<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Harvard212</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Harvard212"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/Special:Contributions/Harvard212"/>
	<updated>2026-04-13T03:05:20Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8676</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8676"/>
		<updated>2012-05-08T23:17:13Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/sites/is2012/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2012/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/sites/is2012/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2012/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2012/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8675</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8675"/>
		<updated>2012-05-08T23:15:34Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2012/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/sites/is2012/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2012/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2012/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Main_Page&amp;diff=8650</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Main_Page&amp;diff=8650"/>
		<updated>2012-05-08T20:08:26Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Feedback */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Internet and Society: Technologies and Politics of Control=&lt;br /&gt;
&#039;&#039;&#039;LSTU E–120 - Harvard Extension School - Spring 2012 - Tuesdays 5:30-7:30 pm EST&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/home/contact Berkman Center for Internet and Society] - 23 Everett Street - Conference room, 2nd floor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This course examines current legal, political, social, and technical struggles for control of the global Internet—and the content and relationships it conveys. The course focuses on the interaction of new technologies and services with emerging models of production, innovation, communication, learning, and civic engagement—looking at both the US and international contexts. Prerequisites: willingness to experiment with new technologies and to participate in class discussions, whether virtually or in person. (4 credits)  &#039;&#039;&#039;[[course overview|continued...]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Syllabus at a glance&#039;&#039;&#039;==&lt;br /&gt;
{| style=&amp;quot;background-color:#CCCCCC;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Jan 24&lt;br /&gt;
| [[Politics and Technology of Control: Introduction]]&lt;br /&gt;
|-&lt;br /&gt;
| Jan 31&lt;br /&gt;
| [[Paradigms for Studying the Internet]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 7&lt;br /&gt;
| [[Regulating Speech Online]]&lt;br /&gt;
| &#039;&#039;(Assignment 1 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 14&lt;br /&gt;
| [[New Economic Models]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 21&lt;br /&gt;
| [[Peer Production and Collaboration]]&lt;br /&gt;
| &#039;&#039;(Assignment 2 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 28&lt;br /&gt;
| [[Copyright in Cyberspace]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 6&lt;br /&gt;
| [[New and Old Media, Participation, and Information]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 13&lt;br /&gt;
| &#039;&#039;No class - Spring Break&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 20&lt;br /&gt;
| [[Collective Action and Decision-making]]&lt;br /&gt;
| &#039;&#039;(Assignment 3 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 27&lt;br /&gt;
| [[Internet and Democracy]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 3&lt;br /&gt;
| [[Control and Code: Privacy Online]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 10&lt;br /&gt;
| [[Internet and Democracy: The Sequel]] &lt;br /&gt;
|-&lt;br /&gt;
| Apr 17&lt;br /&gt;
| [[Internet Infrastructure and Regulation]]&lt;br /&gt;
| &#039;&#039;(Assignment 4 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Apr 24&lt;br /&gt;
| [[The Wikileaks Case]]&lt;br /&gt;
|-&lt;br /&gt;
| May 1&lt;br /&gt;
|&#039;&#039;No class - final project preparation&#039;&#039;&lt;br /&gt;
| &#039;&#039;(Optional [[Extra Credit]] due)&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| May 8 &lt;br /&gt;
|Final class - wrap up and student presentations&lt;br /&gt;
|&#039;&#039;([[Final Project]] due)&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Course Information:&#039;&#039;&#039;&lt;br /&gt;
* [[Class Participation]]&lt;br /&gt;
* [[Grading]]&lt;br /&gt;
* [[Statement on Plagiarism]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Assignments &amp;amp; Projects:&#039;&#039;&#039;&lt;br /&gt;
* [[Assignments]]&lt;br /&gt;
* [[Assigned Readings|Complete List of Assigned Readings]]&lt;br /&gt;
* [[Final Project]]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
* [[Recorded class videos]]&lt;br /&gt;
* [[Powerpoint Slides from Class]]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page How to edit a wiki]&lt;br /&gt;
* [http://www.extension.harvard.edu/resources/writing.jsp Extension School Writing Center]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;External:&#039;&#039;&#039;&lt;br /&gt;
* [[Upcoming Events]]&lt;br /&gt;
* [[In the news]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;People:&#039;&#039;&#039;&lt;br /&gt;
* [[Staff Contact Info]]&lt;br /&gt;
* [[List of User Profiles]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating During Class (Tuesdays 5:30-7:30 pm EST)&#039;&#039;&#039;==&lt;br /&gt;
* Attend in person at the Berkman Center for Internet &amp;amp; Society, 23 Everett St., Second Floor, Cambridge, MA 02138 ([http://cyber.law.harvard.edu/home/contact directions])&lt;br /&gt;
&lt;br /&gt;
You can use Adobe Connect to participate during class time. Visit [https://continuinged.adobeconnect.com/_a931819597/berkman our Adobe Connect site] and log in as guest.&lt;br /&gt;
&lt;br /&gt;
We recommend that, if you would like to speak during class, you use a combination headphone/microphone to participate.  Alternatively, you may use headphones along with your computer&#039;s built-in mic.  As a last resort, you can use your computer&#039;s built-in mic without headphones, but please be aware that this may cause audio issues for both you and the class as a whole.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: When you log in to Adobe Connect, you will log in as a guest.  Please use your full name or a pseudonym that will allow us to identify who you are so we can give you credit for your class participation.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If you have any trouble running Adobe Connect, please go to the [https://continuinged.adobeconnect.com/common/help/en/support/meeting_test.htm support page on Adobe Connect&#039;s site] or click on the &amp;quot;Help&amp;quot; button in the upper right corner of the Connect window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating Asynchronously&#039;&#039;&#039;==&lt;br /&gt;
* The recorded videotapes of the class produced by Harvard Extension School are available [http://cm.dce.harvard.edu/2012/02/22054/publicationListing.shtml here].  Videos are typically available 1-2 days after class.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Contact Information&#039;&#039;&#039;==&lt;br /&gt;
* All questions, comments, etc. should be sent to: [mailto:is2012@cyber.law.harvard.edu is2012@cyber.law.harvard.edu]&lt;br /&gt;
** There are no set office hours; feel free to send an email, and the TAs will respond to it as soon as they can.&lt;br /&gt;
* If you need to contact an instructor or TA individually, please use their personal contact info located on the [[Staff Contact Info]] page.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Office Hours&#039;&#039;&#039;==&lt;br /&gt;
&#039;&#039;&#039;Andy and Rebekah will meet with students in person or via Skype during class time on May 1. Please email [mailto:is2012@cyber.law.harvard.edu is2012@cyber.law.harvard.edu] to sign up for a 15-minute slot.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
We have space for two students during each time slot.&lt;br /&gt;
&lt;br /&gt;
5:30: Alexis // Julia&lt;br /&gt;
&lt;br /&gt;
5:45: Manny // Nick&lt;br /&gt;
&lt;br /&gt;
6:00: Brendan + Quynh // Stefan&lt;br /&gt;
&lt;br /&gt;
6:15: Gregorian // Samantha&lt;br /&gt;
&lt;br /&gt;
6:30: Yerzhan // Jennifer&lt;br /&gt;
&lt;br /&gt;
6:45: John&lt;br /&gt;
&lt;br /&gt;
7:00:&lt;br /&gt;
&lt;br /&gt;
7:15:&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Class Feedback&#039;&#039;&#039;==&lt;br /&gt;
We&#039;d love to hear your thoughts on how class is going!  Please fill out this [https://docs.google.com/spreadsheet/viewform?formkey=dDZpc1l2X2VZQkEwcHRRZ1dDR2QxbHc6MA#gid=0 anonymous poll] to let us know what you think.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REQUEST: Would you please keep the Assigned Readings and lectures live after the class dismisses today? I would like to come back to it again. Thanks! [[User: Harvard212|Harvard212]] 16:08, 8 May 2012 EST&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8646</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8646"/>
		<updated>2012-05-08T19:59:56Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (Later integrated into classroom discussion boards.) &lt;br /&gt;
&#039;&#039;&#039;This is not a complete list.&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039; (Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
As usual Mike&#039;s inputs are harmony seeking. Essentially, it was this class/topic that had me started on the ideas of perception and motivation in discussions (for the earlier assignments). Again, agreeing with classmates that Wikipedia (unfortunately) has been the ignition tool for a lot of disputes to air on public wave length, perhaps continuing education would bring nuances and methodologies that are more productive. Harvard212 15:15, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 20)&#039;&#039;&#039;&lt;br /&gt;
Qdang raised an interesting idea of group intelligence. At the same time, group think can be counter-productive. The question to ask is how to move forward with collective speed and vigor, yet not work the group into isolated silos that are irrelevant to surrounds or reality. Harvard212 15:18, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
The level of expertise and information distributed through these channels of information is a consideration. In addition, cultural norms may also stand against the validity and movement towards adopting thoughts. For instance, a group of trained skeptics may be much more wary of early information that has not be substantiated. Whereas another group that relates to each other on a more communicative or trust-base dynamics may adopt &#039;truths&#039; on the simple notion that one or two group members have accepted these &#039;facts&#039; as &#039;truths&#039;. I almost feel like to be ethically solid, blogs should have disclaimers and opinion makers should remind their audience, they are voicing their opinion -- just to maintain neutrality and fairness of information filtering. Might get cumbersome though. Harvard212 15:23, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
This is such an interwoven topic discussion that can&#039;t be had by looking in isolation. The infrastructure of the net essentially can be a powerful tool for communication (and if security is heightened and closed to &#039;speaking parties&#039;). It could launch the economy and policy/negotiations at greater speed (and possibly accuracy). [Accuracy because the elimination of voice messaging and possible misinterpretation can be avoid -- although written text can have the same weaknesses.] To look at the situation through meeker lens, I would suggest that each policy culture first truly understand the existing and physical culture/philosophy of their people. Surely, each country would differ vastly from the other and that would effect the desirability of outcome for each nation. What would be hard to reconcile (without education) is how the infrastructure changes from culture to culture (the case of American vs Chinese net culture of today). Essentially, protests and disputes of inequality may in fact be an argument of Chinese people saying give us a choice, but don&#039;t limit (or prohibit). In that same light, the American view point of the Great Fire Wall could be seen as oppression. I do find some hilarity in reading the piece about democracy coming out as profanity on Chinese google. Not sure if that was included in this list of readings. Harvard212 15:40, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. Harvard212 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
No class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;br /&gt;
Last updated 8 May 2012.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8645</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8645"/>
		<updated>2012-05-08T19:58:15Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (Later integrated into classroom discussion boards.) &lt;br /&gt;
&#039;&#039;&#039;This is not a complete list.&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
As usual Mike&#039;s inputs are harmony seeking. Essentially, it was this class/topic that had me started on the ideas of perception and motivation in discussions (for the earlier assignments). Again, agreeing with classmates that Wikipedia (unfortunately) has been the ignition tool for a lot of disputes to air on public wave length, perhaps continuing education would bring nuances and methodologies that are more productive. Harvard212 15:15, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 20)&#039;&#039;&#039;&lt;br /&gt;
Qdang raised an interesting idea of group intelligence. At the same time, group think can be counter-productive. The question to ask is how to move forward with collective speed and vigor, yet not work the group into isolated silos that are irrelevant to surrounds or reality. Harvard212 15:18, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
The level of expertise and information distributed through these channels of information is a consideration. In addition, cultural norms may also stand against the validity and movement towards adopting thoughts. For instance, a group of trained skeptics may be much more wary of early information that has not be substantiated. Whereas another group that relates to each other on a more communicative or trust-base dynamics may adopt &#039;truths&#039; on the simple notion that one or two group members have accepted these &#039;facts&#039; as &#039;truths&#039;. I almost feel like to be ethically solid, blogs should have disclaimers and opinion makers should remind their audience, they are voicing their opinion -- just to maintain neutrality and fairness of information filtering. Might get cumbersome though. Harvard212 15:23, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
