Wikipedia: Wikipedia presents itself as a &amp;quot;democratic entity” - one which gathers its content from users around the globe and allows everyone to freely participate. However, many observers (such as in the BBC Worldservice documentary) have noted that the majority Wikipedia&#039;s content is derived from a relatively small number of regular users. The picture painted is one of an oligarchy where a limited number of &amp;quot;elite&amp;quot; users control the content of the encyclopedia via enforcement strict of policy rules, essentially erecting barriers to casual users. I am trying to reconcile this picture with that painted by Jason&#039;s Scott&#039;s &amp;quot;Great Failure of Wikipedia&amp;quot;, in he describes a small number of &amp;quot;content generators&amp;quot; under siege from a great mass of &amp;quot;wonks, twiddlers, and procedural whackjobs&amp;quot; who are essentially negative contributors to the site. &amp;quot;Content generators&amp;quot; become &amp;quot;content defenders&amp;quot;, with only those few contributors willing to put extensive effort into protecting their content actually seeing that content become (more or less) permanent additions to the encyclopedia. I am unsure of how accurate this depiction (or either depiction, for that matter) is... The central question here is whether the &amp;quot;elite&amp;quot; users generating the majority of the content are also the users most active in enforcing policy/policing entry barriers, or whether these roles are largely divided between separate user populations. [[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 6 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I understand the want for freedom. Whenever people get together they desire to be free and express themselves. This simple foundation is the reasoning behind the Declaration of the Independence of Cyberspace. I do agree with Chris and dreed. The Declaration and Manifesto are both very idealistic. But is it realistic? I&#039;m not so convinced. The Internet can be used as a virtual world, but to use it to its maximum potential, you still have to connect to people in the real world. That world has shown time and time again to be dominated by laws and regulations. Granted, we are moving into uncharted territory and it is quite possible that online communities can defend and create there own governing institutions. This all remains to be seen. Juristiction is the huge question. If someone hacks a server from Great Britain&#039;s High Court, and the hacker is in Japan, can Britain charge that hacker for the crime? [[User:Elishasurillo|Elishasurillo]] 14:21, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some (pessimistic) links regarding social networking technologies and political change:&lt;br /&gt;
First, a blog post dismissive of the impact of the internet and social networks in the current crisis in Egypt:&lt;br /&gt;
&amp;quot;Tell Mubarak we don&#039;t need his damn internet&amp;quot; http://www.al-bab.com/blog/2011/blog1102c.htm&lt;br /&gt;
Second, a Slate Magazine book review looking at the way politically repressive regimes are using the internet and social networks to their advantage:&lt;br /&gt;
Evgeny Morozov&#039;s The Net Delusion http://www.slate.com/id/2281743/&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:13, 6 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Without hesitation, I also strongly agree that [http://en.wikipedia.org/wiki/A_Declaration_of_the_Independence_of_Cyberspace A Declaration of the Independence of Cyberspace]is a naive idealism of the cyber-Utopians including John Perry Barlow. As we can see from numerous recent incidents such as the ongoing revolution in Egypt and North Korea artillery attack to South Korea, the online society is, indeed, under the influence of national governments and their regulations. It is quite sad and disappointing to realize how the Internet can be so vulnerable to central regulations. Even apart from the these cases,[[A Declaration of the Independence of Cyberspace]] still lacks the practicality and is a mirage: to me, this document sounds like an attempt to define one&#039;s idea separated from one&#039;s physical body. Is that really possible? The Declaration says, &amp;quot;We must declare our virtual selves immune to your sovereignty, even as we continue to consent to your rule over our bodies. We will spread ourselves across the Planet so that no one can arrest our thoughts.&amp;quot; There is a famous quote of John F. Kennedy - &#039;A man may die, nations may rise and fall, but an idea lives on.&#039; It seems that the Declaration made an exaggeration on the thrid part of the quote. However, what cyber-Uptopians remember is that Kennedy never regard thoughts as the active subjects of a society. &lt;br /&gt;
*Here are some articles that I would love to share with you!&lt;br /&gt;
1)[&amp;quot;http://www.economist.com/node/16941635&amp;quot;]&lt;br /&gt;
2)[&amp;quot;http://www.economist.com/node/730089?story_id=730089&amp;quot;]&lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 22:42, 8 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=6728</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=6728"/>
		<updated>2011-05-06T13:54:48Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below or be prepared to offer them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* [http://articles.cnn.com/2010-12-02/opinion/mackinnon.wikileaks.amazon_1_wikileaks-founder-julian-assange-lieberman-youtube?_s=PM:OPINION Rebecca MacKinnon: WikiLeaks, Amazon and the new threat to internet speech]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
The ways in which these mediums have changed how we relate to each other can certainly be seen to have both positive and negative connotations.  In the age of &#039;instant information&amp;quot; we should question how much is worthy of our attention on first blush, and what is really noise and a waste of time.  Those that manage the digital medium as opposed to it managing them are the real winners in the availability of opportunities. &lt;br /&gt;
&lt;br /&gt;
However some of the most positive aspects can be seen in our new ability to see other countries through the lens of information from citizens themselves and this has inspired a higher spirit of collaboration the world over. &lt;br /&gt;
&lt;br /&gt;
The uprising in Iran a couple of years ago, would never have gotten the world attention that it did before the advent of the social mediums that allowed the demonstrations to be viewed by millions.  The Haiti earthquake (and many other disasters) and the quickness of the response was helped by the instant donation portals that were set up to facilitate monies where they were most required.  Doctors collaborating around the world on cases and learning from those experiences is another example of how we grow our cultures for the good.   &lt;br /&gt;
&lt;br /&gt;
A &amp;quot;virtual choir&amp;quot; of 12 different countries bringing singers together showed a true spirit of co-operation among peoples.&lt;br /&gt;
http://www.youtube.com/watch?v=D7o7BrlbaDs&lt;br /&gt;
&lt;br /&gt;
We have choices in how we use all these mediums and yes there will always be an disturbing and dark aspects to it but looking at all the possibilities we have a world of substantive opportunities.  --camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The most significant change associated with digital technologies is precisely how pervasive the changes are.  These technologies affect the manner and effect of how we conduct ourselves in society: the way we read and learn, are entertained, communicate, interact professionally and personally, and express ourselves.  As such much of our existing laws and norms need to be rethought, reinterpreted, and rewritten.  This sort of technological change has happened before (i.e. printing press or radio) but never at such a scale and speed.&lt;br /&gt;
&lt;br /&gt;
To focus on these digital technologies specifically, the biggest impacts come from their reach, social nature, and longevity.  First, due to being replicable and instantaneous, a person or group using digital technologies can reach a massive audience with their message, around the world, through many channels.  Second, given the ability to continuously publish and others to respond, over time a single message can grow into a dialogue which can grow into a living social conversation, and ultimately coordinated action.  Third, the ability now exists to have a permanent, discoverable, and recorded conversation.  These are all tremendous changes to the way societies function. --[[User:Smithbc|Smithbc]] 13:08, 25 January 2011 (PST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of digital technology is much like a hot war. As the Developer or Engineer creates, the digital Guerrilla works to free the technology. The greater the advance of the tools made available to the masses it becomes more and more difficult to protect an idea. One could say that ultimately the ideas are improved by the unconstrained &amp;quot;testing&amp;quot; digital liberator/Hackers subject digital creations to. --[[User:Buie|Buie]] 20:34, 25 January 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Improvements in digital technologies and the pace at which they are happening are making it increasingly more difficult for companies to innovate and compete.  Investing in research initiatives are at the forefront while still trying to devote resources to building that next biggest thing that will reach the largest number of users.--[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I agree with Edwardshinp regarding security.  It&#039;s not just an issue of security of financial data for transactions, but we are looking at national security, corporate espionage, etc.  Anything where we&#039;re engaging in the sharing of information. --[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. ([[User:VladimirTrojak|VladimirTrojak]] 08:29, 1 February 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We&#039;ve talked about how an organization such as Wikileaks scores points for transparency by throwing [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/ &amp;quot;grit&amp;quot;] in the government machine, but I&#039;m also impressed by what &#039;&#039;is&#039;&#039; officially available online. Old classmates and I fondly recall hours spent on state-wide judiciary searches that revealed uppity prep school teachers as felons, perverts and drunks--and sometimes explained mysterious classroom absences. Clickable property records: liens, takings and all, immortalize for peekers embarrassing proof of habitual poor decisions, or just a temporary rough patch. And lest anyone forget that accountability means everybody, constituents can roam the virtual &amp;quot;halls of shame&amp;quot; of de-certified police officers.&lt;br /&gt;
&lt;br /&gt;
As for a challenge presented by digital media, it seems very easy to become absorbed by myriad micro-tasks (i.e. micro-blogging) of dubious value that sap time and productivity.  About a year ago, I sat in on a conference at Yale Law. Up in the nosebleed section, I had a decent view of the panelists onstage, as well as about 70 hunched, frenetic Tweeters in between. Having myself never Tweeted nor been Tweeted at, I was puzzled as to what they were so furiously punching into their laptops, pausing only when a pod of genial-looking sperm whales appeared and temporarily halted operations. Months later, I happened upon a slew of the Tweeters&#039; work and was disappointed. Each was responsible for hours and hundreds of blurbs that amounted to little more than scores of parallel transcriptions of the entire day&#039;s worth of speakers. Never mind that the conference was streamed live online, archived and outlined in bullet points, nor the fact that many of the Twits were Tweeting at one another. At best, it was an exercise in the sillies; at worst, a mass lapse in auditorium etiquette. --[[User:KimberlyNevas|KimberlyNevas]] 15:55, 29 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Social networking has opened a new level of communications that no one would have ever dreamed of. I believe it is a tremendous blessing that has and will continue to change our world. It has opened up nations that otherwise would have been totally secluded and shut-in. But this is a new era. An era where nations can now protest and receive support and empathy from other nations. Right now, as we speak we are witnessing history in the making. We are part of a revolution that we have only read about in history textbooks. &lt;br /&gt;
&lt;br /&gt;
Egypt is a prime example that happens to be in the forefront of our minds. We are seeing a nation change and evolve. Whether for good or for worse, we are all witnesses. We are watching a government crumble right before our eyes; and the Internet is playing a monumental role in this!  &lt;br /&gt;
&lt;br /&gt;
It is our responsibility to nurture and protect this instrument of progress and change.  We have a mechanism that has the ability to shrink the world. We now can convey messages that once were deemed unfathomable and impossible to distribute. Of course, governments want a position of control over such a tool; but like our forefathers we cannot allow that. Just like they defended their freedom of speech, we must defend ours too. It is the same principle with a modern twist. Instead of the printing press, it is now blogs. Instead of town hall meetings, it is now twitter. Like everything thing else in our ever evolving world the press has become faster and more efficient. The media has now modernized and caught up with the times.&lt;br /&gt;
--[[User:Joshuasurillo|Joshuasurillo]] 04:38, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The economic impact of the Internet and digital technologies can be significant.  Outsourcing job functions to countries outside the United States for instance, was facilitated in part by the ability of the Internet to deliver real time data across the globe.  IP telephony, high speed video and data transmitted on the Internet allowed for workers to be “virtual”, anywhere in the world.  This created cost savings and efficiencies for corporations while fueling growth in emerging countries.  Domestically, this has lead to displaced workers and job losses across many fields.  --Earboleda&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. ([[User:VladimirTrojak|VladimirTrojak]] 08:29, 1 February 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
A couple of months post-Wikileaks, and we&#039;re already seeing various similar organizations and entities (and even instances of leaking) crop up; while I don&#039;t support all of WikiLeaks&#039; leaks necessarily, I do support the overall idea of information leaking; and in the case of, for example, the Palestine Papers (recently leaked to Al Jazeera), think that it can be very effective in demonstrating hypocrisy in governments.&lt;br /&gt;
&lt;br /&gt;
I also take serious issue with the handling of WikiLeaks by American companies Amazon, Mastercard, PayPal, EasyDNS, and Tableau.  All acted under potential pressure from Sen. Joe Lieberman, and the vast majority gave &amp;quot;copyright infringement&amp;quot; as their excuse, more or less.  If we excuse this behavior in the instance of WikiLeaks, then we&#039;re headed down a slippery slope: Do we then excuse similar intermediary censorship when levied against a human rights organization? [[User:Jyork|Jyork]] 22:23, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;br /&gt;
&lt;br /&gt;
In my opinion, if we use the standard definition of what constitutes a &amp;quot;media organization&amp;quot; based on U.S. Code Title 2, Section 1602, a person or entity engaged in disseminating information to the general public through a newspaper, magazine, other publication, radio, television, cable television, or other medium of mass communication; then Wikileaks is just that and would be entitled to protections as such.  I don&#039;t agree with the way Wikileaks is carrying out it&#039;s mission on a philosophical level. There are other means that could be used to promote and encourage transparency in government without endangering people&#039;s lives. --[[User:Dreed07|-dreed07]] 20:13, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WikiLeaks is a content provider.  They are not terrorists because they do not attempt to destroy or disrupt the Internet.  They are simply providing content which some people find objectionable.  If we set aside the question of how they obtained the information then the remaining question is whether they have a legal or moral right to disseminate it.  WikiLeaks is not based in the U.S. so it is not subject to U.S. laws.  They are not publishing credit card or social security numbers.  They are not publishing copyrighted or proprietary material.  They are editorializing, but that is still the prerogative of a free press.  They at least showed some self-restraint by selectively publishing what they felt to be newsworthy and redacted sensitive information that could bring harm to others.  They are not in the same league as the New York Times.  They are not even writing their own stories.  But they are taking an editorial position by selecting which content to provide, which gives them some claim to being a journalism organization.&lt;br /&gt;
-Chris Sura&lt;br /&gt;
&lt;br /&gt;
Wikileaks is such a complex topic. We all know the need for the media; it functions as a watchdog to keep our government and institutions in line. But how far is too far? Wikileaks goes out of its way to publish documents that were previously classified. The documents sometimes share intimate details on policies, troop movements and other sensitive material. Is this helpful? Yes, to an extent. We have the right to know if corruption is rampant, and if we are being led in the right direction. However, the release of documents that could cause a security breach and put our troops in danger is not good at all. America must be protected at all times and ought to be held in great regard. We need freedom, but not at the expense of others.&lt;br /&gt;
&lt;br /&gt;