This is such an interwoven topic discussion that can&#039;t be had by looking in isolation. The infrastructure of the net essentially can be a powerful tool for communication (and if security is heightened and closed to &#039;speaking parties&#039;). It could launch the economy and policy/negotiations at greater speed (and possibly accuracy). [Accuracy because the elimination of voice messaging and possible misinterpretation can be avoid -- although written text can have the same weaknesses.] To look at the situation through meeker lens, I would suggest that each policy culture first truly understand the existing and physical culture/philosophy of their people. Surely, each country would differ vastly from the other and that would effect the desirability of outcome for each nation. What would be hard to reconcile (without education) is how the infrastructure changes from culture to culture (the case of American vs Chinese net culture of today). Essentially, protests and disputes of inequality may in fact be an argument of Chinese people saying give us a choice, but don&#039;t limit (or prohibit). In that same light, the American view point of the Great Fire Wall could be seen as oppression. I do find some hilarity in reading the piece about democracy coming out as profanity on Chinese google. Not sure if that was included in this list of readings. Harvard212 15:40, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. Harvard212 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
No class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;br /&gt;
Last updated 8 May 2012.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8644</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8644"/>
		<updated>2012-05-08T19:55:35Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (later integrated into classroom discussion boards. This is not a complete list.)&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
As usual Mike&#039;s inputs are harmony seeking. Essentially, it was this class/topic that had me started on the ideas of perception and motivation in discussions (for the earlier assignments). Again, agreeing with classmates that Wikipedia (unfortunately) has been the ignition tool for a lot of disputes to air on public wave length, perhaps continuing education would bring nuances and methodologies that are more productive. Harvard212 15:15, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 20)&#039;&#039;&#039;&lt;br /&gt;
Qdang raised an interesting idea of group intelligence. At the same time, group think can be counter-productive. The question to ask is how to move forward with collective speed and vigor, yet not work the group into isolated silos that are irrelevant to surrounds or reality. Harvard212 15:18, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
The level of expertise and information distributed through these channels of information is a consideration. In addition, cultural norms may also stand against the validity and movement towards adopting thoughts. For instance, a group of trained skeptics may be much more wary of early information that has not be substantiated. Whereas another group that relates to each other on a more communicative or trust-base dynamics may adopt &#039;truths&#039; on the simple notion that one or two group members have accepted these &#039;facts&#039; as &#039;truths&#039;. I almost feel like to be ethically solid, blogs should have disclaimers and opinion makers should remind their audience, they are voicing their opinion -- just to maintain neutrality and fairness of information filtering. Might get cumbersome though. Harvard212 15:23, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
This is such an interwoven topic discussion that can&#039;t be had by looking in isolation. The infrastructure of the net essentially can be a powerful tool for communication (and if security is heightened and closed to &#039;speaking parties&#039;). It could launch the economy and policy/negotiations at greater speed (and possibly accuracy). [Accuracy because the elimination of voice messaging and possible misinterpretation can be avoid -- although written text can have the same weaknesses.] To look at the situation through meeker lens, I would suggest that each policy culture first truly understand the existing and physical culture/philosophy of their people. Surely, each country would differ vastly from the other and that would effect the desirability of outcome for each nation. What would be hard to reconcile (without education) is how the infrastructure changes from culture to culture (the case of American vs Chinese net culture of today). Essentially, protests and disputes of inequality may in fact be an argument of Chinese people saying give us a choice, but don&#039;t limit (or prohibit). In that same light, the American view point of the Great Fire Wall could be seen as oppression. I do find some hilarity in reading the piece about democracy coming out as profanity on Chinese google. Not sure if that was included in this list of readings. Harvard212 15:40, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. Harvard212 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
No class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8643</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8643"/>
		<updated>2012-05-08T19:52:31Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (later integrated into classroom discussion boards. This is not a complete list.)&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
As usual Mike&#039;s inputs are harmony seeking. Essentially, it was this class/topic that had me started on the ideas of perception and motivation in discussions (for the earlier assignments). Again, agreeing with classmates that Wikipedia (unfortunately) has been the ignition tool for a lot of disputes to air on public wave length, perhaps continuing education would bring nuances and methodologies that are more productive. Harvard212 15:15, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 20)&#039;&#039;&#039;&lt;br /&gt;
Qdang raised an interesting idea of group intelligence. At the same time, group think can be counter-productive. The question to ask is how to move forward with collective speed and vigor, yet not work the group into isolated silos that are irrelevant to surrounds or reality. Harvard212 15:18, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
The level of expertise and information distributed through these channels of information is a consideration. In addition, cultural norms may also stand against the validity and movement towards adopting thoughts. For instance, a group of trained skeptics may be much more wary of early information that has not be substantiated. Whereas another group that relates to each other on a more communicative or trust-base dynamics may adopt &#039;truths&#039; on the simple notion that one or two group members have accepted these &#039;facts&#039; as &#039;truths&#039;. I almost feel like to be ethically solid, blogs should have disclaimers and opinion makers should remind their audience, they are voicing their opinion -- just to maintain neutrality and fairness of information filtering. Might get cumbersome though. Harvard212 15:23, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. Harvard212 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
No class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8642</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8642"/>
		<updated>2012-05-08T19:50:03Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (later integrated into classroom discussion boards. This is not a complete list.)&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
As usual Mike&#039;s inputs are harmony seeking. Essentially, it was this class/topic that had me started on the ideas of perception and motivation in discussions (for the earlier assignments). Again, agreeing with classmates that Wikipedia (unfortunately) has been the ignition tool for a lot of disputes to air on public wave length, perhaps continuing education would bring nuances and methodologies that are more productive. Harvard212 15:15, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. Harvard212 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
No class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8641</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8641"/>
		<updated>2012-05-08T19:48:38Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (later integrated into classroom discussion boards. This is not a complete list.)&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. Harvard212 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
No class.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=The_Wikileaks_Case&amp;diff=8640</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=The_Wikileaks_Case&amp;diff=8640"/>
		<updated>2012-05-08T19:46:57Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2012/sites/is2012/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  Let&#039;s also remember DSK at the IMF was also used very close to this.  So it&#039;s a technique that works, but shouldn&#039;t be overused because the public may catch on.  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Sure, soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about a well funded, and well organized military force.  It is somewhat similar to letting everyone know that there is a guard standing on the street with a gun.  If the patrol man is armed and is doing his/her job, then who cares if everyone knows that they are standing there in public.  But, this is really just silly.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aditkowsky:  I&#039;m sure it is different around the globe.  However, in the case of WikiLeaks we see that there are ways around things.  For instance, even though Julian Assange was in Europe his Swiss bank account was revoked.  I&#039;m sure that had something to do with international pressure.  Again, we are seeing the convergence between on-line and off-line worlds.  So, I really think that this is interesting.  I remember a few years ago there was an American journalist in North Korea who was detained who was eventually released.  So, I agree that journalists do need to be protected.  [[User:Just Johnny|Just Johnny]] 00:52, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Mike:  These are some interesting questions.  When I can&#039;t sleep, here&#039;s what I usually do: I turn the pillow over.  It&#039;s a winner every time.  I am looking forward to class to see what Saint Rob has to say about the WikiLeaks case.  [[User:Just Johnny|Just Johnny]] 00:57, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I forget which class we brought up the discussion on Anonymity and having multiple accounts on Facebook (one for work and one for personal). I remember my initial response was perplexity over the duality. But I am growing in appreciation of the anonymity because the net is so accessible, and not out of wanting disguise rather, a necessity to work in solitude and quiet without too many prejudgment (or even input). Because some thoughts and things working it&#039;s way through its embryonic stage needs to be honored with that space and calm in order for necessary improvements and input to actually sink in (with meaning). It seems like much of what we have been grappling together as a class and in our discussion are philosophically rooted on how we perceive a quality state of mind/life on and off cyber space. [[User: Harvard212|Harvard212]] 15:46, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_Infrastructure_and_Regulation&amp;diff=8639</id>
		<title>Internet Infrastructure and Regulation</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_Infrastructure_and_Regulation&amp;diff=8639"/>
		<updated>2012-05-08T19:40:18Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 17&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will cover the politics, policy, economics and technology of deploying broadband infrastructure.  We will look at the year-old US National Broadband Plan and the Berkman Center review of international experiences in broadband policy. Additionally, we will look at the substance and politics of the net neutrality debate. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012-04-17.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment 4: Rough Draft and Bonus AV Credit|Assignment 4 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Executive Summary of the National Broadband Plan [http://www.broadband.gov/plan/executive-summary/]&lt;br /&gt;
&lt;br /&gt;
* National Broadband Plan Commission Meeting: National Purposes Update, February 18th 2010 [http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-296353A1.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world, Berkman Center [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Berkman_Center_Broadband_Final_Report-C1_15Feb2010.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Net Neutrality 101 [http://www.savetheinternet.com/frequently-asked-questions?gclid=CKbclcK65KcCFULf4AodaxmJCg]&lt;br /&gt;
&lt;br /&gt;
* More Confusion about Internet Freedom [http://techliberation.com/2011/03/01/more-confusion-about-internet-freedom/]&lt;br /&gt;
&lt;br /&gt;
* Hands Off the Internet [http://www.youtube.com/watch?v=tlhSbJYxOnc]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.fcc.gov The Federal Communications Commission]&lt;br /&gt;
* [http://www.broadband.gov National Broadband Plan]&lt;br /&gt;
* [http://www.openinternet.gov OpenInternet.gov]&lt;br /&gt;
* [http://www.ietf.org The Internet Engineering Task Force (IETF)]&lt;br /&gt;
* [http://www.icann.org The Internet Corporation for Assigned Names and Numbers]&lt;br /&gt;
* [http://www.fcc.gov/Reports/tcom1996.txt The Telecommunications Act of 1996]&lt;br /&gt;
* [http://wireless.fcc.gov/auctions/default.htm?job=auctions_home  FCC - Wireless Spectrum Auctions]&lt;br /&gt;
* [http://www.isp-planet.com/cplanet/tech/2004/prime_letter_040301_powell.html Powell&#039;s Four Freedoms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 17: Internet Infrastructure and Regulation&lt;br /&gt;
&lt;br /&gt;
In order for the lines of communication remain open, the rule of net neutrality clearly states that ISPs may not discriminate between different kinds of web applications and content.  This is a good thing, because if there were a preference leaning towards one or the other we could see more of a monopoly system developing.  So net neutrality allows the Internet to continue to function.  &lt;br /&gt;
&lt;br /&gt;
“Net Neutrality is the reason the Internet has driven on-line economic innovation, democratic participation and free speech. It protects our right to use any equipment, content, application or service without interference from the network provider. With Net Neutrality, the network&#039;s only job is to move data”  Even as we are working within the world of ideas, we are also dealing with a very brick and mortar world to use it in.  &lt;br /&gt;
&lt;br /&gt;
It&#039;s no wonder that major corporations want to get rid of net neutrality.  Without it then monopolies can take over.  So, since net neutrality is part of the architecture then consumers are protected from fee hikes, and so on and so forth.  I don&#039;t know about you, but I think that there is a bit of a problem with norms within North America when it comes to broadband or cable prices.  Although, I think that net neutrality is one thing that makes it affordable, even though it is still quite overpriced.  &lt;br /&gt;
&lt;br /&gt;
I think that we should keep in mind that in free and open societies we would want to keep net neutrality a part of the Internet.  Without net neutrality corporations are then destabilizing the balance of democracies, and overthrowing governments.  Another interesting thing about this is that giant corporations have already taken over the ISP business and set the prices.  &lt;br /&gt;
&lt;br /&gt;
So, what I&#039;m wondering is this: is Internet access elated directly to the strength of a nation?  Simply because Korea or Japan has a more free and open web, that is also cheaper does not mean that living in Japan or Korea is any better than in the United States or Canada.  So I find that this may correlate to a general climate.  And even though the Internet may be more reasonably priced there, I would really rather be somewhere else.  &lt;br /&gt;
&lt;br /&gt;
I find that the problem with things like petitions is that many people don&#039;t bother signing them.  Many of the people who are just getting on the Internet today, who don&#039;t even know how to program a VCR, usually don&#039;t care how fast their Internet as long as they can get on and surf around.  Now, when their bill suddenly increases, they may become perturbed, but still not enough to actually do anything about it.  Getting many people to understand the relationship of net neutrality, or signing a petition, is a very idea oriented activity.  So, many of the working class, or middle class, do not reasonably understand how it affects their lives.  Unfortunately, so long as the working and middle classes continue to be sedated with distractions then monopolies shall continue to reign.  &lt;br /&gt;
&lt;br /&gt;
So, looking at it from one angle says that we are more liberated by the Internet.  This may be true.  However, how we get it is a bit contradictory  to this notion.  If we are working within a monopoly system, then I have to ask: are we really free?  Even though everything may be all fine and dandy, there is something a bit perverse but also unsettling about this.  &lt;br /&gt;
&lt;br /&gt;
So, is net neutrality the first amendment of our time?  Perhaps yes – perhaps no.  However, when we examine the case of the United States, we do see that social norms change over time as does the architecture.  &lt;br /&gt;
&lt;br /&gt;
So is the Internet really free then?  It does seem like a double standard.  I think that most people like to think that they are free to do as they please, to make their own decisions without the encumbering  voice of the government swooping in around and coercing them to do something just to continue business.  Then we are inevitably getting into societal questions.  Questions more about what kind of society do we want to live in?  A free and open society where individuals have the right to form their own opinions, or one where their thoughts are dictated to them along with an itinerary for what they are going to do for th rest of their lives.  Somehow, though, I think that this would be highly anti-American.  So, we want to make sure that net neutrality is keep part of the architecture that is the Internet.  Without it, it becomes no longer the Internet as we know it today.  &lt;br /&gt;
&lt;br /&gt;
I think what is interesting is that we are seeing competition as a good and healthy activity towards progress amongst democratic societies.  For example, Europe and North America comparing benchmarks is a way for either side of the coin to make improvements.  And that is a good thing for everyone.  &lt;br /&gt;
&lt;br /&gt;
However, what I also think is somewhat challenging about this idea of a seamless Internet, is that again, we are going back to this double edged concept that we examined above.  And we must continue to ask ourselves of our freedom.  This is because we are also venturing into more of a socialist type of a concept in some sense.  I think that when we speak of the United States, or other democratic areas, we want to keep this notion of freedom alive.  So, depending on our ISP and removing our freedom of choice would be a bad thing.  One the one hand we need the service, but then we are getting into questions around public good and so on and so forth.  &lt;br /&gt;
&lt;br /&gt;
As is clearly stated in Next Generation Connectivity: “High capacity networks are&lt;br /&gt;
seen as strategic infrastructure, intended to contribute to high and sustainable economic growth and to&lt;br /&gt;
core aspects of human development.”&lt;br /&gt;
&lt;br /&gt;
So, what we are getting at here is an economic question tied into the framework of a society.  It is no wonder, then, that regions such as China, and Korea, have implemented cutting edge technology and invested in a future built architecture.  China, for example, is in fact competing with democratic societies.  &lt;br /&gt;
&lt;br /&gt;
However, back again to this idea that even if there is ultra fast Internet that is reasonably priced does not mean that I would want to live there, or that the quality of life is going to be directly affected.  This is because the Internet is not the be all and end all, but a means towards that something whatever it may be.  It is the underlying information structure that eventually connects to the brick and mortar world.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting article in Slate that&#039;s basically a profile of &amp;quot;_why&amp;quot; (a well known programmer/sort of folk hero in that online community before he disappeared off the web one day) but also goes into the problem of of the &amp;quot;Little Coder&#039;s Predicament&amp;quot; quite a bit since that was one of the main things _why was interested in.  That predicament is the lack of accessibility to the code behind the devices we use so often; it is incredibly easy and intuitive to play Angry Birds on your phone or use Excel on your laptop, but hard (and getting harder) to learn how to access and manipulate the code that creates and alters those sorts of programs.  &lt;br /&gt;
&lt;br /&gt;
This is an issue that has come up quite a bit in class, and I thought the author does a good job of explaining some neat tools for the layman to use to get into programming.  The article is a fun read and touches on a lot of issues of public v. private online, identity online, the importance of being a creator and not just a consumer, etc. Thought you all might enjoy!&lt;br /&gt;
&lt;br /&gt;
http://www.slate.com/articles/technology/technology/2012/03/ruby_ruby_on_rails_and__why_the_disappearance_of_one_of_the_world_s_most_beloved_computer_programmers_.html&lt;br /&gt;
-[[User:AlexLE|AlexLE]] 22:37, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  Cool article.  [[User:Just Johnny|Just Johnny]] 00:31, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Off topic for this week&#039;s class but I saw this article hit the Washington Post and thought it was an interesting read for those interested in Copyright and internet sales.http://www.washingtonpost.com/business/thai-students-money-making-effort-at-center-of-supreme-court-copyright-case/2012/04/16/gIQAJHqQLT_story.html?hpid=z3 &lt;br /&gt;
--[[User:Hds5|Hds5]] 18:21, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Hds5: This is really ridiculous.  When I was a child, it was a good thing for students to go to school.  Students do need to pay for their education.  So, denying this individual of that education is just wrong and goes against everything that education is meant to stand for.  What the student does outside of the campus really has nothing to do with the school.  Although, I do understand how this relates to the socialist realm of the future of the Internet.  If everyone is aware of what everyone is doing at all time, while I am sitting my living room and watching television, or eating a chocolate bar outside of my home in my driveway, then we are beginning to move away from what is fundamentally a matter of freedom.  [[User:Just Johnny|Just Johnny]] 00:31, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This week&#039;s readings brings up an interesting point on national safety. Government agencies other organizations could stand to do a better job notifying the public via the internet when national disasters arise. In times of disaster, notifying the public via internet alerts seems like a very efficient way to spread information quickly. -- [[ --[[User:Szakuto|Szakuto]] 11:57, 17 April 2012 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
@Szakuto: Websites such as Twitter are useful in getting information out there in a somewhat more organic way than mainstream newspapers.  And governments leave things mostly up to the media to &amp;quot;put it out there&amp;quot; because there&#039;s simply way too much room for lawsuits to happen.  Although, I think that this is an interesting point.  Thanks for bringing it up.  I think that the framework in pace is generally good, and doesn&#039;t necessarily need an authoritarian voice to take over all media, because we&#039;ve got a loose framework in place that is generally connected and streams through information quite quickly.  But, wait, there is mostly just a few.  And, then it comes back to the question of quality of life.  Be happy.  Watch America&#039;s Funniest Home Video&#039;s.  [[User:Just Johnny|Just Johnny]] 00:31, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This week’s articles were like always very interesting and thought-stimulating. I really enjoyed reading the first article concerning broadband and the US government’s plan back in 2009 to make it accessible to all Americans. Even though many criticized the fact that at the time 100 million Americans didn’t have broadband, we must not forget the huge improvements that took place in the last two decades. I personally grew up with no broadband and with a computer which would run Windows 3.1 so from the ‘80s until now I personally see a huge improvement and I believe it is just a matter of time that the whole world will have broadband and at that point a newer technology will become available. The second article was by far the most fascinating. I had recently watched a documentary on technological advances and healthcare, and how easy it would be to do most things via internet like sending results and interacting with doctors. For what concerns education, I believe we have started making some good progress only recently and not very many institutions offer online learning. Homeland Security is definitely the most important aspect which we should invest in, in my opinion and we are far behind many of our European and Asian colleagues. The third article is exactly what I was talking about in terms of future technological advancements and it explains both plans and practices of countries other than the United States. The article on Net Neutrality was also pretty interesting and it perfectly explained its purpose in a simplistic way, which is appreciated by someone like myself who isn’t exactly a computer expert. The article on Internet Freedom has a very amusing title and I must say it is perfect for that topic. I still think it is very difficult to talk about internet freedom and government intrusion and I believe we will still be talking about this in the near future. The YouTube video about Hands Off the Internet was again in my opinion an amusing and simple way of portraying and conveying a message and I believe this to be a good way of doing so. Overall Governmental intrusion is and will be a serious and durable debate in the future. [[User:Emanuele|Emanuele]] 13:36, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele: As is stated directly in the &amp;lt;b&amp;gt;National Broadband Plan&amp;lt;/b&amp;gt; &amp;quot;The U.S. ranks in the bottom half among developed countries on every metric used to measure health IT adoption&amp;quot; (National Broadband Plan, 9).  So, I do not see this as a form of government control, more so as it is a way to improve service towards citizens.  Improving access to broadband could assist in creating &amp;quot;the conditions for broader adoption and innovation&amp;quot; (National Broadband Plan, 11).  What we are talking about is a general framework, a collective climate.  And health care should naturally be a part of that framework.  [[User:Just Johnny|Just Johnny]] 00:41, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The articles for this week certainly brings to light the relationship between the government and broadband providers, and government’s particular interests in expanding and regulating broadband. I found Thierer’s article on these regulations to be interesting, particularly when he indicates that “we shouldn’t allow the cyber-collectivists to sell us their version of “freedom” in which markets are instead constantly reshaped through incessant regulatory interventions.” It is always nice to see this age-old political argument spill over into broadband management. Certainly the government takes the internet seriously and I think that their overlying effort to make broadband accessible to everyone is noble back in 2009. As the internet has shaped our lives in many different ways, it would be hard to imagine having no access to the internet. I do agree with the point that the internet has certainly improved by leaps and bounds over the years.--[[User:Jimmyh|Jimmyh]] 16:51, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  Yes, the Internet has improved in the last decade.  Which is exactly why net neutrality is so important to maintaining what we now have.  I think the cyber-collectivists are doing many interesting things.  But, most of all what they are fighting for is for everyone to be able to access the web.  Imagine a world in which only those who can afford high speed Internet can get on it.  Then these people must work to pay for their Internet, and then we are talking about the collapse of the middle class, and a much larger working class.  This is not good because ti can overthrow the balance of things to come.  And all for what?  Paved paradise and put up a parking lot?  Sure, the Internet can improve, but in what direction should it evolve?  Freedom of use or control of access?  [[User:Just Johnny|Just Johnny]] 00:57, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I agree with Emanuel, the Hands Off video and the Net Neutrality website explain in a very simple way what’s going on with the Internet; I enjoyed both of them. Also I think it is true that the Corporations and “Save the Internet” campaign want the government to take control of the Internet. The main net neutrality issues then are who should control the Internet: the people, or the government? And who should pay: the big corporations, or us?&lt;br /&gt;