As for ways we have changed, no doubt the first way is by the overwhelming amount of information available. We can learn about any topic, anywhere at anytime. This mass of knowlage is one of the many wonders of the Internet. Second, we have been changed by social interaction. Before, communication was slow and limitred to the local area. Now, you can Facebook and Skype people all over. People date people they meet over the Internet. I can attend my class from anther state via the web. Ever since the birth of the web, the world has gotten smaller. The third way is the marketplace. Finacial transactions take place online and are sent round the world. You can wire money across the world and expand your marketplace to levels previous generations couldn&#039;t have dreamed of. Its exciting to see where it takes us! [[User:Elishasurillo|Elishasurillo]] 13:54, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just wanted to add a comment to today’s in-class discussion which did not make it in due to time constraints. The seminar ended on the question of what measures the US government could or should (from a legal and ethical perspective) take in dealing with the leak of classified diplomatic data via Wikileaks. The question was predicated on the (generous) assumption that the leaked material had little to no serious material impact on US security or diplomatic interests. An obvious caveat to that assumption is the fact that only a small number of the diplomatic cables in question have be released thus far, preventing us from knowing the full impact the leaks may have in the future. Perhaps a less obvious caveat is that it is extremely difficult for those of us without diplomatic credentials to tell what sort of damage has been done in terms of the US’s international diplomatic relations, where the effects may be more subtle and less obvious to the public; certainly, there seems to be little evidence of direct damage to the US itself… however, that does not necessarily mean the released materials are without serious impact. A number of pundits, Andrew Sullivan for one example, have ascribed to Wikileaks cables a prominent (though perhaps not a driving) role in the so-called “Jasmine Revolution” in Tunisia which ousted president Ben Ali and toppled his government this January. Obviously these events are of enormous import to Tunisians around the globe, and may have a significant effect on Africa and the Arab world, and thus geo-politics as a whole. While the potential future ramifications for US foreign policy are difficult to calculate, in terms of immediate impact it should be noted the president Ben Ali was considered to be an important US ally in North Africa, and his ousting may have consequences for the US government’s anti-terrorism efforts in that region. (That is not to say that the overall impact will be negative; one hopes that the Jasmine Revolution will work out for the best for both the US government and, perhaps more importantly, the people of Tunisia. The effects, however, remain to be seen.) -BrandonAndrzej&lt;br /&gt;
&lt;br /&gt;
Here are links to the topic being discussed on Andrew Sullivan’s Atlantic blog:&lt;br /&gt;
&lt;br /&gt;
http://andrewsullivan.theatlantic.com/the_daily_dish/2011/01/tunisias-wikileaks-revolution.html&lt;br /&gt;
&lt;br /&gt;
http://andrewsullivan.theatlantic.com/the_daily_dish/2011/01/a-wikileaks-revolution.html&lt;br /&gt;
&lt;br /&gt;
During the discussion that ended the class (26-Jan-11) several argued that officials of the US Government were justified in taking actions against private citizens and organizations in response to Wikileaks.  This bothers me to the point of losing sleep. It is outrageous that officials of the US government felt it within their power, without any legal due process, to use the power invested in them by the people to intimidate private organizations into taking steps to deny access to information once it had become readily available.  Far beyond “a terminal case of hubris” as described by John Naughton in his article in the Guardian, [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks], US senator Joseph Lieberman’s actions to intimidate private organizations including Amazon and Paypal into removing Wikileaks content is an outrageous and possibly illegal abuse of the power given to him when he was elected to represent a small segment of the US population in the national congress.&lt;br /&gt;
 &lt;br /&gt;
Regardless of whether his intentions could be viewed by some a noble, we live in a society that is ruled by law. There are processes to be followed. Senator Lieberman availed himself of some of those processes when he filed Securing Human Intelligence and Enforcing Lawful Dissemination (SHIELD Act) [http://www.wired.com/threatlevel/2010/12/shield/#].We should all be incredulous that beyond this Senator Lieberman used his positions in congress to directly contact commercial organizations intimidating them with veiled threats that the US government would use its power against them should they not comply to his personal vision of how they should conduct their private business. There are numerous judicial and administrative options available through legal due process of US Law that Senator Lieberman could have used. The fact that he did not is an outrageous abuse of power.  &lt;br /&gt;
&lt;br /&gt;
Senator Lieberman’s actions are just the tip of the iceberg of official reaction that was untoward and possible illegal. The actions of agencies such as the State Department - who are invested by the citizenry with even less official power than a US Senator - in contacting private individuals and intimidating them to not exercise their freedom of expression are even more outrageous.  The gentleman in class who said that even his company was contacted and threatened should shout to all of us how far we have traveled down a slippery slope with regards to the fundamental rights upon which US society is based.  The fact that there seemed to be acquiescence to these concepts during the class discussion, especially taking place in a building that is just steps away from the Harvard Law School, is of great concern to me.  &lt;br /&gt;
&lt;br /&gt;
What is your opinion? --[[User:Gclinch|Gclinch]] 12:53, 26 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would like to contribute to the discussion of: Do we need an organisation like Wikileaks?&lt;br /&gt;
&lt;br /&gt;
I agree that the ethos behind Wikileaks of exposing unethical government behaviour is a necessary component in establishing accountability; however, the longer-term implications of Wikileaks are (potentially) opposed to the initial aim. If governments go to extreme lengths to protect information from whistleblowers then this will lead to compartmentalisation of information and a decline in cooperation between agencies. Wikileaks may catalyse the creation of a political culture that is suspicious of information sharing where diplomacy cannot operate effectively. &lt;br /&gt;
&lt;br /&gt;
A question posed on the Guardian’s &#039;Live Q&amp;amp;A with Julian Assange&#039; by JAnthony aimed to ask Julian Assange whether Wikileaks should be held accountable for hampering diplomatic efforts – went unanswered. &lt;br /&gt;
&lt;br /&gt;
“I am a former British diplomat. In the course of my former duties I helped to coordinate multilateral action against a brutal regime in the Balkans, impose sanctions on a renegade state threatening ethnic cleansing, and negotiate a debt relief programme for an impoverished nation. None of this would have been possible without the security and secrecy of diplomatic correspondence, and the protection of that correspondence from publication under the laws of the UK and many other liberal and democratic states. An embassy which cannot securely offer advice or pass messages back to London is an embassy which cannot operate. Diplomacy cannot operate without discretion and the protection of sources. This applies to the UK and the UN as much as the US. In publishing this massive volume of correspondence, Wikileaks is not highlighting specific cases of wrongdoing but undermining the entire process of diplomacy. If you can publish US cables then you can publish UK telegrams and UN emails. &lt;br /&gt;
&lt;br /&gt;
My question to you is: why should we not hold you personally responsible when next an international crisis goes unresolved because diplomats cannot function. ”    http://www.guardian.co.uk/world/blog/2010/dec/03/julian-assange-wikileaks      [[User:Ltconnell|Ltconnell]] 22:19, 26 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Hi you all. Just saw that on the NYT, it might interest you: &lt;br /&gt;
The New York Times on dealing with Assange and the secrets -- http://www.nytimes.com/2011/01/30/magazine/30Wikileaks-t.html?pagewanted=1&amp;amp;_r=1 [[User:Coelhol|lu coelho]]&lt;br /&gt;
&lt;br /&gt;
In my opinion one of the most significant changes associated with the Internet and digital technologies is the huge content availability and the low cost to get information. This “revolution“ is also redefining: monetary transaction (as we can see through the massive growth of  e-commerce websites due to low cost of transaction and low cost of distribution), social relationship (how users are sticky to facebook, twitter, blogs, etc…), communication (high level of interaction through “new”channels such as email, voice over Internet protocol, instant messages, etc…), entertainment (access to a huge library content = long tail. E.g. Netflix, Hulu, Youtube), etc…We are definitely in the beginning of this revolution since the value proposition the internet can add has still much room to grow.  [[User:DriFaria|Adriana Torii]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
My feeling is that Wikileaks is an unstable medium for providing an essential watchdog function overseeing government activity. There is a need for some kind of independant body that checks the scope of the governments autonomy, but conceding this responsibility to a rogue, pirate entity does seem to legitimize some of the governments concern over jeopardizing the safety of individuals who should not be sacrificed for the errors of those higher ranking officials overstepping the intended restrictions on their authority and influence. Unfortunately I cannot offer much in the way of a practical solution for balancing off the dangers on either end of the spectrum in the Wikileaks situation. The slope seems to slip down in both directions. Smudge24&lt;br /&gt;
&lt;br /&gt;
Thinking about how the internet has changed our society two things immediately come to mind. First, from the perspective of an average US consumer, I feel that there is undeniable evidence that suggests that the internet has flattened the global marketplace. Goods from all areas of the world are now just an effortless click away. Even our methods of shopping have drastically changed from typical in-store shopping and mail-order catalogs, to instant online price comparisons of the same good between hundreds of online retailers. This continual instant access to nearly any good has shifted our societies towards more hasty and instant desires - in a way, I argue, we have all become more impatient. Things that at one point could have been considered expendable extras are now at the center of entire business models. Second, I have given some thought to the way in which the medical community has been changed with the advent of the internet. Specifically, I find it revolutionary how access to medical information has been simplified to be understood by nearly anyone with a mouse and a keyboard. The ability to pre-diagnose oneself and have instantaneous access to potential medical solutions is something that could prove revolutionary in countries that are in early development stages. Furthermore, learning medical terminology and processes (i.e. similar to med school) is simplified and made much less expensive - allowing a lower boundary to entry into the field. [[User:Lewtak|Lewtak]] 02:11, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe our government has gone after the wrong target. They should be after the source of the leaks. Wikileaks is just an emissary and a conduit of information. The government wants to shoot the messenger while they should be instead hunting for the origin of the message. If they have such a gripe on people exchanging information, they should attempt to find the actually leak and plug it. If the government is successful in stopping Wikileaks, there will be another messenger in its wake eagerly conveying information from a leak. Until the original leak has been extinguished, the government will continue to have it&#039;s information published and made public.--[[User:Joshuasurillo|Joshuasurillo]] 04:44, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•	The internet has created a virtual world for people, a global village, as coined by Marshall McLuhan. Where sharing of thoughts and ideas take place at a completely new level. Where your audience is not specified or fixed. Freedom to put your ideas out there and the freedom to express your opinion or give your take on the thoughts put down by others, without having to disclose your identity, is something only the internet gives you. The internet allows the ideas and thoughts put forward by people to be judged not by their physical appearance or their accomplishments but in a much unbiased, to-the-point way. It is also one of the fastest, cheapest and most widespread means of communication. This is the age of freedom of communication, everyone is entitled to their individual thoughts and opinions, and the internet is their diary, although not that personal.&lt;br /&gt;
•	Businesses are run using technologies such as electronic mails and video-conferencing, which are continuously outdoing themselves and introducing better features. It is a platform for people to express themselves freely and that freedom will be curbed once the government decides to get involved. Just like every school, home or playground has a big bully, the government is a big bully in a country. Everyone thinks not just twice but a million times before taking up an issue against the government. In my opinion, wiki leaks has endeavored to take up something that no other form of media would have the guts to publish, and not just put the information out there but also follow through with it. If the American government has nothing to hide then why react defensively. If they had not made a big issue out of these releases people would have most probably forgotten about it in time. Their reaction itself has generated interest in the public. [[User:Karishma goenka|Karishma goenka]] 11:18, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In my opinion the most significant changes brought on by digital technologies are:&lt;br /&gt;
- The possibility of transferring data through different medias.&lt;br /&gt;
- These technologies allow people to communicate at low cost (Skype, for example).&lt;br /&gt;
- The streaming video, which is changing the way people watch TV and movies.&lt;br /&gt;
- The videoconference, which has also been used within the Court System.&lt;br /&gt;
- The possibility of buying online 24 hours a day.&lt;br /&gt;
- Product customization (as an example, Dell allows that the client choose on line its own computer configuration).&lt;br /&gt;
- Immediate download of books, articles, music and films.&lt;br /&gt;
Regarding the challenges, I would say that piracy and unauthorized copies of ideas are problems caused by the information dissemination in the internet. Another challenge would be the fact that the digitalization of content brought a radical change in the business model. See the discussion about Apple enforcing rules on e-book publishers and also the changing occurring in the cable TV segment, due to the streaming video. ([[User:Anna|Anna]] 21:24, 6 February 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As many people pointed out above, the appearance &amp;amp; spread of digital technologies has affected our society in unexpected yet profound ways - from science itself to business to everyone&#039;s daily life. The trend of changes can be generally illustrated as &amp;quot;being closer, easier, and faster.&amp;quot; In terms of challenges posed by these whizzy technologies, I would like to, specifically, talk about infringement of intellectual property rights. Not only is an individual&#039;s personal information stolen by a third party and misused - mostly for financial frauds, but also an inherent right to one&#039;s idea is in a great danger of being attacked and looted away. In short, what represents ourselves (our birthdates, addresses, and social security numbers) and what we give birth in this world (our thoughts, ideas, and very creation) can be and are lost in amidst of the Internet society. In this situation, I doubt whether there would be any point of insisting freedom of expression, when the expression itself is suffering from casual invasion and robbery.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;Articles&amp;gt;&lt;br /&gt;
* Identity Theft: [http://www.nytimes.com/2002/05/29/nyregion/identity-theft-and-these-were-big-identities.html?src=pm]&lt;br /&gt;
* Copyright Issue: [http://pogue.blogs.nytimes.com/2010/07/08/no-easy-answers-in-the-copyright-debate/?scp=5&amp;amp;sq=copyright&amp;amp;st=Search]&lt;br /&gt;
&lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 14:58, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Some people mentioned organizations and the workplace and the security concerns that follow with the increase of digital technologies. I think about the actual change in culture as well, between what&#039;s &amp;quot;acceptable&amp;quot; and &amp;quot;unacceptable.&amp;quot; Most people have worked and will work at some point,  and now there are avenues that are more accommodating, e.g. conference calling, telecommuting, VPN accounts, to those not physically present in the office. Even if workers have all the avenues in the world to &amp;quot;work&amp;quot; regardless of where they physically are, can it be considered &amp;quot;work,&amp;quot; particularly if one&#039;s action while working away from the office creates distrust and paranoia ? In organizations where something such as telecommuting is not the norm, managers are faced with justifying to their employees why it is acceptable for some and not others to have this option. On a related note, as organizations engage in social media activity to promote their brand and organization, they are also promoting the social media brand and, perhaps inadvertently, that this is an acceptable vehicle for workplace communication.[[User:Myra|Myra]] 19:21, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the BBC World Service documentary &#039;&#039;Wikipedia at 10&#039;&#039; - a 22.5 minute retrospective on the occasion of Wikipedia’s 10th anniversary. It covers a number of topics, some of which may be relevant to the upcoming Wikipedia editing assignment.&lt;br /&gt;
&lt;br /&gt;
http://www.bbc.co.uk/worldservice/documentaries/2011/01/110111_wikipedia_at_10.shtml&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=6725</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=6725"/>
		<updated>2011-05-05T20:49:31Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;January 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal.  Is this platform about fundamental social, political and economic change, or about easier access to pornography, cheap pharmaceuticals, free music and poker at home?  This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Part I&lt;br /&gt;
&lt;br /&gt;
To frame the issues we will be talking about in this class and to get the discussion going, we&#039;ll start with the recent controversy involving [http://wikileaks.ch Wikileaks].  Take some time to read through the articles below.  Come to class prepared to answer the following questions and to pose some questions of your own.&lt;br /&gt;
&lt;br /&gt;
* What is Wikileaks?  Is it a journalism organization?  A terrorist organization?  A criminal syndicate? &lt;br /&gt;
* Do we need an organization like Wikileaks?&lt;br /&gt;
* What kind of arguments would you make to support your position one way or the other?&lt;br /&gt;
* What was the U.S.&#039;s (and the world&#039;s) response to Wikileaks&#039; disclosure of diplomatic cables?  &lt;br /&gt;
* What are the legal and/or free speech implications involved in the decision by Amazon to stop hosting the Wikileaks site?&lt;br /&gt;
* What do you think the debate concerning Wikileaks shows about the nature of the Internet?&lt;br /&gt;
&lt;br /&gt;
Part II&lt;br /&gt;
&lt;br /&gt;
* What are the most significant changes associated with the spread of digital technologies?  &lt;br /&gt;
In a few sentences, please offer 2-3 examples in the Class Discussion section below or be prepared to offer them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.technologyreview.com/computing/26875/ MIT Technology Review: Everything You Need to Know About Wikileaks]&lt;br /&gt;
* [http://online.wsj.com/article/SB10001424052748703785704575643431883607708.html# Wall Street Journal: To Publish Leaks Or Not to Publish?]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [http://gigaom.com/2010/12/04/like-it-or-not-wikileaks-is-a-media-entity/ GigaOm: Like It or Not, WikiLeaks is a Media Entity]&lt;br /&gt;
* [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks Guardian: Live with the WikiLeakable world or shut down the net. It&#039;s your choice]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://www.wired.com/threatlevel/2010/12/shield/ Wired: Lieberman Introduces Anti-WikiLeaks Legislation]&lt;br /&gt;
* [http://www.salon.com/news/opinion/glenn_greenwald/2010/11/30/wikileaks Salon: WikiLeaks reveals more than just government secrets]&lt;br /&gt;
* [http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/ Clay Shirky: Wikileaks and the Long Haul]&lt;br /&gt;
* [http://www.citmedialaw.org/threats/julius-baer-bank-and-trust-v-wikileaks Citizen Media Law Project: Julius Baer Bank and Trust v. Wikileaks]&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/ MediaBerkman: Wikileaks and the Information Wars]&lt;br /&gt;
* [http://articles.cnn.com/2010-12-02/opinion/mackinnon.wikileaks.amazon_1_wikileaks-founder-julian-assange-lieberman-youtube?_s=PM:OPINION Rebecca MacKinnon: WikiLeaks, Amazon and the new threat to internet speech]&lt;br /&gt;
* Coverage of the cables themselves by the NYT [http://www.nytimes.com/interactive/world/statessecrets.html/], Guardian [http://www.guardian.co.uk/world/the-us-embassy-cables], Der Spiegel [http://www.guardian.co.uk/world/the-us-embassy-cables]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&#039;&#039;The most significant changes and challenges brought on by digital technologies.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Your ideas here...&lt;br /&gt;
&lt;br /&gt;
The ways in which these mediums have changed how we relate to each other can certainly be seen to have both positive and negative connotations.  In the age of &#039;instant information&amp;quot; we should question how much is worthy of our attention on first blush, and what is really noise and a waste of time.  Those that manage the digital medium as opposed to it managing them are the real winners in the availability of opportunities. &lt;br /&gt;
&lt;br /&gt;
However some of the most positive aspects can be seen in our new ability to see other countries through the lens of information from citizens themselves and this has inspired a higher spirit of collaboration the world over. &lt;br /&gt;
&lt;br /&gt;
The uprising in Iran a couple of years ago, would never have gotten the world attention that it did before the advent of the social mediums that allowed the demonstrations to be viewed by millions.  The Haiti earthquake (and many other disasters) and the quickness of the response was helped by the instant donation portals that were set up to facilitate monies where they were most required.  Doctors collaborating around the world on cases and learning from those experiences is another example of how we grow our cultures for the good.   &lt;br /&gt;
&lt;br /&gt;
A &amp;quot;virtual choir&amp;quot; of 12 different countries bringing singers together showed a true spirit of co-operation among peoples.&lt;br /&gt;
http://www.youtube.com/watch?v=D7o7BrlbaDs&lt;br /&gt;
&lt;br /&gt;
We have choices in how we use all these mediums and yes there will always be an disturbing and dark aspects to it but looking at all the possibilities we have a world of substantive opportunities.  --camcloughlin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The most significant change associated with digital technologies is precisely how pervasive the changes are.  These technologies affect the manner and effect of how we conduct ourselves in society: the way we read and learn, are entertained, communicate, interact professionally and personally, and express ourselves.  As such much of our existing laws and norms need to be rethought, reinterpreted, and rewritten.  This sort of technological change has happened before (i.e. printing press or radio) but never at such a scale and speed.&lt;br /&gt;
&lt;br /&gt;
To focus on these digital technologies specifically, the biggest impacts come from their reach, social nature, and longevity.  First, due to being replicable and instantaneous, a person or group using digital technologies can reach a massive audience with their message, around the world, through many channels.  Second, given the ability to continuously publish and others to respond, over time a single message can grow into a dialogue which can grow into a living social conversation, and ultimately coordinated action.  Third, the ability now exists to have a permanent, discoverable, and recorded conversation.  These are all tremendous changes to the way societies function. --[[User:Smithbc|Smithbc]] 13:08, 25 January 2011 (PST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of digital technology is much like a hot war. As the Developer or Engineer creates, the digital Guerrilla works to free the technology. The greater the advance of the tools made available to the masses it becomes more and more difficult to protect an idea. One could say that ultimately the ideas are improved by the unconstrained &amp;quot;testing&amp;quot; digital liberator/Hackers subject digital creations to. --[[User:Buie|Buie]] 20:34, 25 January 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Improvements in digital technologies and the pace at which they are happening are making it increasingly more difficult for companies to innovate and compete.  Investing in research initiatives are at the forefront while still trying to devote resources to building that next biggest thing that will reach the largest number of users.--[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe the biggest changes associated with digital technologies have to do with communication. Everything from the way we interact with each other on a social level to the way that businesses and governments are conducted has been changed with the advancements of digital technology. More time is spent communicating digitally than in person; people are spending more time in online communities than their physical communities. The world is rapidly becoming a smaller place; it’s easier, cheaper, and faster to communicate with people around the world by email, texting, Skype, Facebook, Twitter, ect. You can instantly exchange ideas/knowledge with people and broadcast your opinions. Furthermore, there is more pressure to keep up with the rapidly changing communication technologies (for social or business purposes) for fear of being left behind.  [[User:FMRR|FMRR]] 19:23, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Digital technology not only changes how we get information, but how we relate as individuals, how companies do business and communicate with customers, employees, and investors, and how citizens relate and interact with their governments.  Other have commented on privacy and censorship concerns, but the effect on business and the challenges a business faces with this communication and information boom has left many corporations scrambling.  If incorrect information is disseminated on the web, a business is not as free as an individual to respond (if it can even do so quickly enough).  Outdated government regulation enacted before the digital world was created can work to restrict how a company responds or has dialogue with the misinformed disseminators.&lt;br /&gt;
&lt;br /&gt;
“Today we can influence each other more easily than ever before because our media is digital, it can reach anything that has a screen. And nearly anything with a screen can also be published from — we have a two way media.” [http://www.zdnet.com/blog/foremski/will-a-fragmented-media-lead-to-a-flowering-of-culture/971]&lt;br /&gt;
&lt;br /&gt;
In thinking about the Internet as a medium, I believe the most profound changes derived from the shift to digital media is the introduction of a communication stream that is now (1) highly fragmented, (2) immediate, and (3) conversational in nature. &lt;br /&gt;
&lt;br /&gt;
# We’ve evolved from a finite and more easy to regulate roster of tens/hundreds of traditional news media sources, to billions of websites. Today, the average citizen has a public voice, forcing us to challenge our notions of what is considered “journalism.”  There are both opportunities (i.e., innovative thought and talent can emerge) and challenges (i.e., inundation, how to regulate, varied levels of credibility, etc.) inherent in this kind of landscape. &lt;br /&gt;
# Additionally, the pace of media consumption has become extremely rapid. We’ve become a culture that is accustomed to the instant accessibility of information. &lt;br /&gt;
# Finally, media is now social. The concept of “wiki”-based information sources means that we can interact with the information we consume, and the viral nature of the Internet lends to an ease of content ‘shareability’.  Media communication is no longer a one-way stream. -- [[User:Jsanfilippo|Jsanfilippo]] 15:42, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think one of the most significant challenges we face moving forward with regard to digital technology is the security.  Not just private citizens but governments and corporations around the world are becoming more heavily dependent on it.  Consequences of any major digital disaster (i.e. caused by cyber-terrorism or any unexpected failure) could be severe to an unimaginable level as the digital world gets more complex and interdependent within.  --[[User:Edwardshinp|Edwardshinp]] 13:44, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I agree with Edwardshinp regarding security.  It&#039;s not just an issue of security of financial data for transactions, but we are looking at national security, corporate espionage, etc.  Anything where we&#039;re engaging in the sharing of information. --[[User:Dreed07|-dreed07]] 19:33, 25 January 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
One of the most significant challenges is defining what constitutes privacy of users.  Facebook continually redefines the concept of what information is private for its users. As we get more social and increases in attempts by online organizations to bring a more personal experience to the user, this will continue to be a challenge. --[[User:Dreed07|-dreed07]] 03:35, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
As dreed07 said, I think the same. PRIVACY. I would say lack of privacy. ([[User:VladimirTrojak|VladimirTrojak]] 08:29, 1 February 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.org/flutrends/ Google Flu Trends]&lt;br /&gt;
&lt;br /&gt;
Google has stuck into out lives quite firmly. I mean, than Google predict something better than government entities (CDC) just by running an algorithm and analyzing few searches... On some level that is the best example of how dependent on the Internet we became. I am not saying that&#039;s a bad thing, people before me told the same thing about electricity. Times are changing and that is a progress none the less. But shouldn&#039;t we be a little more careful, stop for a second and have a look on what we were actually doing for the last 20 years? Can the Internet be our own Frankenstein monster? :) --[[User:Jastify|Jastify]] 00:28, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We&#039;ve talked about how an organization such as Wikileaks scores points for transparency by throwing [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/ &amp;quot;grit&amp;quot;] in the government machine, but I&#039;m also impressed by what &#039;&#039;is&#039;&#039; officially available online. Old classmates and I fondly recall hours spent on state-wide judiciary searches that revealed uppity prep school teachers as felons, perverts and drunks--and sometimes explained mysterious classroom absences. Clickable property records: liens, takings and all, immortalize for peekers embarrassing proof of habitual poor decisions, or just a temporary rough patch. And lest anyone forget that accountability means everybody, constituents can roam the virtual &amp;quot;halls of shame&amp;quot; of de-certified police officers.&lt;br /&gt;
&lt;br /&gt;
As for a challenge presented by digital media, it seems very easy to become absorbed by myriad micro-tasks (i.e. micro-blogging) of dubious value that sap time and productivity.  About a year ago, I sat in on a conference at Yale Law. Up in the nosebleed section, I had a decent view of the panelists onstage, as well as about 70 hunched, frenetic Tweeters in between. Having myself never Tweeted nor been Tweeted at, I was puzzled as to what they were so furiously punching into their laptops, pausing only when a pod of genial-looking sperm whales appeared and temporarily halted operations. Months later, I happened upon a slew of the Tweeters&#039; work and was disappointed. Each was responsible for hours and hundreds of blurbs that amounted to little more than scores of parallel transcriptions of the entire day&#039;s worth of speakers. Never mind that the conference was streamed live online, archived and outlined in bullet points, nor the fact that many of the Twits were Tweeting at one another. At best, it was an exercise in the sillies; at worst, a mass lapse in auditorium etiquette. --[[User:KimberlyNevas|KimberlyNevas]] 15:55, 29 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Social networking has opened a new level of communications that no one would have ever dreamed of. I believe it is a tremendous blessing that has and will continue to change our world. It has opened up nations that otherwise would have been totally secluded and shut-in. But this is a new era. An era where nations can now protest and receive support and empathy from other nations. Right now, as we speak we are witnessing history in the making. We are part of a revolution that we have only read about in history textbooks. &lt;br /&gt;
&lt;br /&gt;
Egypt is a prime example that happens to be in the forefront of our minds. We are seeing a nation change and evolve. Whether for good or for worse, we are all witnesses. We are watching a government crumble right before our eyes; and the Internet is playing a monumental role in this!  &lt;br /&gt;
&lt;br /&gt;
It is our responsibility to nurture and protect this instrument of progress and change.  We have a mechanism that has the ability to shrink the world. We now can convey messages that once were deemed unfathomable and impossible to distribute. Of course, governments want a position of control over such a tool; but like our forefathers we cannot allow that. Just like they defended their freedom of speech, we must defend ours too. It is the same principle with a modern twist. Instead of the printing press, it is now blogs. Instead of town hall meetings, it is now twitter. Like everything thing else in our ever evolving world the press has become faster and more efficient. The media has now modernized and caught up with the times.&lt;br /&gt;
--[[User:Joshuasurillo|Joshuasurillo]] 04:38, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please use this space for comments/discussion you would like to share with the rest of the class.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/ The World&#039;s First Stateless News Organization] &lt;br /&gt;
* [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html Russia&#039;s Own WikiLeaks Takes Off]&lt;br /&gt;
The idea of &amp;quot;Stateless News Organizations&amp;quot; seems to be getting around... In my country though it&#039;s a little less sophisticated... --[[User:Jastify|Jastify]] 15:45, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sadly, Rosen’s prediction of the public’s reaction to the release of the Afghanistan War logs was spot on. These logs, in my opinion, did not receive enough attention or create the amount of outrage they deserved.  Because they exposed a distasteful problem, an uncomfortable public chose to turn a blind eye. --[[User:Jedmonds|Jedmonds]] 20:38, 21 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The economic impact of the Internet and digital technologies can be significant.  Outsourcing job functions to countries outside the United States for instance, was facilitated in part by the ability of the Internet to deliver real time data across the globe.  IP telephony, high speed video and data transmitted on the Internet allowed for workers to be “virtual”, anywhere in the world.  This created cost savings and efficiencies for corporations while fueling growth in emerging countries.  Domestically, this has lead to displaced workers and job losses across many fields.  --Earboleda&lt;br /&gt;