&lt;br /&gt;
The articles were also very interesting and touched important themes. The Broadband Plan article mentions that the broadband plan will improve the healthcare system, the energy and environment, and the education system. I think we have all experienced the benefits of improvements on technology, not too far our distance class is possible due to technology enhancement. As the article states, this creates economic opportunity, and government performance and civic engagement. With regard to the former, I like the idea that it would make the government more open and transparent! And with the latter that it will increase public safety and homeland security. In this way it is very important the broadband for mobile devices.  Also it will ensure patients to have control over their healthcare data; I specially like this one because one day I went to have some health tests in my country and within a few days I could access them via the Internet.  &lt;br /&gt;
&lt;br /&gt;
The presentation on the Broadband Plan was very specific in showing the gaps that prevent the most efficient usage of the broadband. It also provided a framework of recommendations for each area in which broadband is used, and the potential savings achieved. Also, I like the idea that better technology will allow us to help prevent traffic accidents and potentially save energy. I think we still have a lot of work to do but in the long-term I’m positive these improvements will be possible.&lt;br /&gt;
&lt;br /&gt;
Finally, in the Berkam Center article, it is very interesting the approach used, in which learning from other countries like Canada, Switzerland, New Zealand, France, Italy, The Netherlands, Sweden, Japan and South Korea was the center of the study. What I most liked from this article was the idea that &#039;&#039;the next generation broadband user experience is built upon not only the deployment of high capacity networks, but also the creation of ubiquitous seamless connectivity&#039;&#039;. This is because we are now experiencing more availability of connectivity, but quality, speed and more places with Wi-Fi are still matters of improvement.[[User:Fabiancelisj|Fabiancelisj]] 17:10, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj: The video was interesting, but didn&#039;t really say anything.  What it said to me was that the big corporations are taking over, and here&#039;s a quick video just to remind all you youngsters over there.  Just silly.  The youth of now really have a lot more power than those in power tend to think.  Who will take over their positions and allow things to continue to operate?  I just have to laugh at this kind of &amp;quot;there there dear&amp;quot; hype.  The Internet is safe. &amp;lt;b&amp;gt;America’s plan Executive summary&amp;lt;/b&amp;gt; clearly states that: &amp;quot;Broadband networks only create value to consumers and businesses when they are used in conjunction with broadband-capable devices to deliver useful applications and content. To fulfill Congress’s mandate, the plan seeks to ensure that the entire broadband ecosystem—networks, devices, content and applications—is healthy.&amp;quot;  So, we are moving forward, not backwards.  And, no, the Internet is not going away as this executive plan clearly states. [[User:Just Johnny|Just Johnny]] 00:57, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really enjoyed reading the Net Neutrality website, simple, clean and easy to understand. Net Neutrality topic has been an interest to me, especially after Comcast declared that their new Xfinity Xbox app will not count toward your 250GB/month cap. This is one example of how ISP are about to control the internet content. While they are not exactly controlling it now, counting every app on xbox against your cap except their own xfinity app is exact definition of net neutrality, thus driving consumer demand into their own product as more and more people are not willing to reach their monthly cap or go above it. Recently, Netflix CEO spoke against Comcast on this issue: http://blogs.wsj.com/digits/2012/04/16/netflix-ceos-comcast-complaints-draw-in-fcc/?mod=google_news_blog&lt;br /&gt;
&lt;br /&gt;
Hands Off video was also interesting to watch with simple explanations for those who are yet to read up on these issues. Also, first article on National Broadband Plan is very interesting indeed, with some interesting plans that US wants to implement but I think the plan is a bit too optimistic. Providing every home with extremely fast broadband is not only hard to achieve but also hard to imagine that ISPs won&#039;t have to say anything against it. ISPs are always finding a way to get the most money by providing the slowest speed possible and I&#039;m not too sure they will be very happy with a plan like that. While the article states that US is far behind many other advanced countries in terms of broadband speed, lets not forget that US is far bigger country with much bigger population than let&#039;s say South Korea so providing same kind of speed is not very easy. Also, ISPs in US also have a bigger word in terms of broadband in US, when compared to ISPs in other countries. While the plan laid out in National Broadband Plan is great, it is also hard to achieve in currect time with current ISPs and laws. &lt;br /&gt;
[[User:Erzhik|Erzhik]] 18:20, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  Interesting that you mention Netflix.  Of course, sites such as Netflix and Hulu are taking up a lot of bandwidth, which can sort of cause a problem.  So, I believe this goes back to the upgrading of the architecture. We have the government stepping things up, and then we&#039;ve got the corporations busy.  So, I think that this is relevant to our readings.  Our devices are becoming more controlled, or locked.  Look at Apple hardware.  Everyone loves Apple, but Apple has actually started a very bad trend, along with now Kindle, and so on.  They are trying to come up with more ways to control consumers.  The monthly download limit isn&#039;t just a hardware and network limitation, but a way to accumulate profits.  [[User:Just Johnny|Just Johnny]] 01:20, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Agree with comment directly above. First thing that comes to mind when reading about net neutrality were this week&#039;s quotes by Netflix CEO Reed Hastings on Comcast internet data throttling. I think actions like those occuring under Comcast give more control to certain companies in power and take away power from the consumer. Is this an anti-competitive practice? Will it lead to worse actions? Would like to hear other opinions on this.&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 18:17, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong: Sure.  Everything is tied together nicely, depending on these interconnected factors.  Sort of like the Internet, really.  [[User:Just Johnny|Just Johnny]] 01:20, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think a big threat to net neutrality has to do with cell phone providers. With more and more people accessing the internet from their iPhones, blackberries, etc., cell phone companies can severely limit web content. [http://www.guardian.co.uk/technology/2012/apr/17/walled-gardens-facebook-apple-censors?utm_source=News%40Law+subscribers&amp;amp;utm_campaign=56605a3311-News_Law_Tuesday_April_17_20124_17_2012&amp;amp;utm_medium=email Zittrain has a lot to say about smartphone censorship]. I second Brendan&#039;s questions. My opinion is that it could be anti-competitive. Thoughts? [[User:Aberg|Aberg]] 18:55, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg: Yeah, I think you touched a nerve there Aberg.  Cell phone companies want people to have data plans.  These devices can limit what content is accessed.  And these cell phone providers can block what users access.  [[User:Just Johnny|Just Johnny]] 01:20, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aberg, I had a different experience with smart phone web access. I think it is interesting that when I attempted to post on Facebook the “Save the Internet” link by clicking the “share” button from the link provided in the class readings, I was asked to close the tab on Internet Explorer. I tried sharing the same link using Google Chrome and also failed. When I searched for the “Save the Internet” group on Facebook, I was unable to open the link to the group. Perhaps, this is due to blocking by Verizon internet service when I tried to access the links from my laptop. However, I did not encounter these problems when I tried to access the same links using my phone with T-Mobile’s wireless internet service. [[User:Qdang|Qdang]] 19:53, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found that the article, &amp;quot;More Confusion About Internet Freedom,&amp;quot; raised a particularly poignant question: &amp;quot;The question is how much faith we should place in central planners, as opposed to evolutionary market forces, to solve that problem.&amp;quot;  By &amp;quot;that problem,&amp;quot; the article is referring to &amp;quot;freedom for the government to plan more and for policymakers to more closely monitor and control the Internet economy.&amp;quot; Indeed it a difficult line to draw when many entrepreneurs can be hadnsomely compensated for creating Internet innovations that can capture valuable user data and demographic information.  On the other hand, it is also difficult to see how large governments will practice the self-restraint not to overregulate the Internet.  Technology is rapidly evolving and government and legislation must keep up, but it cannot come at the expense of expression and free markets.  [[User:Cfleming27|Cfleming27]] 19:58, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  Yes, I think that progress should be taken into account to make way for improvements.  However, I also think that the government should not get too heavily involved.  Governments need to focus on what their purpose is: to serve the citizens.  I think that the executive summary is quite interesting in that general improvements are being put into place, but I also think that the government does need to step back and mind its own business from time to time.  [[User:Just Johnny|Just Johnny]] 01:20, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It seems like this question has come up before, or even many times in history:  Is a good to trade freedom for security?  I think it was one of the founding fathers of the U.S. who said “no!”  If not, it could have been the founding father of somewhere, in other words, a wise person.  The problem is not that security and some control is bad, but rather that it is humans and a human system who manipulate the situation, and there are definitely ill-intentioned people who are prone to manipulate the system.  In that case, the protection is to not put the system in any one central authority’s hands.  People who work in positions of power are often well intentioned, but also misguided.  It’s not always some stereotyped sinister fiend who is planning to do us all wrong, say like, Boris and Natasha in the Rocky and Bullwinkle cartoon.  Often it is the “nice guy” with the kids next door, the ones who go to the same school as yours.  People can become misguided by a false sense of patriotism, and play right into being used by others who want them to think they are doing the right thing.  There are obviously some people up to something, or there wouldn’t continue to be attempts to pass a law here, sneak a little unknown regulation in there, or otherwise fool the public.  When anyone says anything, they are decried as cracked “conspiracy theorists” and dangerous.  I think it’s a spin off of what Lessig referred to as the bovinity principle.  Can there exist some form of democracy, capitalism, and socialism, all mixed together, in just the right proportions, where governmental control could be appropriately exerted in truly the best interests of all, when needed, yet, with checks and balances?  It think that was the general idea, when the U.S. started.[[User:Mike|Mike]] 13:00, 18 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Mike: Well, I honestly think that there is a lot of bad information out there.  And unless we put it out there in the first place, people would never have that idea to begin with.  Take crime dramas on television.  Every day there is some crime drama on television.  Now, is that on there to deter people from committing actions, or is it there to give them the idea that this is the world that we live in?  I tend to think that it is part of this general climate that is taking shape.  Now if we replaced all of those crime dramas with Barney we would start to see a radically different way of thinking.  So, I think it&#039;s interesting that you mention Rock and Bullwinkle.  I tend to think that everything that is part of the cultural milieu is there for a reason.  And it is really very much the same whether you are in a communist society or here.  The difference is merely in our perceptions that we are given.  When I look at the Executive Summary, I see a document that is essentially controlling the framework in place.  So, beyond mere aesthetics -- what&#039;s the difference between the sides here?  [[User:Just Johnny|Just Johnny]] 01:20, 21 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
This is such an interwoven topic discussion that can&#039;t be had by looking in isolation. The infrastructure of the net essentially can be a powerful tool for communication (and if security is heightened and closed to &#039;speaking parties&#039;). It could launch the economy and policy/negotiations at greater speed (and possibly accuracy). [Accuracy because the elimination of voice messaging and possible misinterpretation can be avoid -- although written text can have the same weaknesses.] To look at the situation through meeker lens, I would suggest that each policy culture first truly understand the existing and physical culture/philosophy of their people. Surely, each country would differ vastly from the other and that would effect the desirability of outcome for each nation. What would be hard to reconcile (without education) is how the infrastructure changes from culture to culture (the case of American vs Chinese net culture of today). Essentially, protests and disputes of inequality may in fact be an argument of Chinese people saying give us a choice, but don&#039;t limit (or prohibit). In that same light, the American view point of the Great Fire Wall could be seen as oppression. I do find some hilarity in reading the piece about democracy coming out as profanity on Chinese google. Not sure if that was included in this list of readings. [[User: Harvard212|Harvard212]] 15:40, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8638</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8638"/>