&lt;br /&gt;
“Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?” IMO Wikileaks is none of the above. What Wikileaks can be described as  is one of several recent examples of the ways in which communications technologies are fundamentally changing the nature of life on the planet.  It’s part of an incomplete definition that will be building in complexity for some time into the future. &lt;br /&gt;
&lt;br /&gt;
We live in an environment today in which the sum total of human experience virtually floats in the air around us. Need directions, google it. Want to see what it will look like when you turn the corner at the next intersection, click to a 360 degree view.  Wish to know what historical figure may have lived in that ancient building by the park, if there isn’t today, sometime in the near future there will be a website, wiki, webcam, historical archive, building plans, public utility schematics, images of deeds, mortgage documents, tax information,  holographic immersive experiences … &lt;br /&gt;
&lt;br /&gt;
Piece by piece we are collectively constructing a virtual copy of the world.  More than a copy, it contains layers from this moment stretching into the past and other contextual information impossible to obtain a mere few years ago. &lt;br /&gt;
&lt;br /&gt;
I worry when it is said that Assange is not &amp;quot;about letting sunlight into the room so much as about throwing grit in the machine.&amp;quot; [http://www.technologyreview.com/computing/26875/?a=f].  With that kind of philosophy it seems the opportunity to cause harm is far greater than that for good. &lt;br /&gt;
&lt;br /&gt;
If on the other hand Wikileaks becomes or spawns places of free and open communications where transparency reigns and people of conviction can become free to disclose information that brings light into what today are dark crevices, we’ll all be better off.  If not, we need to worry.  &lt;br /&gt;
&lt;br /&gt;
We need also worry about as Brandon Palmen says, “an incomplete and skewed portrayal of fact.” [http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/] Actions that result from reliance on the incomplete picture will have unintended consequences.  This is true whether a skewed view is intentional or as a function of where we are with respect to construction of the new virtual copy of our world.  &lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks? The truth is that there will soon be many versions of Wikileaks with many different degrees of completeness ranging along a spectrum from purely altruistic to undeniably evil. It will be up to the individual and the establishment to decide on which version of reality we each choose to believe and act upon. --[[User:Gclinch|Gclinch]] 02:53, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would contribute to what my classmates have alredy said about “Is  Wikileaks a journalism organization? A terrorist organization? A criminal syndicate?”.&lt;br /&gt;
&lt;br /&gt;
I am sure there are number of people who would go for first, second and third option. It depends from which point of view we are looking at wikileaks. Sometimes term whistleblower or some intermediary is enough. I am sure that sometimes it is very questionable and wikileaks might be regarded as a journalist. I am sure that some politicians would also use terms like terrorist or criminal.&lt;br /&gt;
&lt;br /&gt;
Do we need an organization like Wikileaks?&lt;br /&gt;
I would answer with the question. Shoul we know about wrongdoing, killing, torture, corruption and tax evasion? Should we know what is really going on like in &#039;Collateral murder video&#039;?&lt;br /&gt;
&lt;br /&gt;
Those are arguments for wikileaks, however to put one argument why we could be afraid sometimes is following:&lt;br /&gt;
“Everybody will be leaking dirt on everybody,” Rassudov [http://www.themoscowtimes.com/news/article/russias-own-wikileaks-takes-off/429370.html]&lt;br /&gt;
This is what concerns me a bit. ([[User:VladimirTrojak|VladimirTrojak]] 08:29, 1 February 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Wikileaks controversy is one of many examples how much the Internet has changed the entire world.  I am sure I will develop more ideas about regulating or not regulating what is out there in the Internet as this class progresses, but in terms of Wikileaks, I am still fundamentally puzzled as to how those confidential information has eventually gotten into the hands of Assange or Wikileaks from the first place.  My point is if the government wants to protect certain information, it is the government&#039;s own responsibility to do so via strict prevention measures.  And I suspect that this fundamentally has nothing to do with the control of the Internet or digital media.  You can&#039;t just blame and impose everything on Wikileaks because it was simply living up to its whole purpose of establishment--exposing certain types of political information to the public as a new digital medium (in this respect, I don&#039;t see any difference among Wikileaks, WSJ or NYT).  I definitely do think that some of the information released through Wikileaks were inappropriate and damaging to the national security, which ultimately is not in the best interest of the American people.  I support the government&#039;s non-disclosure of certain information for national interest and safety.  One should not assume that government transparency is always desirable and healthy (as Assange does seem to believe so), even in a democratic society.  However, imposing anything on Wikileaks, whether constitutionally legal or illegal (i.e. Lieberman&#039;s actions), is just not the right way to handle the &amp;quot;mess.&amp;quot;  Take out the roots of the problem whatever they are--not Wikileaks. --[[User:Edwardshinp|Edwardshinp]] 15:32, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
A couple of months post-Wikileaks, and we&#039;re already seeing various similar organizations and entities (and even instances of leaking) crop up; while I don&#039;t support all of WikiLeaks&#039; leaks necessarily, I do support the overall idea of information leaking; and in the case of, for example, the Palestine Papers (recently leaked to Al Jazeera), think that it can be very effective in demonstrating hypocrisy in governments.&lt;br /&gt;
&lt;br /&gt;
I also take serious issue with the handling of WikiLeaks by American companies Amazon, Mastercard, PayPal, EasyDNS, and Tableau.  All acted under potential pressure from Sen. Joe Lieberman, and the vast majority gave &amp;quot;copyright infringement&amp;quot; as their excuse, more or less.  If we excuse this behavior in the instance of WikiLeaks, then we&#039;re headed down a slippery slope: Do we then excuse similar intermediary censorship when levied against a human rights organization? [[User:Jyork|Jyork]] 22:23, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I consider as the major challenge for E-industry the adoption of basic ethical standards/rules to be applicable for and followed by each provider as well as an user. Those rules should go far beyond and should be independent from a governance scope given by a local jurisdiction (something alike Wikipedia core content policies). The element of self-regulation emanated by the industry itself might be (a) an effective interpretation tool for numberless requests imposed for pursue of e-industry in particular jurisdiction (see link), (b) could prevent or diminish negative effects of state regulation or attempts of over-regulation or could help to constructively handle occurrence of case like Wikeleaks. Further, Internet as the major source of information and widely used communication tool has changed significantly quality and content of communication all over the world. This new phenomena already has and will have an overwhelming social and cultural impact on mankind and human interaction.&lt;br /&gt;
&lt;br /&gt;
In my opinion, if we use the standard definition of what constitutes a &amp;quot;media organization&amp;quot; based on U.S. Code Title 2, Section 1602, a person or entity engaged in disseminating information to the general public through a newspaper, magazine, other publication, radio, television, cable television, or other medium of mass communication; then Wikileaks is just that and would be entitled to protections as such.  I don&#039;t agree with the way Wikileaks is carrying out it&#039;s mission on a philosophical level. There are other means that could be used to promote and encourage transparency in government without endangering people&#039;s lives. --[[User:Dreed07|-dreed07]] 20:13, 25 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WikiLeaks is a content provider.  They are not terrorists because they do not attempt to destroy or disrupt the Internet.  They are simply providing content which some people find objectionable.  If we set aside the question of how they obtained the information then the remaining question is whether they have a legal or moral right to disseminate it.  WikiLeaks is not based in the U.S. so it is not subject to U.S. laws.  They are not publishing credit card or social security numbers.  They are not publishing copyrighted or proprietary material.  They are editorializing, but that is still the prerogative of a free press.  They at least showed some self-restraint by selectively publishing what they felt to be newsworthy and redacted sensitive information that could bring harm to others.  They are not in the same league as the New York Times.  They are not even writing their own stories.  But they are taking an editorial position by selecting which content to provide, which gives them some claim to being a journalism organization.&lt;br /&gt;
-Chris Sura&lt;br /&gt;
&lt;br /&gt;
Wikileaks is such a complex topic. We all know the need for the media; it functions as a watchdog to keep our government and institutions in line. But how far is too far? Wikileaks goes out of its way to publish documents that were previously classified. The documents sometimes share intimate details on policies, troop movements and other sensitive material. Is this helpful? Yes, to an extent. We have the right to know if corruption is rampant, and if we are being led in the right direction. However, the release of documents that could cause a security breach and put our troops in danger is not good at all. America must be protected at all times and ought to be held in great regard. We need freedom, but not at the expense of others.&lt;br /&gt;
&lt;br /&gt;
As for ways we have changed, no doubt the first way is by the overwhelming amount of information available. We can learn about any topic, anywhere at anytime. This mass of knowlage is one of the many wonders of the Internet. Second, we have been changed by social interaction. Before, communication was slow and limitred to the local area. Now, you can Facebook and Skype people all over. People date people they meet over the Internet. I can attend my class from anther state via the web. Ever since the birth of the web, the world has gotten smaller. The third way is the marketplace. Finacial transactions take place online and are sent round the world. You can wire money across the world and expand your marketplace to levels previous generations couldn&#039;t have dreamed of. Its exciting to see where it takes us! [[User:ElishaSurillo|Elishasurillo]]&lt;br /&gt;
&lt;br /&gt;
Just wanted to add a comment to today’s in-class discussion which did not make it in due to time constraints. The seminar ended on the question of what measures the US government could or should (from a legal and ethical perspective) take in dealing with the leak of classified diplomatic data via Wikileaks. The question was predicated on the (generous) assumption that the leaked material had little to no serious material impact on US security or diplomatic interests. An obvious caveat to that assumption is the fact that only a small number of the diplomatic cables in question have be released thus far, preventing us from knowing the full impact the leaks may have in the future. Perhaps a less obvious caveat is that it is extremely difficult for those of us without diplomatic credentials to tell what sort of damage has been done in terms of the US’s international diplomatic relations, where the effects may be more subtle and less obvious to the public; certainly, there seems to be little evidence of direct damage to the US itself… however, that does not necessarily mean the released materials are without serious impact. A number of pundits, Andrew Sullivan for one example, have ascribed to Wikileaks cables a prominent (though perhaps not a driving) role in the so-called “Jasmine Revolution” in Tunisia which ousted president Ben Ali and toppled his government this January. Obviously these events are of enormous import to Tunisians around the globe, and may have a significant effect on Africa and the Arab world, and thus geo-politics as a whole. While the potential future ramifications for US foreign policy are difficult to calculate, in terms of immediate impact it should be noted the president Ben Ali was considered to be an important US ally in North Africa, and his ousting may have consequences for the US government’s anti-terrorism efforts in that region. (That is not to say that the overall impact will be negative; one hopes that the Jasmine Revolution will work out for the best for both the US government and, perhaps more importantly, the people of Tunisia. The effects, however, remain to be seen.) -BrandonAndrzej&lt;br /&gt;
&lt;br /&gt;
Here are links to the topic being discussed on Andrew Sullivan’s Atlantic blog:&lt;br /&gt;
&lt;br /&gt;
http://andrewsullivan.theatlantic.com/the_daily_dish/2011/01/tunisias-wikileaks-revolution.html&lt;br /&gt;
&lt;br /&gt;
http://andrewsullivan.theatlantic.com/the_daily_dish/2011/01/a-wikileaks-revolution.html&lt;br /&gt;
&lt;br /&gt;
During the discussion that ended the class (26-Jan-11) several argued that officials of the US Government were justified in taking actions against private citizens and organizations in response to Wikileaks.  This bothers me to the point of losing sleep. It is outrageous that officials of the US government felt it within their power, without any legal due process, to use the power invested in them by the people to intimidate private organizations into taking steps to deny access to information once it had become readily available.  Far beyond “a terminal case of hubris” as described by John Naughton in his article in the Guardian, [http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks], US senator Joseph Lieberman’s actions to intimidate private organizations including Amazon and Paypal into removing Wikileaks content is an outrageous and possibly illegal abuse of the power given to him when he was elected to represent a small segment of the US population in the national congress.&lt;br /&gt;
 &lt;br /&gt;
Regardless of whether his intentions could be viewed by some a noble, we live in a society that is ruled by law. There are processes to be followed. Senator Lieberman availed himself of some of those processes when he filed Securing Human Intelligence and Enforcing Lawful Dissemination (SHIELD Act) [http://www.wired.com/threatlevel/2010/12/shield/#].We should all be incredulous that beyond this Senator Lieberman used his positions in congress to directly contact commercial organizations intimidating them with veiled threats that the US government would use its power against them should they not comply to his personal vision of how they should conduct their private business. There are numerous judicial and administrative options available through legal due process of US Law that Senator Lieberman could have used. The fact that he did not is an outrageous abuse of power.  &lt;br /&gt;
&lt;br /&gt;
Senator Lieberman’s actions are just the tip of the iceberg of official reaction that was untoward and possible illegal. The actions of agencies such as the State Department - who are invested by the citizenry with even less official power than a US Senator - in contacting private individuals and intimidating them to not exercise their freedom of expression are even more outrageous.  The gentleman in class who said that even his company was contacted and threatened should shout to all of us how far we have traveled down a slippery slope with regards to the fundamental rights upon which US society is based.  The fact that there seemed to be acquiescence to these concepts during the class discussion, especially taking place in a building that is just steps away from the Harvard Law School, is of great concern to me.  &lt;br /&gt;
&lt;br /&gt;
What is your opinion? --[[User:Gclinch|Gclinch]] 12:53, 26 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would like to contribute to the discussion of: Do we need an organisation like Wikileaks?&lt;br /&gt;
&lt;br /&gt;
I agree that the ethos behind Wikileaks of exposing unethical government behaviour is a necessary component in establishing accountability; however, the longer-term implications of Wikileaks are (potentially) opposed to the initial aim. If governments go to extreme lengths to protect information from whistleblowers then this will lead to compartmentalisation of information and a decline in cooperation between agencies. Wikileaks may catalyse the creation of a political culture that is suspicious of information sharing where diplomacy cannot operate effectively. &lt;br /&gt;
&lt;br /&gt;
A question posed on the Guardian’s &#039;Live Q&amp;amp;A with Julian Assange&#039; by JAnthony aimed to ask Julian Assange whether Wikileaks should be held accountable for hampering diplomatic efforts – went unanswered. &lt;br /&gt;
&lt;br /&gt;
“I am a former British diplomat. In the course of my former duties I helped to coordinate multilateral action against a brutal regime in the Balkans, impose sanctions on a renegade state threatening ethnic cleansing, and negotiate a debt relief programme for an impoverished nation. None of this would have been possible without the security and secrecy of diplomatic correspondence, and the protection of that correspondence from publication under the laws of the UK and many other liberal and democratic states. An embassy which cannot securely offer advice or pass messages back to London is an embassy which cannot operate. Diplomacy cannot operate without discretion and the protection of sources. This applies to the UK and the UN as much as the US. In publishing this massive volume of correspondence, Wikileaks is not highlighting specific cases of wrongdoing but undermining the entire process of diplomacy. If you can publish US cables then you can publish UK telegrams and UN emails. &lt;br /&gt;
&lt;br /&gt;
My question to you is: why should we not hold you personally responsible when next an international crisis goes unresolved because diplomats cannot function. ”    http://www.guardian.co.uk/world/blog/2010/dec/03/julian-assange-wikileaks      [[User:Ltconnell|Ltconnell]] 22:19, 26 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Hi you all. Just saw that on the NYT, it might interest you: &lt;br /&gt;
The New York Times on dealing with Assange and the secrets -- http://www.nytimes.com/2011/01/30/magazine/30Wikileaks-t.html?pagewanted=1&amp;amp;_r=1 [[User:Coelhol|lu coelho]]&lt;br /&gt;
&lt;br /&gt;
In my opinion one of the most significant changes associated with the Internet and digital technologies is the huge content availability and the low cost to get information. This “revolution“ is also redefining: monetary transaction (as we can see through the massive growth of  e-commerce websites due to low cost of transaction and low cost of distribution), social relationship (how users are sticky to facebook, twitter, blogs, etc…), communication (high level of interaction through “new”channels such as email, voice over Internet protocol, instant messages, etc…), entertainment (access to a huge library content = long tail. E.g. Netflix, Hulu, Youtube), etc…We are definitely in the beginning of this revolution since the value proposition the internet can add has still much room to grow.  [[User:DriFaria|Adriana Torii]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
My feeling is that Wikileaks is an unstable medium for providing an essential watchdog function overseeing government activity. There is a need for some kind of independant body that checks the scope of the governments autonomy, but conceding this responsibility to a rogue, pirate entity does seem to legitimize some of the governments concern over jeopardizing the safety of individuals who should not be sacrificed for the errors of those higher ranking officials overstepping the intended restrictions on their authority and influence. Unfortunately I cannot offer much in the way of a practical solution for balancing off the dangers on either end of the spectrum in the Wikileaks situation. The slope seems to slip down in both directions. Smudge24&lt;br /&gt;
&lt;br /&gt;
Thinking about how the internet has changed our society two things immediately come to mind. First, from the perspective of an average US consumer, I feel that there is undeniable evidence that suggests that the internet has flattened the global marketplace. Goods from all areas of the world are now just an effortless click away. Even our methods of shopping have drastically changed from typical in-store shopping and mail-order catalogs, to instant online price comparisons of the same good between hundreds of online retailers. This continual instant access to nearly any good has shifted our societies towards more hasty and instant desires - in a way, I argue, we have all become more impatient. Things that at one point could have been considered expendable extras are now at the center of entire business models. Second, I have given some thought to the way in which the medical community has been changed with the advent of the internet. Specifically, I find it revolutionary how access to medical information has been simplified to be understood by nearly anyone with a mouse and a keyboard. The ability to pre-diagnose oneself and have instantaneous access to potential medical solutions is something that could prove revolutionary in countries that are in early development stages. Furthermore, learning medical terminology and processes (i.e. similar to med school) is simplified and made much less expensive - allowing a lower boundary to entry into the field. [[User:Lewtak|Lewtak]] 02:11, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe our government has gone after the wrong target. They should be after the source of the leaks. Wikileaks is just an emissary and a conduit of information. The government wants to shoot the messenger while they should be instead hunting for the origin of the message. If they have such a gripe on people exchanging information, they should attempt to find the actually leak and plug it. If the government is successful in stopping Wikileaks, there will be another messenger in its wake eagerly conveying information from a leak. Until the original leak has been extinguished, the government will continue to have it&#039;s information published and made public.--[[User:Joshuasurillo|Joshuasurillo]] 04:44, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•	The internet has created a virtual world for people, a global village, as coined by Marshall McLuhan. Where sharing of thoughts and ideas take place at a completely new level. Where your audience is not specified or fixed. Freedom to put your ideas out there and the freedom to express your opinion or give your take on the thoughts put down by others, without having to disclose your identity, is something only the internet gives you. The internet allows the ideas and thoughts put forward by people to be judged not by their physical appearance or their accomplishments but in a much unbiased, to-the-point way. It is also one of the fastest, cheapest and most widespread means of communication. This is the age of freedom of communication, everyone is entitled to their individual thoughts and opinions, and the internet is their diary, although not that personal.&lt;br /&gt;
•	Businesses are run using technologies such as electronic mails and video-conferencing, which are continuously outdoing themselves and introducing better features. It is a platform for people to express themselves freely and that freedom will be curbed once the government decides to get involved. Just like every school, home or playground has a big bully, the government is a big bully in a country. Everyone thinks not just twice but a million times before taking up an issue against the government. In my opinion, wiki leaks has endeavored to take up something that no other form of media would have the guts to publish, and not just put the information out there but also follow through with it. If the American government has nothing to hide then why react defensively. If they had not made a big issue out of these releases people would have most probably forgotten about it in time. Their reaction itself has generated interest in the public. [[User:Karishma goenka|Karishma goenka]] 11:18, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In my opinion the most significant changes brought on by digital technologies are:&lt;br /&gt;
- The possibility of transferring data through different medias.&lt;br /&gt;
- These technologies allow people to communicate at low cost (Skype, for example).&lt;br /&gt;
- The streaming video, which is changing the way people watch TV and movies.&lt;br /&gt;
- The videoconference, which has also been used within the Court System.&lt;br /&gt;
- The possibility of buying online 24 hours a day.&lt;br /&gt;
- Product customization (as an example, Dell allows that the client choose on line its own computer configuration).&lt;br /&gt;
- Immediate download of books, articles, music and films.&lt;br /&gt;
Regarding the challenges, I would say that piracy and unauthorized copies of ideas are problems caused by the information dissemination in the internet. Another challenge would be the fact that the digitalization of content brought a radical change in the business model. See the discussion about Apple enforcing rules on e-book publishers and also the changing occurring in the cable TV segment, due to the streaming video. ([[User:Anna|Anna]] 21:24, 6 February 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As many people pointed out above, the appearance &amp;amp; spread of digital technologies has affected our society in unexpected yet profound ways - from science itself to business to everyone&#039;s daily life. The trend of changes can be generally illustrated as &amp;quot;being closer, easier, and faster.&amp;quot; In terms of challenges posed by these whizzy technologies, I would like to, specifically, talk about infringement of intellectual property rights. Not only is an individual&#039;s personal information stolen by a third party and misused - mostly for financial frauds, but also an inherent right to one&#039;s idea is in a great danger of being attacked and looted away. In short, what represents ourselves (our birthdates, addresses, and social security numbers) and what we give birth in this world (our thoughts, ideas, and very creation) can be and are lost in amidst of the Internet society. In this situation, I doubt whether there would be any point of insisting freedom of expression, when the expression itself is suffering from casual invasion and robbery.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;Articles&amp;gt;&lt;br /&gt;
* Identity Theft: [http://www.nytimes.com/2002/05/29/nyregion/identity-theft-and-these-were-big-identities.html?src=pm]&lt;br /&gt;
* Copyright Issue: [http://pogue.blogs.nytimes.com/2010/07/08/no-easy-answers-in-the-copyright-debate/?scp=5&amp;amp;sq=copyright&amp;amp;st=Search]&lt;br /&gt;
&lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 14:58, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Some people mentioned organizations and the workplace and the security concerns that follow with the increase of digital technologies. I think about the actual change in culture as well, between what&#039;s &amp;quot;acceptable&amp;quot; and &amp;quot;unacceptable.&amp;quot; Most people have worked and will work at some point,  and now there are avenues that are more accommodating, e.g. conference calling, telecommuting, VPN accounts, to those not physically present in the office. Even if workers have all the avenues in the world to &amp;quot;work&amp;quot; regardless of where they physically are, can it be considered &amp;quot;work,&amp;quot; particularly if one&#039;s action while working away from the office creates distrust and paranoia ? In organizations where something such as telecommuting is not the norm, managers are faced with justifying to their employees why it is acceptable for some and not others to have this option. On a related note, as organizations engage in social media activity to promote their brand and organization, they are also promoting the social media brand and, perhaps inadvertently, that this is an acceptable vehicle for workplace communication.[[User:Myra|Myra]] 19:21, 8 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Other Useful Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the BBC World Service documentary &#039;&#039;Wikipedia at 10&#039;&#039; - a 22.5 minute retrospective on the occasion of Wikipedia’s 10th anniversary. It covers a number of topics, some of which may be relevant to the upcoming Wikipedia editing assignment.&lt;br /&gt;
&lt;br /&gt;
http://www.bbc.co.uk/worldservice/documentaries/2011/01/110111_wikipedia_at_10.shtml&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6520</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=6520"/>
		<updated>2011-04-12T16:02:13Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded|Link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=6253</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=6253"/>
		<updated>2011-03-21T18:31:07Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline:&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|yourname|assignment description|link to assignment document}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
*Name:Elisha Surillo&lt;br /&gt;
*Description: Homophilic Tendencies and the Online Tea Party Movement&lt;br /&gt;
*Link to your outline:http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Assignment_3.doc&amp;diff=6252</id>
		<title>File:Assignment 3.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Assignment_3.doc&amp;diff=6252"/>
		<updated>2011-03-21T18:25:08Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: uploaded a new version of &amp;quot;Image:Assignment 3.doc&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Assignment_3.doc&amp;diff=6251</id>
		<title>File:Assignment 3.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Assignment_3.doc&amp;diff=6251"/>
		<updated>2011-03-21T18:23:28Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6117</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6117"/>
		<updated>2011-03-07T04:53:00Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt&#039;s Internet kill switch decision rather ignited people&#039;s movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
-[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]] &lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn&#039;t mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find &#039;clear&#039; answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Saam, you&#039;ve picked a fascinating topic.  You&#039;ve identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
  &lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to &amp;quot;observe&amp;quot; as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange&#039;s information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
*Comments: Kimberly, that is an explosive topic! I bet you&#039;ll have lots of material! The qusetion is where did he commit the crimes if any. If in Australia, can they prosecute him? Or because they are U.S. cables, does the U.S.A. have jurisdiction? And who has the right to tell him he can or cannot post and release? The U.S.A. has to clearly stae how he broke the law. As far as I know, treason can only be a crime if commited by a citizen. Good work! --[[User:Elishasurillo|Elishasurillo]] 04:53, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html   or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?   you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer&#039;s perceptions of risks.  If you are interested, I&#039;d be willing to trade notes and help each other shape up the final project.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I&#039;d share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
*Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official &amp;quot;legal findings&amp;quot; of what bloggers can/cannot do vs. b) the unoffical &amp;quot;codes of conduct&amp;quot; being developed in the world of blogging.  I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I&#039;ll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, you&#039;ve nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals.  In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it.  What are they and the users missing out on?  We&#039;ve already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project.  Best, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn&#039;t seem to fit.  It seems like you&#039;d also like to look at how effective they are in increasing the transparency of the political process as well and you&#039;d have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I&#039;d be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.)  All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
*Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment:  This is a really interesting topic!  I hadn&#039;t known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia.  Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation.  I also wonder what this means for Wikipedia.  As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)  &lt;br /&gt;
 &lt;br /&gt;
*Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yu Ri: This is a solid proposal for the project.  I like how you&#039;ve used the course themes as your areas of investigation and how you&#039;ve narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms &amp;amp; governance, membership, limits on expression, and national law.)  If you can do all of those, then that&#039;s great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn&#039;t mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It&#039;s just that they won&#039;t all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I&#039;m not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of &#039;content farming,&#039; and thought I&#039;d reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country&#039;s customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but &#039;&#039;&#039;power&#039;&#039;&#039; for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
I like that you&#039;ve identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don&#039;t really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you&#039;ve identified, which are pretty major sites, in addition to the other examples you&#039;ll be incorporating, will be more than enough data and analysis for a great paper.  Unless perhaps I&#039;m not understanding the particular lens through which you&#039;ll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic.  [http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
*Comments: &lt;br /&gt;
&lt;br /&gt;
Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we&#039;ve had in class have centered around how to best facilitate legal social interactions.  I&#039;m excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I&#039;d be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available. &lt;br /&gt;
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html   [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
*Comments: Hello Faye, I read your prospectus but had the following thought. What if the person belives they are in the right? Does that make them still a vandal? And can you outline excatly what recourses one can take against such offenders? What authority can someone make a complaint to? That last question brings us to a much bigger, more complex one. Who has the soveriegn rights over the web? The government? A trade federation? Or individual users? --[[User:Elishasurillo|Elishasurillo]] 04:46, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments: Hi, Alex. Sorry that didn&#039;t answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let&#039;s discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina&#039;s project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don&#039;t know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:&lt;br /&gt;
&lt;br /&gt;
* Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)&lt;br /&gt;