		<updated>2012-05-08T19:31:34Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj: This is a very interesting idea you present here: &amp;quot;The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.&amp;quot;  I remember the (previous) in-class discussion and the breadth of the class spreading quite vast in terms of perception and desires of privacy. What you state here, in effect, touches on the same individual sense of privacy on a macro-socio/political plane. In particular, it is interesting to note that Chinese pride of using home-grown products (often perceived as &amp;quot;fakes&amp;quot;) by foreigners. Some things are complete knock-offs though! I am still learning about the balance of transparency and opacity. [[User: Harvard212|Harvard212]] 15:31, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could be grounds for harassment and damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  I really think it comes down to pull.  Many of these countries, such as Egypt/Syria/Iran simply do not have the resources to compete with superpowers such as the United States, or emerging superpowers such as China, or Russia.  So, essentially, I think what it comes down to is whether or not these nations have the pull to compete.  What I think is interesting is how take downs are really going to work as laws adapt across the globe.  There is a lot of tug and pull from China, or Russia, for example.  So even if we have people in Egypt using Twitter, we are still going to have to deal with the authorities clamping down on people for posting a Tweet.  [[User:Just Johnny|Just Johnny]] 23:26, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  Interesting article.  I think that governments and corporations ideally try to cooperate.  Although, I still am not sure whether or not petitions actually make a difference – or, if they are like voting?  Anyways, always good to keep people engaged in the idea of the process – like starting a piggy bank for kids.  [[User:Just Johnny|Just Johnny]] 23:31, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg:  Interesting point about the tunneling.  I&#039;m sure there&#039;s a way for freedom to ring, even in China.  So it&#039;s good to know that users have that option.  I&#039;m sure much of the media is streamlined everywhere else in China, though.  So it is a very complicated situation when companies such as Google are providing information to repressive governments.  And somewhat dangerous.  [[User:Just Johnny|Just Johnny]] 23:36, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Mike:  Yes, it&#039;s true.  Everybody wants to rule the world.  [[User:Just Johnny|Just Johnny]] 23:38, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=8637</id>
		<title>Collective Action and Decision-making</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Collective_Action_and_Decision-making&amp;diff=8637"/>
		<updated>2012-05-08T19:23:31Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;March 20&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Mass collaboration and the aggregation of information enable potentially profound changes in business and politics. In this class, we will compare and contrast the transformations in economic life and collective decision-making processes brought on the information revolution.  The discussions will also explore the role of open information systems on business and the scope for greater transparency and participation in government, politics and public life.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012-03-20.pdf Slides]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* James Surowiecki, [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html Wisdom of Crowds (excerpt)]&lt;br /&gt;
**[http://www.nytimes.com/2004/05/22/books/review/0523books-mclemee.html?ex=1400644800&amp;amp;en=43bc95eb638bfed2&amp;amp;ei=5007&amp;amp;partner=USERLAND NYT Review]&lt;br /&gt;
* [http://ethanzuckerman.com/blog/?p=1125 Ethan Zuckerman&#039;s blog review of Infotopia] Great summary of the issues in the book.&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CCYQFjAA&amp;amp;url=http%3A%2F%2Fciteseer.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.59.9009%26rep%3Drep1%26type%3Dpdf&amp;amp;ei=IHRnT8TLOe-00QHH5YSHCA&amp;amp;usg=AFQjCNERO0GwXWc7DLWZwSaqnjjjMTWMYg Divided They Blog] - a paper showing trackbacks between political blogs, mentioned by Ethan Zuckerman in his review of Cass Sunstein&#039;s Infotopia&lt;br /&gt;
* On a similar topic: [http://webuse.org/p/a22/ Cross-Ideological Discussions among Conservative and Liberal Bloggers], by Eszter Hargittai, et al.&lt;br /&gt;
**Abstract: With the increasing spread of information technologies and their potential to filter content, some have argued that people will abandon the reading of dissenting political opinions in favor of material that is closely aligned with their own ideological position. We test this theory empirically by analyzing both quantitatively and qualitatively Web links among the writings of top conservative and liberal bloggers. Given our use of novel methods, we discuss in detail our sampling and data collection methodologies. We find that widely read political bloggers are much more likely to link to others who share their political views. However, we find no increase in this pattern over time. We also analyze the content of the links and find that while many of the links are based on straw-man arguments, bloggers across the political spectrum also address each others writing substantively, both in agreement and disagreement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
March 20: Collective Action and Decision-making&lt;br /&gt;
&lt;br /&gt;
James Surowiecki&#039;s excerpt on the wisdom of crowds presents some really compelling ideas.  &lt;br /&gt;
&lt;br /&gt;
It would seem that crowds are more likely to arrive at collective decisions that are closer to the hole than individuals would be to do on the whole.  For the most part, this makes me think of how crowds are manipulated through mass consumerism, media and so forth.  The collective mind, so to speak, is plugged in and then guided towards certain suggestions.  They are told continually to purchase something, or to do something.  So we are part of a slow conditioning process as is witnessed through orchestrated mass consumerism.  This seems to be a beneficial thing for the perpetuation of free market exchange, as many western societies have not had to resort to communism.  Who wants to be a millionaire when money flows through the collective already?  In this sense, we are collectively rich as a society.  Whatever a citizen may need is available to them if they want it.  Just as the long tail profits, the newness is there when you need it.  &lt;br /&gt;
&lt;br /&gt;
I don&#039;t know if I completely agree with Sunstein or Surowiecki&#039;s suggestions entirely, though.  I think that in certain situations leaders develop and then it simply becomes a game of following the leader for the group.  And that isn&#039;t necessarily a bad thing.  I think that, collectively society is becoming a much richer place to engage in and is not just exposing someone to something they might not otherwise know about.  And I witness this shift primarily across generations with knowledge differences.  For example, something I may assume is common within pop culture knowledge is unheard of by my mother and her generation.  &lt;br /&gt;
&lt;br /&gt;
I do think that Habermas adds an interesting idea in that it is the quality of the idea which is more important than the individual.  To a certain degree, this is mostly how I conduct myself when people ask me my opinion about a certain topic.  I will contend for an idea.  I’m not interested in what I believe in, more so than the idea.  Primarily, as a student I am concerned with exploring ideas, and then there is the style placed on top of that – which is what I think many people have a hard time discerning.  Sometimes I will play the devil’s advocate on a subject of debate, because I understand that an idea is not about me – I am just a transporter of that knowledge, which has nothing to do with me personally.  For example, most of my work here at Harvard has been based around ideas, not my personal beliefs.  I could care less what I actually believe about a subject.  What I am concerned about is ideas.  Personally, I have no personal beliefs about what it is I&#039;m working on.  I work on a project, using the idea as the base and then overlay a style.  Aesthetics are really a lot of fun to play around with.  That is not to say that I am not interested in generating my own original ideas.  However, as a student my role is primarily to learn the material.  Although, I do think that ideas do not always become common knowledge amongst the collective.  This is because crowds can be influenced by the leader.  In the case of mass media, MTV will dictate the idea, and then teenagers will simply follow it.  Then individuals fit into simple categorical groupings.  &lt;br /&gt;
&lt;br /&gt;
Zuckerman&#039;s comments on Republic.com seem to suggest that collective decision making, through mass consumerism, is a good thing in that it makes people feel more connected.  &lt;br /&gt;
&lt;br /&gt;
Here is an interesting quote relating to this: “Sunstein seizes on this possibility and offers a strong caution: if we can choose our own media, it’s possible we will use this power to insulate ourselves in an information cocoon, where we systematically avoid dissenting voices and have increasingly less common experience with our fellow citizens. Sunstein worries that a society of these isolated individuals will have difficulty participating in a democracy because citizens need a) some exposure to materials they would not have sought out and b) some common experience as a precursor for joint decisionmaking.”  &lt;br /&gt;
&lt;br /&gt;
What I also think is interesting here is this notion of increasingly broadened scope of exchange of information.  Whether it is through blogs, or controlled means such as Wikipedia, what we are seeing is a collective that is becoming seemingly more connected and more able than before.  &lt;br /&gt;
&lt;br /&gt;
So this is interesting how both Zuckerman and Surowiecki seem to go back to this metaphor of a collective consensus on the number of jelly beans in a jar.  It’s like asking how many neurons are in a person’s head that collectively allow that person to make a decision.  Collective decision making is like this.  &lt;br /&gt;
&lt;br /&gt;
The only thing that I think might interfere would be over-socialization and government intervention with this form of trade that Hayek seems to touch on.  And this is also interesting, because as people become more connected and able they are more likely to form more direct democracies.  For example, there are protesters who use cell phones and websites to announce when and where a protest will take place.  So I think that governments will want to make sure than even protesters remain within the architecture that is already in place.  As everyone knows, too many protesters demanding a state of anarchy could potentially overthrow a state just as easily as when monarchies were overthrown throughout most of Europe and Russia.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:11, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The question whether a group will take a better  or a worse solution is an interesting one in the context of Internet, social media, etc. I am thinking also in terms of real world with presidential election or death penalty. Is the group decision the best? How the process is different from online decision making? As for Internet, I think we can do more than Amazone, Facebook, that we did not explore all the capacities of mass decision or decision making. I am wondering about a world republic...--[[User:Sab|Sab]] 22:43, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the Johnson’s experiment of the maze, I like the idea that the group had discovered the optimal solution, and it would be interesting to demonstrate that it applies to the real world and not only in laboratory settings and classrooms. I think it would be even more interesting to analyze the relation with the phenomenon of the social networks, in which the mass decision and participation primes over a handful of people making what they think is better for the society. I think this experiment has more sense than the Victorian notions that humanity, as a group, is just a dumb herd. I don’t think this is a correct statement, nevertheless experiments like Sustein’s in which was demonstrated that people find it difficult to defy the will of a group, and may polarize to avoid interpersonal conflict are facts that should be carefully thought. The question is if in fact this applies also for Internet communities, in which there’s no personal contact and people feel freer to express whatever they want without fearing opposition and being different. In any case, what I like more in the Ethan Zuckerman Blog review of Infotopia is that in some cases the predictions are proven wrong, like the Sunstein’s predictions that if we can choose our own media we will isolate ourselves in an information cocoon. Therefore, deliberation could be proven to be an effective way to accumulate information.[[User:Fabiancelisj|Fabiancelisj]] 20:25, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Even though group intelligence is more difficult to measure than individual intelligence, I do believe that a crowd can outsmart a genius. Imagine for example, if a very intelligent physicist is isolated and only surrounded by other physicists, he/she maybe outstanding in this field, but is limited to what he/she can do. However, when allowed to collaborate with cell and molecular biologists, chemists, mechanical and electrical engineers, medical doctors, veterinarians, etc… a physicist learns to conduct cell mechanics, biophysics, molecular and biochemical experiments, and has the potential to solve health problems, such as coming up with a drug to relax airway smooth muscle cells during an asthma attack. When a group of diverse individuals collaborate, they can solve problems that they otherwise cannot solve individually. The internet has allowed this collaboration to increase globally through technologies such as Skype and E-mail. In some instances, group intelligence depends on its structure and dynamics. For example, Megan Garber, from Nieman Lab, reported that MIT researchers found that “[g]roup intelligence is correlated…with emotional intelligence, http://www.niemanlab.org/2011/05/mit-management-professor-tom-malone-on-collective-intelligence-and-the-genetic-structure-of-groups/. The researchers concluded that a group is more intelligent and is more likely to solve difficult problems when there are more women in it. Simply placing very smart individuals together in a group does not make a group smarter.&lt;br /&gt;
When I think of a very intelligent individual or genius, I think of my lab principal investigator, who has the ability to lead his lab members and make important decisions. However, he would have not made an informed decision without hearing the lab members deliberate. [[User:Qdang|Qdang]] 15:52, 19 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Qdang raised an interesting idea of group intelligence. At the same time, group think can be counter-productive. The question to ask is how to move forward with collective speed and vigor, yet not work the group into isolated silos that are irrelevant to surrounds or reality. [[User: Harvard212|Harvard212]] 15:18, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
I like the connection between the reality of crowd intelligence in &amp;quot;Who Wants to Be a Millionaire&amp;quot; or marble-jar guessing and the concept of blog aggregates and online communities.  It seems like this is a good argument against the dangers of cocooning at some levels.  While a given blog/website community is likely there because they all subscribe to a certain set of interests or views, at least you know that if you&#039;re going to a big one you&#039;re probably getting the very best and most cohesive expression of those concepts.  It may not make them right, but it adds value to them as a tool for educating yourself.  Aggregates also will provide a balance to the problem that 1 or 2 of every group of 50 people will actually be more accurate than the group at guessing the number of marbles... but only in that one specific trial.  If you follow one blogger religiously you are susceptible to their blind spots and moments where they were simply wrong.  If you follow a collection of sites and blogs you will be exposed to the correct answers to most questions; whether you realize which is the correct answer is up to you haha. [[User:AlexLE|AlexLE]] 14:04, 19 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The level of expertise and information distributed through these channels of information is a consideration. In addition, cultural norms may also stand against the validity and movement towards adopting thoughts. For instance, a group of trained skeptics may be much more wary of early information that has not be substantiated. Whereas another group that relates to each other on a more communicative or trust-base dynamics may adopt &#039;truths&#039; on the simple notion that one or two group members have accepted these &#039;facts&#039; as &#039;truths&#039;. I almost feel like to be ethically solid, blogs should have disclaimers and opinion makers should remind their audience, they are voicing their opinion -- just to maintain neutrality and fairness of information filtering. Might get cumbersome though. [[User: Harvard212|Harvard212]] 15:23, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
The articles that we had to read for this week were very interesting to me. I really enjoyed how the first article focused on statistics regarding various experiments and “Who wants to be a millionaire”, a program which I personally loved watching. Even though I respect and find very interesting the point made regarding the percentages being higher and closer to the correct answer for groups and less accurate for individuals, I don’t agree. Math and Statistics aren’t my field and I must admit that I’m not very good at any of them but I feel off the top of my head that it is quite obvious that a group would obtain a higher and more accurate score than an individual because the general population or “average Joe” is likely to get fairly close to the right answer which can be higher or lower but of course adding all the higher scores to the lower ones, I find it to be mathematically obvious that we shall obtain an approximately correct average score. Therefore this being said I find the “Condorcet Jury Theorem”, mentioned in the third article to pretty much respect my personal opinion on the subject. In conclusion I very much enjoyed these articles and I find that in some way these theories emphasizing on group work and force are exactly what Democracy is about. [[User:Emanuele|Emanuele]] 18:12, 19 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Collective action affects us everyday (or at least those of us that read news, shop, or blog online). For instance, if you use Reddit, most likely you&#039;re reading posts on the front page that were up-voted--a form of collective action. Zuckerman&#039;s article also points out &amp;quot;Amazon&#039;s collaborative filtering recs and Google&#039;s page rank algorithm.&amp;quot; This had a huge effect on business (as we read in the long tail article, for example).&lt;br /&gt;
&lt;br /&gt;
Sunstein has a valid point with ideological cocoons, but does seem flawed. I agree with Zuckerman and the others who labeled his idea as &amp;quot;alarmist.&amp;quot; While it&#039;s entirely possible (as &amp;quot;Divided they Blog&amp;quot; suggests) for people to seek out news and sites with similar ideologies and have their beliefs continually reinforced, that is not necessarily the way most people &#039;read the news.&#039; Greater exposure to new ideas or newspapers/news from far away, like the readings said, is a benefit that far outweighs the risk of people forming an ideological cocoon.  [[User:Aberg|Aberg]] 18:24, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I realize we&#039;ll probably dig deeper into the topics of collective action and decision-making in the &amp;quot;Internet and Democracy&amp;quot; classes but I&#039;d love to have a longer reading list on this topic. If anyone has any additional recommendations, please share. Thanks! [[User:Aditkowsky|Aditkowsky]] 13:17, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;There is a certain notion of rationality that starts from the assumption that each of us is, in essence, a monad designed to maximize profit and pleasure.&amp;quot; For me this quote by Scott McLemee (NYT Review) summed up the concept of collective action and decision-making communities have on the internet. This brings up the concept of &#039;public good&#039; again and reminds me of why Wiki remains so successful - we, as an internet society/community, are acting collectively to produce the most &#039;public good&#039;. --[[User:Hds5|Hds5]] 21:04, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wonder what the limitation is of this type of input from a group compared to a crowd. There will be a limitation if this is applied towards democracy when the overall good of the people may not affect the desired motives of the individual voter. Overall in the general studies referenced in the article it&#039;s not too surprising these results occurred but I was surprised at the accuracy of the averages. I will research limitations of these practices (or downfalls) and see what effects they may have on the digital world and it&#039;s users. I&#039;m guessing the advantages outweigh the negatives, but imagine there must be some. [[User:Brendanlong|Brendanlong]] 21:15, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
That is very compelling evidence for group intelligence, but I see it play out in my own work.  I usually work in groups, and most decisions have to be taken by counsel and vote, because we’ve found it’s safer that way.  We’ve also noticed that when the group is together to discuss something, it is important to listen, to pay attention to opposing opinions, and that sometimes there is one person who has “bucked the tide” of the majority opinion, but that person turns out to be right.  We later realized that the majority had influenced itself so that each individual was not thinking for himself or herself.&lt;br /&gt;
Applied to the internet, the mathematics of the mean having a good chance to be right, makes sense, and because not everyone knows each other on the internet, and no one is looking at you, people might feel more free to express what they really think because they can be anonymous, avoiding the peer pressure effect.  The majority has a better chance to be right.[[User:Mike|Mike]] 21:46, 20 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Finding knowledge through the collective crowd is an interesting question to pose given that there will usually be polarizing figures in any collective argument who will sway the &amp;quot;middle&amp;quot; (a group which should constitute the heavy majority of the crowd and which does not automatically invoke polarizing arguments) and which leads to mixed results much of the time (since they do not constitute anything more than a sophistication of passionate arguments). I agree with Sunstein that public debates and this polarization often leads to a distortion of the &amp;quot;middle&amp;quot; consensus (which is quite evident in the political sphere). The direction of constructive collective knowledge must come through a middle-of-the-road movement in which the polarized voices are either dampened in respect to their numbers, or received with a certain level of skepticism that comes with some challenge from the opposing side of the argument during its reception. Collective knowledge must only come from those who can separate a charismatic or loud argument from the polarized voices which can dictate the debate through techniques common to winning all types of debates...--[[User:Jimmyh|Jimmyh]] 00:20, 21 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The article, &amp;quot;The Wisdom of Crowds&#039;: Problem Solving Is a Team Sport&amp;quot;, painted an excellent picture of the contrast between certain views that crowds may have &amp;quot;mob mentality&amp;quot; or may be sources of true wisdom.  Crowdsourcing is clearly and excellent resource for gaining data, extracting innovative ideas and for engaging the public at large for collaborative projects. All of which may yield greater results than certain activities or projects performed in isolation. Others question, however, the limits of crowdsourcing regarding certain projects or sectors. Foreign policy and politics have become recent areas for debate as to whether crowd sourcing would be effective and reliable.  In certain instances, some argue that crowd sourcing would add great value in that the population, and not a select few, would influence policy and action.  In other instances, like those which require in depth knwoledge of highly sensitive data, others have argued that crowdsourcing may be unreliable because crowds may not have the level of understanding of complex issues.  Time will tell as to how our generation best harnesses the power of crowdsourcing so that it may be best utilized to provide reliable, effective input for policy. [[User:Cfleming27|Cfleming27]] 11:33, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=8636</id>
		<title>Peer Production and Collaboration</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=8636"/>
		<updated>2012-05-08T19:15:41Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;February 21&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The free software movement is one example of a trend towards distributed volunteer networks of individuals collaborating on collective projects that were formerly the domain of the for-profit private sector.  In this session, we explore how far such peer production can go in redefining the economic and social structures of modern society. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/ISFebruary21.pdf Download this week&#039;s slides (PDF)]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_2:_Prospectus|Assignment 2]] due&lt;br /&gt;
&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
* Yochai Benkler, [http://mitworld.mit.edu/play/394/ News, Information and the Wealth of Networks] (watch from 8:32 to 26:07)&lt;br /&gt;
* Joseph Reagle, [http://reagle.org/joseph/2010/06/reagle-nrhm-special-collab-norms.html ”Be Nice”: Wikipedia Norms for Supportive Communication]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
Joseph Reagle&#039;s book: [http://reagle.org/joseph/2010/gfc/ Good Faith Collaboration: The Culture of Wikipedia]&lt;br /&gt;
&lt;br /&gt;
The following audio streams from NPR may be interesting:&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4986453 Wikipedia, Open Source and the Future of the Web]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=6051103 Wikipedia Wins Users and Critics by Jenny Lawton]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4506421 Wikipedia&#039;s Growth Comes with Concerns by Laura Sydell]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
February 21: Peer Production and Collaboration&lt;br /&gt;
&lt;br /&gt;
I like the Yocha&#039;s Idea that &amp;quot;what we see now is the emergence of social sharing and exchange as a major additional modality of production.&amp;quot; He says this has created new competition, like the PSP to the recording industry, the Free Open Source Software to Microsoft, Wikipedia to Grollier and Encarta, and Skype to Telecomms. I like these new opportunities that have been arising and personally think they are unstopable. As he said, at the beginning nobody would have thought that an the collaboration of many users could create an encyclopedia, but now we have Wikipedia as another source of information, differing from Britannica in scope but with the same aims, to spread knowledge. Indeed, Wikipedia is a source of controversy itself, but opinions are diverse and personally i liked the one in the NPR program from a participant who said that he relies on Wikipedia more than another encyclopedia because more people participate in the building of the articles.[[User:Fabiancelisj|Fabiancelisj]] 22:33, 21 February 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
I think it was rather interesting how Uricchio described Benkler and Jenkins as having reciprocity in that they come from two different directions (culturally or socially), but occupy the same terrain.  Can&#039;t wait to hear more in class. [[User:Mvalerio|Mvalerio]] 21:11, 21 February 2012 (UTC)   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