* Prospectus title: What conditions are conducive to successful commons based peer production?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Admittedly, I knew nothing of JCP prior to reading your prospectus, but it&#039;s a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
 &lt;br /&gt;
Comments:&lt;br /&gt;
&lt;br /&gt;
Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
 &lt;br /&gt;
I&#039;m confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?&lt;br /&gt;
&lt;br /&gt;
Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha&#039;s file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don&#039;t believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry I would change the name but I don&#039;t know how. Sorry for the confusion! --[[User:Elishasurillo|Elishasurillo]] 04:48, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
*Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi, Alan, thanks a lot for your interest! I can&#039;t find your comments below deinous&#039; prospect, and I would really like to check them. [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I too went in search of Allen&#039;s comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.[[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright).  My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect. &lt;br /&gt;
&lt;br /&gt;
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group.  Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.   &lt;br /&gt;
&lt;br /&gt;
Also, anyone who is working as a group in developing their project can use it to collaborate virtually.  There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, I think using web.alive as a platform for a study group is a great idea.  Perhaps you can make an announcement in class this week. [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title (updated Mar 6): The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- To my Classmates:  Please note that after receiving feedback on my original prospectus I have created an updated version.  My title has changed to The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
&lt;br /&gt;
I hope you will find this more focused and greater compelling.  I will appreciate any additional comments and suggestions based on this new approach. Thank you, Guy --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai Guy!  I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I&#039;m afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Syed, this is a really interesting topic, but I am concerned that it may be too broad.  I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the two.  Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable.  Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about &#039;websites that allow users to decide which company they want to solicit coupons from&#039;  has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)&lt;br /&gt;
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK&lt;br /&gt;
&lt;br /&gt;
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries&#039; different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that. &lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let&#039;s see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the &amp;quot;sight, sound and motion&amp;quot; element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client&#039;s campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I&#039;ll be very curious to read your completed report! Also thought I&#039;d share a helpful resource that summarizes the online video landscape (it&#039;s slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]&lt;br /&gt;
&lt;br /&gt;
Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6116</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6116"/>
		<updated>2011-03-07T04:48:27Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt&#039;s Internet kill switch decision rather ignited people&#039;s movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
-[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]] &lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn&#039;t mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find &#039;clear&#039; answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Saam, you&#039;ve picked a fascinating topic.  You&#039;ve identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
  &lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to &amp;quot;observe&amp;quot; as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange&#039;s information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html   or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?   you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer&#039;s perceptions of risks.  If you are interested, I&#039;d be willing to trade notes and help each other shape up the final project.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I&#039;d share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
*Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official &amp;quot;legal findings&amp;quot; of what bloggers can/cannot do vs. b) the unoffical &amp;quot;codes of conduct&amp;quot; being developed in the world of blogging.  I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I&#039;ll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, you&#039;ve nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals.  In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it.  What are they and the users missing out on?  We&#039;ve already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project.  Best, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn&#039;t seem to fit.  It seems like you&#039;d also like to look at how effective they are in increasing the transparency of the political process as well and you&#039;d have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I&#039;d be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.)  All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
*Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment:  This is a really interesting topic!  I hadn&#039;t known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia.  Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation.  I also wonder what this means for Wikipedia.  As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)  &lt;br /&gt;
 &lt;br /&gt;
*Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yu Ri: This is a solid proposal for the project.  I like how you&#039;ve used the course themes as your areas of investigation and how you&#039;ve narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms &amp;amp; governance, membership, limits on expression, and national law.)  If you can do all of those, then that&#039;s great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn&#039;t mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It&#039;s just that they won&#039;t all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I&#039;m not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of &#039;content farming,&#039; and thought I&#039;d reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country&#039;s customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but &#039;&#039;&#039;power&#039;&#039;&#039; for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
I like that you&#039;ve identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don&#039;t really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you&#039;ve identified, which are pretty major sites, in addition to the other examples you&#039;ll be incorporating, will be more than enough data and analysis for a great paper.  Unless perhaps I&#039;m not understanding the particular lens through which you&#039;ll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic.  [http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
*Comments: &lt;br /&gt;
&lt;br /&gt;
Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we&#039;ve had in class have centered around how to best facilitate legal social interactions.  I&#039;m excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I&#039;d be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available. &lt;br /&gt;
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html   [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
*Comments: Hello Faye, I read your prospectus but had the following thought. What if the person belives they are in the right? Does that make them still a vandal? And can you outline excatly what recourses one can take against such offenders? What authority can someone make a complaint to? That last question brings us to a much bigger, more complex one. Who has the soveriegn rights over the web? The government? A trade federation? Or individual users? --[[User:Elishasurillo|Elishasurillo]] 04:46, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments: Hi, Alex. Sorry that didn&#039;t answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let&#039;s discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina&#039;s project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don&#039;t know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:&lt;br /&gt;
&lt;br /&gt;
* Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)&lt;br /&gt;
* Prospectus title: What conditions are conducive to successful commons based peer production?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Admittedly, I knew nothing of JCP prior to reading your prospectus, but it&#039;s a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
 &lt;br /&gt;
Comments:&lt;br /&gt;
&lt;br /&gt;
Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
 &lt;br /&gt;
I&#039;m confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?&lt;br /&gt;
&lt;br /&gt;
Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha&#039;s file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don&#039;t believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry I would change the name but I don&#039;t know how. Sorry for the confusion! --[[User:Elishasurillo|Elishasurillo]] 04:48, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
*Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi, Alan, thanks a lot for your interest! I can&#039;t find your comments below deinous&#039; prospect, and I would really like to check them. [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I too went in search of Allen&#039;s comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.[[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright).  My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect. &lt;br /&gt;
&lt;br /&gt;
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group.  Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.   &lt;br /&gt;
&lt;br /&gt;
Also, anyone who is working as a group in developing their project can use it to collaborate virtually.  There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, I think using web.alive as a platform for a study group is a great idea.  Perhaps you can make an announcement in class this week. [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title (updated Mar 6): The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- To my Classmates:  Please note that after receiving feedback on my original prospectus I have created an updated version.  My title has changed to The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
&lt;br /&gt;
I hope you will find this more focused and greater compelling.  I will appreciate any additional comments and suggestions based on this new approach. Thank you, Guy --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai Guy!  I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I&#039;m afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Syed, this is a really interesting topic, but I am concerned that it may be too broad.  I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the two.  Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable.  Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about &#039;websites that allow users to decide which company they want to solicit coupons from&#039;  has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)&lt;br /&gt;
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK&lt;br /&gt;
&lt;br /&gt;
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries&#039; different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that. &lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let&#039;s see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the &amp;quot;sight, sound and motion&amp;quot; element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client&#039;s campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I&#039;ll be very curious to read your completed report! Also thought I&#039;d share a helpful resource that summarizes the online video landscape (it&#039;s slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]&lt;br /&gt;
&lt;br /&gt;
Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6115</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6115"/>
		<updated>2011-03-07T04:46:06Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt&#039;s Internet kill switch decision rather ignited people&#039;s movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
-[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]] &lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn&#039;t mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find &#039;clear&#039; answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Saam, you&#039;ve picked a fascinating topic.  You&#039;ve identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
  &lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to &amp;quot;observe&amp;quot; as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange&#039;s information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html   or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?   you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer&#039;s perceptions of risks.  If you are interested, I&#039;d be willing to trade notes and help each other shape up the final project.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I&#039;d share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
*Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official &amp;quot;legal findings&amp;quot; of what bloggers can/cannot do vs. b) the unoffical &amp;quot;codes of conduct&amp;quot; being developed in the world of blogging.  I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I&#039;ll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, you&#039;ve nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals.  In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it.  What are they and the users missing out on?  We&#039;ve already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project.  Best, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn&#039;t seem to fit.  It seems like you&#039;d also like to look at how effective they are in increasing the transparency of the political process as well and you&#039;d have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I&#039;d be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.)  All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
*Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment:  This is a really interesting topic!  I hadn&#039;t known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia.  Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation.  I also wonder what this means for Wikipedia.  As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)  &lt;br /&gt;
 &lt;br /&gt;
*Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yu Ri: This is a solid proposal for the project.  I like how you&#039;ve used the course themes as your areas of investigation and how you&#039;ve narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms &amp;amp; governance, membership, limits on expression, and national law.)  If you can do all of those, then that&#039;s great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn&#039;t mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It&#039;s just that they won&#039;t all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I&#039;m not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of &#039;content farming,&#039; and thought I&#039;d reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country&#039;s customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but &#039;&#039;&#039;power&#039;&#039;&#039; for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
I like that you&#039;ve identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don&#039;t really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you&#039;ve identified, which are pretty major sites, in addition to the other examples you&#039;ll be incorporating, will be more than enough data and analysis for a great paper.  Unless perhaps I&#039;m not understanding the particular lens through which you&#039;ll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic.  [http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
*Comments: &lt;br /&gt;
&lt;br /&gt;
Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we&#039;ve had in class have centered around how to best facilitate legal social interactions.  I&#039;m excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I&#039;d be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available. &lt;br /&gt;
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html   [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
*Comments: Hello Faye, I read your prospectus but had the following thought. What if the person belives they are in the right? Does that make them still a vandal? And can you outline excatly what recourses one can take against such offenders? What authority can someone make a complaint to? That last question brings us to a much bigger, more complex one. Who has the soveriegn rights over the web? The government? A trade federation? Or individual users? --[[User:Elishasurillo|Elishasurillo]] 04:46, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments: Hi, Alex. Sorry that didn&#039;t answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let&#039;s discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina&#039;s project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don&#039;t know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:&lt;br /&gt;
&lt;br /&gt;
* Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)&lt;br /&gt;
* Prospectus title: What conditions are conducive to successful commons based peer production?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Admittedly, I knew nothing of JCP prior to reading your prospectus, but it&#039;s a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
 &lt;br /&gt;
Comments:&lt;br /&gt;