February 21: Peer Production and Collaboration&lt;br /&gt;
&lt;br /&gt;
Perhaps what is most interesting about this modality of social plurality is that we are seeing new modes of essentially ritualistic human behavior.  These processes are seemingly age old.  At its core, we have an interesting problem of copying and corporate control, yet is something inherently human in design.  There is a need to share and communicate, to have a cup of coffee with friends, yet is not easily controlled by a monetary system.  So we are seeing a fundamental changing of the architecture underneath.  This is what Benkler is notably commenting on with the rise of social media – flickr, youtube, and so forth, all add to the new dynamic of on the scene exchange of information.  We wonder, why do we even need an authority news source to look to?  The wealth, so it seems, then becomes within networks.  What is also interesting about this is that we are changing the dynamics of class structure, making the playing fields more equal so to speak.  There are still things that can be enjoyed without the use of a monetary system – food, exercise/sport, and … the internet.  A stomping ground for the middle class to continue to generate ideas.  And, what is interesting is how this ties into Reagle&#039;s &amp;quot;be nice&amp;quot; article.  Sure, we have more ways to communicate, but we should also not stray from our human principles simply because we are averting the system of corporate control.  There are ethics and codes within normal human contact, as is seen in everyday social situations.  These codes are established norms within a community.  Although, here we see these becoming merged with the architecture in place by Wikipedia.  In this instance we have Wikipedia dictating these rules to us, which are basically agreed on values established in society.  So, what is the difference  here?  Well, we now have a set of rules being dictated to us.  Just as we look to the &amp;quot;news authority.&amp;quot;  There is a shift in self-sustainability, to simply deferring to authority figures.  So this is interesting in how these unopposed norms interact within these differing architectural frameworks.  &lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:09, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great discussion with Yochai Benkler on economics of social production and politics.  The Diebold example is a perfect indication of showing how this system of the “structured web” is effective in &amp;quot;offering visibility to more people&amp;quot; and easier for each &amp;quot;individual and small group to speak and be heard.&amp;quot;  Has anyone by chance seen the HBO documentary, &#039;&#039;Hacking Democracy&#039;&#039;?  If not, check it out ([[http://www.wanttoknow.info/electionsvideodocumentary]]), which gives a more in depth and detailed insight into the investigation Bev Harris and her associate Kathleen Wynne (Black Box Voting, Inc.) did to expose security weaknesses in electronic voting systems.  Also demonstrates the &amp;quot;battle with institutional ecology&amp;quot; and how Benkler indicated the law usually &amp;quot;favors the incumbents and institutions” which is what you see happening in Harris’ case.  Imagine if Harris would have started this investigation now with the increasing amount of online power that stems from individuals in the social sphere?  Or for example, what we’ve recently seen with the power of public influence on legislation like SOPA/PIPA or with the Komen debacle.  Could Harris have gone further or have state/county officials act much quicker?  Possibly.  I do agree and believe that it is easier to make a change or create these &#039;&#039;movements&#039;&#039; where “networked” individuals are banding together to act for various reasons be it politics, social injustice, etc and as Benkler puts it now on a “global, not only local&amp;quot; scale. [[User:JennLopez|JennLopez]] 23:30, 20 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The wiki norms laid out in &amp;quot;Be Nice&amp;quot; can, as Reagle states, foster better conflict resolution offline. I also agree with Reagle&#039;s stance that the sometimes caustic environment/arguments on wikipedia are &amp;quot;necessary to properly appreciate the scope of the community and its culture.&amp;quot; When there are millions of people hailing from a wild variety of social and cultural norms in one online arena, these disputes are to be expected. However, this somewhat negative aspect of peer production and collaboration is the same thing that makes it so great -- so many different people with a variety of skills and insights. [[User:Aberg|Aberg]] 22:12, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Very impressive points by Benkler, great summation.  I&#039;m very curious about his idea that even further expansion of the sorts of things that are peer sourced will continue inexorably.  I agree with him, but I can&#039;t see how that will work in some cases where the goods are too integral to a specific industry or company&#039;s survival.  It may be well and good that the online group can produce wiki entries or sift through pictures of Mars, but what happens when the task that needs to be completed is one that only a small handful of extremely highly trained experts can do?  What about heart surgery techniques, or certain complex nuclear systems?  The examples I make aren&#039;t perfect but I hope the point is clear.  Those experts need a large framework both to be created and supported as they work (through the large cost of schooling, training, getting experience, sustaining work with expensive materials, etc.)  Whether the companies pay that or whether the &amp;quot;future experts&amp;quot; pay it themselves with the promise of a high-paying job that will recoup their expenses when they become full experts, that is still a very very expensive system.  Can it exist in a world where there is so much less profit attached, and where the other functions that company used to perform and fill its coffers with are now totally outsourced to the online crowd?  I know this is in some ways a rehashing of the classic &amp;quot;Innovation is Good and Can Happen Free!! vs. You Have To Allow Patents and Profit or Innovation Dies!!&amp;quot; argument, but I&#039;m curious about the ripple effect that can have.  ([[User:AlexLE|AlexLE]] 01:58, 21 February 2012 (UTC))&lt;br /&gt;
&lt;br /&gt;
I found Yochai Benkler’s speech to be very interesting, especially when he talked about individuals’ contribution to information in the BBC example that he gave. Another interesting aspect was that concerning democracy and the open sources of information.  For what concerns the Reagle article on Wikipedia, I found it to be very true. I have noticed on various occasions that disputes are very common over Wikipedia articles and they can be characterized by a variety of reasons going from differing personal ideals to politics and many other issues. The point is that people should focus more on the reason for which Wikipedia was created and put aside hatred and personal issues/debates and cooperate to make Wikipedia a better source of learning and not a forum where an online battle should take place. I really enjoyed the statement regarding conflict as being “Addictive as cocaine” and totally agree with it since human beings are attracted to conflict to a certain extent. I also agree with Reagle when he states that “The relative “anarchy” of wiki culture, the malleability of Wikipedia content, the pseudonymity of contributors, and its consensus-based decision-making make Wikipedia particularly vulnerable to such strategic action.” [[User:Emanuele|Emanuele]] 15:51, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found one portion of Reagle&#039;s &amp;quot;Be Nice&amp;quot; article to be particularly interesting: his contrasting of the challenges (disputes, etc.) created by online interaction against the positives of collaboration (discussion boards and other collaborative tools).  In particular, some of the elements of a positive prosocial community are (i) &amp;quot;behavior that is intentional, voluntary and of benefit to others&amp;quot;; (ii) relationships that rely upon &amp;quot;trust, empathy, and reciprocity&amp;quot;; and (iii) community character that is facilitated by &amp;quot;cultural norms&amp;quot; that enhance the well-being of a community. In my opinion, the first two items are fairly easy to define and can be measured when assessing online activity.  The third, however, &amp;quot;cultural norms&amp;quot;, seems too amorphous to define.  What cultural norms exist in a new environment that attracts users from all over the globe from different cultures and age groups?  I dont believe there is a starting point for cultural norms within Wikipeia to begin to assess how one may have veered off from those established norms. [[User:Cfleming27|Cfleming27]] 19:00, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was quite fond of Benkler&#039;s analysis of peer collaboration.  It certainly is present today, but I&#039;m curious to know what he thinks the depth of it could be.  It seems as though he leaves it open-ended to allow for peer collaboration on multiple levels, with no end in sight.  I could see this in highly specialized fields as well, including open heart surgery.  While those that can perform at such a level are few and far between, that does not preclude that they would be able to network and learn from each other.  In this sense it seems as though there is no field that could not be touched by peer collaborations.  &lt;br /&gt;
&lt;br /&gt;
I do wish, however, that Benkler would have spoken more about Linux and the emerging network that this enables.  He did show the graphic, but it was fleeting; Linux is much deeper than just digging into the pockets of Microsoft.  Being an operating system, it enables everything that a computer, microchip, or any kind of electronic device is able to do.  Through peer collaboration it is able to supersede the proprietary systems such as Windows or Macintosh.  What is great about this is that every part of the system can benefit from the collaboration, to the point where it can become greater than any other system because it has enabled so many options that were either limited on other machines for financial/profit or control purposes or were not incorporated because they had not been considered as a viable option for the OS.  Furthermore, being a system that is open to modification, it also enables integration of other devices and electronics into that system that are not enabled in other operating systems.  &lt;br /&gt;
&lt;br /&gt;
But the drawback to these systems are the individuals or groups that differ in opinion, much like Reagle spoke of.  Since group collaboration is seems to be the greatest emerging economy, not only will it enable more through the long tail, but it will also have more detractors because of the long tail.  But it seems as though these are weeded out eventually through either fracturing, or through stifling.  However, with the mass advent of the Cloud, as well as multiple devices completely incorporated with one another, it seems as though it will only be a matter of time.  I&#039;m very curious, though, to know how this will play out with legal norms of the institutionalized ecology, since those laws and regulations exist for tangible objects in specific areas, rather than virtual objects in an international arena.[[User:Nthib|Nthib]] 19:22, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27 I believe that it may be possible to define Reagle&#039;s &amp;quot;cultural norms.&amp;quot; Reagle acknowledges that users of Wikipedia have developed a set of norms, constellation of values, and common lingo. A basic norm or value that exists without boundaries and can be translated into any common lingo in any language is the concept of the “golden rule.” Reagle quotes Bowles &amp;amp; Gintis on page 3, “cultural traits governing actions” that “enhances the average level of well-being.” Can cultural norms be defined as something that enhances the average level of well-being similar to the golden rule? [[User:Hds5]] 15:29, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
When reading the article about Wikipedia I was amazed at the volume of various articles and guidelines that sought to maintain a neutral point of view, how to avoid disputes and engage in a collaborative effort. I initially wrote my assignment 1 on the NPOV and looking back didn&#039;t realize how many other guidelines that can be found by wandering down that path to become fully informed. In my article I outlined that one of the drawbacks to Wikipedia is in the quality of tools used to edit the pages. I noted while they are generally easy to use for editing bodies of main text, it can be difficult to edit something more complicated like a table which contains cells, where you have to rely on the ability to analyze raw code. I liken this to the ongoing disputes that exist regarding cooperation and NPOV. As good as it currently is, Wikipedia needs to become more accessible to additional would-be users. This includes not only improving the code editing tools but also the ways in which NPOV is maintained. I believe the best way to do this is to improve systems that make it easier for people to collaborate on disputes which impede the desired end result (peer production!) is the generally accepted neutral truth. Much like a wizard is used to create a letter or resume in MS Word (for this purpose a very simple example of automation), automating the way that people engage in disputes with more accessible tools that make it easier for people to recognize points of contention and address them in a collaborative effort will improve the end product and please critics. [[User:Brendanlong|Brendanlong]] 20:40, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I found the contrasts between Benkler and the “Be Nice” article interesting. Benkler believes that the internet has led to more social “sharing, collaboration,” and “exchange,” such as on discussion boards and Wikipedia. The “Be Nice” article emphasized how disputes on Wikipedia can be counter-productive. Since Wikipedia is open for editing by anyone, disputes can hard to avoid since people can be defensive and hold grudges, while others enjoy instigating disputes, such as “vandals” and “trolls.” I find it interesting and agree that disputing is addicting, since some people with big egos do not like to admit they are wrong. [[User:Qdang|Qdang]] 21:09, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