&lt;br /&gt;
Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
 &lt;br /&gt;
I&#039;m confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?&lt;br /&gt;
&lt;br /&gt;
Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha&#039;s file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don&#039;t believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
*Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi, Alan, thanks a lot for your interest! I can&#039;t find your comments below deinous&#039; prospect, and I would really like to check them. [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I too went in search of Allen&#039;s comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.[[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright).  My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect. &lt;br /&gt;
&lt;br /&gt;
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group.  Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.   &lt;br /&gt;
&lt;br /&gt;
Also, anyone who is working as a group in developing their project can use it to collaborate virtually.  There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, I think using web.alive as a platform for a study group is a great idea.  Perhaps you can make an announcement in class this week. [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title (updated Mar 6): The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- To my Classmates:  Please note that after receiving feedback on my original prospectus I have created an updated version.  My title has changed to The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
&lt;br /&gt;
I hope you will find this more focused and greater compelling.  I will appreciate any additional comments and suggestions based on this new approach. Thank you, Guy --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai Guy!  I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I&#039;m afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Syed, this is a really interesting topic, but I am concerned that it may be too broad.  I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the two.  Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable.  Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about &#039;websites that allow users to decide which company they want to solicit coupons from&#039;  has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)&lt;br /&gt;
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK&lt;br /&gt;
&lt;br /&gt;
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries&#039; different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that. &lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let&#039;s see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the &amp;quot;sight, sound and motion&amp;quot; element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client&#039;s campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I&#039;ll be very curious to read your completed report! Also thought I&#039;d share a helpful resource that summarizes the online video landscape (it&#039;s slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]&lt;br /&gt;
&lt;br /&gt;
Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6114</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6114"/>
		<updated>2011-03-07T04:42:12Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt&#039;s Internet kill switch decision rather ignited people&#039;s movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
-[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]] &lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn&#039;t mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find &#039;clear&#039; answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Saam, you&#039;ve picked a fascinating topic.  You&#039;ve identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
  &lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to &amp;quot;observe&amp;quot; as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange&#039;s information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html   or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?   you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer&#039;s perceptions of risks.  If you are interested, I&#039;d be willing to trade notes and help each other shape up the final project.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I&#039;d share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
*Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official &amp;quot;legal findings&amp;quot; of what bloggers can/cannot do vs. b) the unoffical &amp;quot;codes of conduct&amp;quot; being developed in the world of blogging.  I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I&#039;ll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, you&#039;ve nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals.  In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it.  What are they and the users missing out on?  We&#039;ve already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project.  Best, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn&#039;t seem to fit.  It seems like you&#039;d also like to look at how effective they are in increasing the transparency of the political process as well and you&#039;d have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I&#039;d be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.)  All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
*Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment:  This is a really interesting topic!  I hadn&#039;t known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia.  Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation.  I also wonder what this means for Wikipedia.  As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)  &lt;br /&gt;
 &lt;br /&gt;
*Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yu Ri: This is a solid proposal for the project.  I like how you&#039;ve used the course themes as your areas of investigation and how you&#039;ve narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms &amp;amp; governance, membership, limits on expression, and national law.)  If you can do all of those, then that&#039;s great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn&#039;t mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It&#039;s just that they won&#039;t all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I&#039;m not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of &#039;content farming,&#039; and thought I&#039;d reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country&#039;s customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but &#039;&#039;&#039;power&#039;&#039;&#039; for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
I like that you&#039;ve identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don&#039;t really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you&#039;ve identified, which are pretty major sites, in addition to the other examples you&#039;ll be incorporating, will be more than enough data and analysis for a great paper.  Unless perhaps I&#039;m not understanding the particular lens through which you&#039;ll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic.  [http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
*Comments: &lt;br /&gt;
&lt;br /&gt;
Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we&#039;ve had in class have centered around how to best facilitate legal social interactions.  I&#039;m excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I&#039;d be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available. &lt;br /&gt;
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html   [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments: Hi, Alex. Sorry that didn&#039;t answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let&#039;s discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina&#039;s project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don&#039;t know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:&lt;br /&gt;
&lt;br /&gt;
* Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)&lt;br /&gt;
* Prospectus title: What conditions are conducive to successful commons based peer production?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Admittedly, I knew nothing of JCP prior to reading your prospectus, but it&#039;s a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
 &lt;br /&gt;
Comments:&lt;br /&gt;
&lt;br /&gt;
Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
 &lt;br /&gt;
I&#039;m confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?&lt;br /&gt;
&lt;br /&gt;
Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha&#039;s file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don&#039;t believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
*Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi, Alan, thanks a lot for your interest! I can&#039;t find your comments below deinous&#039; prospect, and I would really like to check them. [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I too went in search of Allen&#039;s comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.[[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright).  My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect. &lt;br /&gt;
&lt;br /&gt;
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group.  Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.   &lt;br /&gt;
&lt;br /&gt;
Also, anyone who is working as a group in developing their project can use it to collaborate virtually.  There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, I think using web.alive as a platform for a study group is a great idea.  Perhaps you can make an announcement in class this week. [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title (updated Mar 6): The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- To my Classmates:  Please note that after receiving feedback on my original prospectus I have created an updated version.  My title has changed to The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
&lt;br /&gt;
I hope you will find this more focused and greater compelling.  I will appreciate any additional comments and suggestions based on this new approach. Thank you, Guy --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai Guy!  I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I&#039;m afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Syed, this is a really interesting topic, but I am concerned that it may be too broad.  I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the two.  Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable.  Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about &#039;websites that allow users to decide which company they want to solicit coupons from&#039;  has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)&lt;br /&gt;
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK&lt;br /&gt;
&lt;br /&gt;
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries&#039; different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that. &lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let&#039;s see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the &amp;quot;sight, sound and motion&amp;quot; element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client&#039;s campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I&#039;ll be very curious to read your completed report! Also thought I&#039;d share a helpful resource that summarizes the online video landscape (it&#039;s slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]&lt;br /&gt;
&lt;br /&gt;
Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6113</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6113"/>
		<updated>2011-03-07T04:41:34Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt&#039;s Internet kill switch decision rather ignited people&#039;s movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
-[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]] &lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn&#039;t mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find &#039;clear&#039; answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html&lt;br /&gt;
I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Saam, you&#039;ve picked a fascinating topic.  You&#039;ve identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
  &lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to &amp;quot;observe&amp;quot; as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange&#039;s information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html   or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?   you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer&#039;s perceptions of risks.  If you are interested, I&#039;d be willing to trade notes and help each other shape up the final project.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I&#039;d share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
*Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official &amp;quot;legal findings&amp;quot; of what bloggers can/cannot do vs. b) the unoffical &amp;quot;codes of conduct&amp;quot; being developed in the world of blogging.  I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I&#039;ll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, you&#039;ve nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals.  In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it.  What are they and the users missing out on?  We&#039;ve already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project.  Best, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn&#039;t seem to fit.  It seems like you&#039;d also like to look at how effective they are in increasing the transparency of the political process as well and you&#039;d have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I&#039;d be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.)  All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
*Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment:  This is a really interesting topic!  I hadn&#039;t known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia.  Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation.  I also wonder what this means for Wikipedia.  As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)  &lt;br /&gt;
 &lt;br /&gt;
*Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yu Ri: This is a solid proposal for the project.  I like how you&#039;ve used the course themes as your areas of investigation and how you&#039;ve narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms &amp;amp; governance, membership, limits on expression, and national law.)  If you can do all of those, then that&#039;s great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn&#039;t mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It&#039;s just that they won&#039;t all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I&#039;m not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of &#039;content farming,&#039; and thought I&#039;d reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country&#039;s customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but &#039;&#039;&#039;power&#039;&#039;&#039; for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
I like that you&#039;ve identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don&#039;t really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you&#039;ve identified, which are pretty major sites, in addition to the other examples you&#039;ll be incorporating, will be more than enough data and analysis for a great paper.  Unless perhaps I&#039;m not understanding the particular lens through which you&#039;ll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic.  [http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
*Comments: &lt;br /&gt;
&lt;br /&gt;
Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we&#039;ve had in class have centered around how to best facilitate legal social interactions.  I&#039;m excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I&#039;d be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available. &lt;br /&gt;
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html   [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments: Hi, Alex. Sorry that didn&#039;t answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let&#039;s discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina&#039;s project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don&#039;t know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:&lt;br /&gt;
&lt;br /&gt;
* Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)&lt;br /&gt;
* Prospectus title: What conditions are conducive to successful commons based peer production?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Admittedly, I knew nothing of JCP prior to reading your prospectus, but it&#039;s a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
 &lt;br /&gt;
Comments:&lt;br /&gt;
&lt;br /&gt;
Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
 &lt;br /&gt;
I&#039;m confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?&lt;br /&gt;
&lt;br /&gt;
Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha&#039;s file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don&#039;t believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
*Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi, Alan, thanks a lot for your interest! I can&#039;t find your comments below deinous&#039; prospect, and I would really like to check them. [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I too went in search of Allen&#039;s comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.[[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright).  My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect. &lt;br /&gt;
&lt;br /&gt;
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group.  Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.   &lt;br /&gt;
&lt;br /&gt;
Also, anyone who is working as a group in developing their project can use it to collaborate virtually.  There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, I think using web.alive as a platform for a study group is a great idea.  Perhaps you can make an announcement in class this week. [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title (updated Mar 6): The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- To my Classmates:  Please note that after receiving feedback on my original prospectus I have created an updated version.  My title has changed to The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
&lt;br /&gt;
I hope you will find this more focused and greater compelling.  I will appreciate any additional comments and suggestions based on this new approach. Thank you, Guy --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai Guy!  I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I&#039;m afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Syed, this is a really interesting topic, but I am concerned that it may be too broad.  I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the two.  Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable.  Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about &#039;websites that allow users to decide which company they want to solicit coupons from&#039;  has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)&lt;br /&gt;
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK&lt;br /&gt;
&lt;br /&gt;
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries&#039; different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that. &lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let&#039;s see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the &amp;quot;sight, sound and motion&amp;quot; element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client&#039;s campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I&#039;ll be very curious to read your completed report! Also thought I&#039;d share a helpful resource that summarizes the online video landscape (it&#039;s slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]&lt;br /&gt;
&lt;br /&gt;
Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6112</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=6112"/>
		<updated>2011-03-07T04:40:55Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt&#039;s Internet kill switch decision rather ignited people&#039;s movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
-[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]] &lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn&#039;t mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find &#039;clear&#039; answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html&lt;br /&gt;
I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Saam, you&#039;ve picked a fascinating topic.  You&#039;ve identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
  &lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to &amp;quot;observe&amp;quot; as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange&#039;s information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html   or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?   you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
*Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer&#039;s perceptions of risks.  If you are interested, I&#039;d be willing to trade notes and help each other shape up the final project.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I&#039;d share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
*Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official &amp;quot;legal findings&amp;quot; of what bloggers can/cannot do vs. b) the unoffical &amp;quot;codes of conduct&amp;quot; being developed in the world of blogging.  I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I&#039;ll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, you&#039;ve nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals.  In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it.  What are they and the users missing out on?  We&#039;ve already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project.  Best, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn&#039;t seem to fit.  It seems like you&#039;d also like to look at how effective they are in increasing the transparency of the political process as well and you&#039;d have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I&#039;d be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.)  All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
*Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment:  This is a really interesting topic!  I hadn&#039;t known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia.  Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation.  I also wonder what this means for Wikipedia.  As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)  &lt;br /&gt;
 &lt;br /&gt;
*Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Yu Ri: This is a solid proposal for the project.  I like how you&#039;ve used the course themes as your areas of investigation and how you&#039;ve narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms &amp;amp; governance, membership, limits on expression, and national law.)  If you can do all of those, then that&#039;s great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn&#039;t mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It&#039;s just that they won&#039;t all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I&#039;m not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of &#039;content farming,&#039; and thought I&#039;d reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country&#039;s customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but &#039;&#039;&#039;power&#039;&#039;&#039; for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
I like that you&#039;ve identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don&#039;t really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you&#039;ve identified, which are pretty major sites, in addition to the other examples you&#039;ll be incorporating, will be more than enough data and analysis for a great paper.  Unless perhaps I&#039;m not understanding the particular lens through which you&#039;ll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic.  [http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
*Comments: &lt;br /&gt;
&lt;br /&gt;
Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we&#039;ve had in class have centered around how to best facilitate legal social interactions.  I&#039;m excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I&#039;d be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available. &lt;br /&gt;
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html   [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments: Hi, Alex. Sorry that didn&#039;t answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let&#039;s discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.&lt;br /&gt;
&lt;br /&gt;
Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina&#039;s project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don&#039;t know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:&lt;br /&gt;
&lt;br /&gt;
* Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)&lt;br /&gt;
* Prospectus title: What conditions are conducive to successful commons based peer production?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Admittedly, I knew nothing of JCP prior to reading your prospectus, but it&#039;s a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
 &lt;br /&gt;
Comments:&lt;br /&gt;
&lt;br /&gt;
Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
 &lt;br /&gt;
I&#039;m confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?&lt;br /&gt;
&lt;br /&gt;
Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha&#039;s file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don&#039;t believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
*Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi, Alan, thanks a lot for your interest! I can&#039;t find your comments below deinous&#039; prospect, and I would really like to check them. [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I too went in search of Allen&#039;s comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.[[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright).  My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect. &lt;br /&gt;
&lt;br /&gt;
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group.  Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.   &lt;br /&gt;
&lt;br /&gt;
Also, anyone who is working as a group in developing their project can use it to collaborate virtually.  There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy, I think using web.alive as a platform for a study group is a great idea.  Perhaps you can make an announcement in class this week. [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title (updated Mar 6): The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- To my Classmates:  Please note that after receiving feedback on my original prospectus I have created an updated version.  My title has changed to The Personal Imperative: What is the role of the individual in shaping the future of cyberspace governance? &lt;br /&gt;
&lt;br /&gt;
I hope you will find this more focused and greater compelling.  I will appreciate any additional comments and suggestions based on this new approach. Thank you, Guy --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hai Guy!  I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I&#039;m afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Syed, this is a really interesting topic, but I am concerned that it may be too broad.  I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the two.  Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable.  Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about &#039;websites that allow users to decide which company they want to solicit coupons from&#039;  has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir  ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)&lt;br /&gt;
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK&lt;br /&gt;
&lt;br /&gt;
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries&#039; different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that. &lt;br /&gt;
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let&#039;s see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the &amp;quot;sight, sound and motion&amp;quot; element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client&#039;s campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I&#039;ll be very curious to read your completed report! Also thought I&#039;d share a helpful resource that summarizes the online video landscape (it&#039;s slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]&lt;br /&gt;
&lt;br /&gt;
Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5755</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5755"/>
		<updated>2011-02-22T04:58:16Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5754</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5754"/>
		<updated>2011-02-22T04:57:06Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Elisha Surillo&lt;br /&gt;
Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Assignment_2.doc&amp;diff=5753</id>
		<title>File:Assignment 2.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Assignment_2.doc&amp;diff=5753"/>
		<updated>2011-02-22T04:53:12Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_1_Submissions&amp;diff=5484</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_1_Submissions&amp;diff=5484"/>
		<updated>2011-02-10T19:34:08Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
* Name:&lt;br /&gt;
* Link to rule: (the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Margaret Tolerton [[User: Deinous| Deinous]]&lt;br /&gt;
*Link to rule:http:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Hacktivism&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Anthony Crowe [[User:Acrowe|acrowe]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Protection_policy&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Anonymous_(group)&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 01:04, 10 February 2011 (UTC)&lt;br /&gt;
*Link to Rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to Article: http://en.wikipedia.org/wiki/J-1_visa&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Corey MacDonald&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Fred_Moore_(attorney)&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_-_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Public_good&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:LNLandrum_Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Bank_secrecy&lt;br /&gt;
*Link to report:http://cyber.law.harvard.edu/is2011/Image:Wikipedia_Neutral_Point_of_View.doc &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 20:48, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Windows_Phone_7&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Brian_Smith_-_Ownership_Rule_v2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 18:36, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Great_Firewall_of_China&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment1_Report_Y_Kim.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Susan Jennings: &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Indexed_annuity&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:Assignment_No._1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 00:17, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Internet_censorship#Burma&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Jillian_C_York_-assignment_1.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Guy Clinch --[[User:Gclinch|Gclinch]] 17:24, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Enhanced_9-1-1&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_1_%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Kruglyak: [[User:VladimirK|VladimirK]] 20:27, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:The_rule_you_chose.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Gagan Panjhazari [[User:gpanjhazari|gpanjhazari]] 07:24, 6 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:GP-Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 04:21, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Polling_is_not_a_substitute_for_discussion&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/DSR-570&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment-1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alex Solomon&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brandon A Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 03:52, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/History_of_crossbows&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:BrandonAndrzejAssignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak --[[User:VladimirTrojak|VladimirTrojak]] 13:50, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Telecommunications_data_retention&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_1_wikipedia_report.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Adriana Torii[[User:drifaria]]  &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/IPO&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Wikipediaassignment.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User: singh singh]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Network_neutrality&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Feb._8.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Lorena Abuín [[User:lorenabuin]]&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Sociedad_General_de_Autores_y_Editores&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment_1_-_Lorena_Abu%C3%ADn.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi [[User:syedshirazi]]&lt;br /&gt;
*Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article:http://en.wikipedia.org/wiki/Group_buying&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Shirazi_Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda [[User:earboleda]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Provisional_application&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:HES_Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont [[User:SCL]]&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Harvard_Department_of_Social_Relations&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Lemont_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jessica Sanfilippo [[User:Jsanfilippo|Jsanfilippo]] 14:28, 10 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Long_Tail&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anna Christiana M. C. Machado [[User:Anna]]  &lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Videoconferencing&lt;br /&gt;
*Link to report:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Laura Connell  [[User:Ltconnell|Ltconnell]] 16:53, 10 February 2011 (UTC)&lt;br /&gt;
*Link to Rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to Article: http://en.wikipedia.org/wiki/The_God_Delusion&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Internet_and_Society_Technologies_and_policies_of_control_Assignment_1_Wikipedia.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Michelle C Forelle  [[User:mcforelle|mcforelle]] &lt;br /&gt;
*Link to Rule: http://en.wikipedia.org/wiki/Wikipedia:Polling_is_not_a_substitute_for_discussion&lt;br /&gt;
*Link to Article: http://en.wikipedia.org/wiki/Planned_Parenthood&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assgn1-WikipediaPolicies.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Elisha Surillo&lt;br /&gt;
*Link to Rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to Article: http://en.wikipedia.org/wiki/Rafael_Uribe_Uribe&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment_1.doc&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User:Elishasurillo&amp;diff=5481</id>
		<title>User:Elishasurillo</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User:Elishasurillo&amp;diff=5481"/>
		<updated>2011-02-10T19:28:00Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: New page: Name: Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view Link to article:http://en.wikipedia.org/wiki/Rafael_Uribe_Uribe Link to report:http://cyber.law.harvard.edu/...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Name:&lt;br /&gt;
Link to rule:http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
Link to article:http://en.wikipedia.org/wiki/Rafael_Uribe_Uribe&lt;br /&gt;
Link to report:http://cyber.law.harvard.edu/is2011/Image:Assignment_1.doc&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Assignment_1.doc&amp;diff=5480</id>
		<title>File:Assignment 1.doc</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Assignment_1.doc&amp;diff=5480"/>
		<updated>2011-02-10T19:19:43Z</updated>

		<summary type="html">&lt;p&gt;Elishasurillo: uploaded a new version of &amp;quot;Image:Assignment 1.doc&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Elishasurillo</name></author>
	</entry>
</feed>