What Benkler is promoting and encouraging, I really rejoice for.  There is so much opportunity for new things to happen in the world.  I am interested in social movements for peace and a more harmonious society.  Sometimes those things get suffocated under a blanket of commercial interests.  I used to play in a band in the 60&#039;s.  There was a short window of time when it seemed commercial interests did not weigh so heavily on what sort of message came out in the music, but it was very short-lived.  After that, commercial interests were so obviously what dictated what got recorded, and so whatever new fad was invented by the marketing experts was pretty much what came out on the radio.  Today, it is possible to promote many causes through the openings we have to self-publish music, art, or literature.  New ideas can be spread through a variety of means without commercial interests or often, even governments being able to stop it.  It really is a new day in many ways, but I wonder how long this freedom will last.  I don&#039;t think it will last, as there are already attempts to stifle it.  I love studying about this, though, and want to learn how to make the most of it while we can.[[User:Mike|Mike]] 22:49, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
As usual Mike&#039;s inputs are harmony seeking. Essentially, it was this class/topic that had me started on the ideas of perception and motivation in discussions (for the earlier assignments). Again, agreeing with classmates that Wikipedia (unfortunately) has been the ignition tool for a lot of disputes to air on public wave length, perhaps continuing education would bring nuances and methodologies that are more productive. [[User: Harvard212|Harvard212]] 15:15, 8 May 2012 EST&lt;br /&gt;
&lt;br /&gt;
Benkler&#039;s lecture highlights a collaborative spirit in which the collective community perpetuates innovation through organized common-interest highways. Since the internet is vast and the offline individual is limited to his or her personal mission and expertise without the strength of collective innovation, an online users&#039; access to the expertise and inspiration of thousands of people who are willing to share, coupled by access to materials and innovations that are accessible through the Common&#039;s system, inspires each of the individuals to create and collaborate. In many cases, as in the blackbox example, this internet collective may not produce music or technology but the spread of information, which is a cornerstone to the millions of informational transactions that occur each day online.&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 01:30, 22 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links  ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8635</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8635"/>
		<updated>2012-05-08T19:10:29Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion -- (later integrated into classroom discussion boards. This is not a complete list.)&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8634</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8634"/>
		<updated>2012-05-08T19:04:03Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When possible, I recapped my Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:LSTUFinalSGunawan.pdf&amp;diff=8632</id>
		<title>File:LSTUFinalSGunawan.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:LSTUFinalSGunawan.pdf&amp;diff=8632"/>
		<updated>2012-05-08T18:59:11Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: uploaded a new version of &amp;amp;quot;File:LSTUFinalSGunawan.pdf&amp;amp;quot;: (Thank you so much for a rigorous, enlightening, and rich semester! This final project is the culmination of an amazing tag team (Rob, Rebekah, and Andy). Thank you for filling our tank&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thank you so much for a rigorous, enlightening, and rich semester! This final project is the culmination of an amazing tag team (Rebekah and Andy). Thank you for filling our tanks to full and going the extra mile! Especially, working to accommodate international time zones. Thanks also to Rob (and guest speakers) for keeping our focus, responding/challenging classroom discussions, and more!&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8626</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8626"/>
		<updated>2012-05-08T18:54:58Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Sofia Gunawan&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: &amp;lt;changing title, link will be up shortly&amp;gt;&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2012/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/sites/is2012/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2012/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8625</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8625"/>
		<updated>2012-05-08T18:45:46Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Sofia Gunawan&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability in Theatrical Journalism&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: &amp;lt;changing title, link will be up shortly&amp;gt;&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2012/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/sites/is2012/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2012/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2012/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8613</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Final_Projects&amp;diff=8613"/>
		<updated>2012-05-08T16:24:56Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Sofia Gunawan&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Grande Jourthreater: A Discussion on Believability in Theatrical Journalism&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2012/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/sites/is2012/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2012/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:LSTUFinalSGunawan.pdf&amp;diff=8612</id>
		<title>File:LSTUFinalSGunawan.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:LSTUFinalSGunawan.pdf&amp;diff=8612"/>
		<updated>2012-05-08T16:21:09Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: Thank you so much for a rigorous, enlightening, and rich semester! This final project is the culmination of an amazing tag team (Rebekah and Andy). Thank you for filling our tanks to full and going the extra mile! Especially, working to accommodate intern&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thank you so much for a rigorous, enlightening, and rich semester! This final project is the culmination of an amazing tag team (Rebekah and Andy). Thank you for filling our tanks to full and going the extra mile! Especially, working to accommodate international time zones. Thanks also to Rob (and guest speakers) for keeping our focus, responding/challenging classroom discussions, and more!&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=8428</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=8428"/>
		<updated>2012-04-17T20:33:27Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on April 17.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Harvard212|Assignment 4: Rough Draft|http://cyber.law.harvard.edu/is2012/Image:LSTUAssignment4SGunawan.pdf}} &lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Jeff Kimble|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Jeff_Kimble_Rough_Draft2.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alex Lloyd-Evans|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:Alex_Lloyd-Evans_Assignment_4_%28Rough_Draft%29.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Samantha Zakuto|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:Assignment4SamanthaZakuto.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Emanuele Dominici|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:Emanuele_Assignment_4.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|James Harris|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:James_Harris_-_Final_Project_Draft.doc}}--[[User:Jimmyh|Jimmyh]] 16:54, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alexis Ditkowsky|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment4-DitkowskyAlexis_%281%29.pdf}}&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 17:37, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Julia Brav|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/JBrav_LSTU_Final_Paper_Draft.pdf}}[[User:Jlynnping|Jlynnping]] 19:40, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brendan Long / Quynh Dang|Assignment 4 Project Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/ResearchProjectDraft.pdf}}[[User:Brendanlong|Brendanlong]]&lt;br /&gt;
19:40, 17 April 2012 (UTC)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=8427</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_4_Submissions&amp;diff=8427"/>
		<updated>2012-04-17T20:32:50Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on April 17.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Harvard212|Assignment 4: Rough Draft|http://cyber.law.harvard.edu/is2012/Image:LSTUAssignment4SGunawan.pdf}} [[User:Harvard212|Harvard212]]16:31EST, 17 April 2012&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Jeff Kimble|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Jeff_Kimble_Rough_Draft2.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alex Lloyd-Evans|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:Alex_Lloyd-Evans_Assignment_4_%28Rough_Draft%29.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Samantha Zakuto|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:Assignment4SamanthaZakuto.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Emanuele Dominici|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:Emanuele_Assignment_4.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|James Harris|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/Image:James_Harris_-_Final_Project_Draft.doc}}--[[User:Jimmyh|Jimmyh]] 16:54, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alexis Ditkowsky|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment4-DitkowskyAlexis_%281%29.pdf}}&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 17:37, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Julia Brav|Assignment 4: Final Paper Rough Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/JBrav_LSTU_Final_Paper_Draft.pdf}}[[User:Jlynnping|Jlynnping]] 19:40, 17 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brendan Long / Quynh Dang|Assignment 4 Project Draft|http://cyber.law.harvard.edu/is2012/sites/is2012/images/ResearchProjectDraft.pdf}}[[User:Brendanlong|Brendanlong]]&lt;br /&gt;
19:40, 17 April 2012 (UTC)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:LSTUAssignment4SGunawan.pdf&amp;diff=8426</id>
		<title>File:LSTUAssignment4SGunawan.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:LSTUAssignment4SGunawan.pdf&amp;diff=8426"/>
		<updated>2012-04-17T20:29:03Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8266</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8266"/>
		<updated>2012-03-29T17:39:45Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; &lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the Kony inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8265</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8265"/>
		<updated>2012-03-29T17:38:23Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
Class 9 Internet and Democracy (March 27) (Posted on March 29, 2012 1:30pm EST  &lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the KONY inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=8264</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=8264"/>
		<updated>2012-03-29T17:36:41Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;March 27&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012-03-27.pdf Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/11/a-new-theory-for-the-foreign-policy-frontier-collaborative-power/249260/ Anne-Marie Slaughter, A New Theory for the Foreign Policy Frontier: Collaborative Power]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=566INSERT Zeynep Tufekci, The #freemona Perfect Storm: Dissent and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2012/exploring_russian_cyberspace Alexanyan et al, Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell Malcolm Gladwell, Why the revolution will not be tweeted.] &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Etling and Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://ui04e.moit.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
* [http://rosebellkagumire.com/2012/03/08/kony2012-my-response-to-invisible-childrens-campaign/ Rosebell Kagumire, Kony2012; My response to Invisible Children’s campaign]&lt;br /&gt;
&lt;br /&gt;
* [http://www.truthdig.com/report/item/a_letter_from_uganda_on_kony2012_20120315/  Sara Weschler, A Letter From Uganda on #Kony2012]&lt;br /&gt;
&lt;br /&gt;
* A few more Kony 2012-related resources:&lt;br /&gt;
** Sam Gregory, [http://advocacy.globalvoicesonline.org/2012/03/21/advocacy-audience-and-agency-in-kony-2012-moving-from-critique-to-action/ Advocacy, Audience and Agency in Kony 2012: Moving from Critique to Action]&lt;br /&gt;
** Ethan Zuckerman, [http://www.ethanzuckerman.com/blog/2012/03/14/useful-reads-on-kony-2012/ Useful reads on Kony 2012]&lt;br /&gt;
** Xeni Jardin, [http://boingboing.net/2012/03/08/african-voices-respond-to-hype.html African voices respond to hyper-popular Kony 2012 viral campaign]&lt;br /&gt;
** Kate Cronin-Furman and Amanda Taub, [http://www.theatlantic.com/international/archive/2012/03/solving-war-crimes-with-wristbands-the-arrogance-of-kony-2012/254193/ Solving War Crimes With Wristbands: The Arrogance of &#039;Kony 2012&#039;]&lt;br /&gt;
** Norbert Mao, [http://blog.foreignpolicy.com/posts/2012/03/21/guest_post_ive_met_joseph_kony_and_kony_2012_isnt_that_bad I&#039;ve met Joseph Kony and Kony 2012 isn&#039;t that bad]&lt;br /&gt;
** Radio Berkman, [http://blogs.law.harvard.edu/mediaberkman/2012/03/23/rb-195-can-100-million-viewers-save-a-child/ RB 195: Can 100 Million Viewers Save a Child?]&lt;br /&gt;
** [http://www.youtube.com/watch?v=QWACLKaOC08 Invisible Children Global Night Commute Musical] (2006)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
March 27: Internet and Democracy&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:11, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great analysis in the Social Flow Blog about the Kony2012 campaign. This reading made me realize the two powerful ingredients for the skyrocketing spread of an online message: pre-existing networks and  philanthropy tactics. I had seen the video a few weeks ago and felt inclined to participate. I think anything that has to do with children is touching for the people, also for me; but at the same time I was wondering how this campaign, and no others--because injustice is present in a number of cases around the world--succeeded in the gathering of all that people, and these two ingredients led me to the Eureka solution. I think it&#039;s very interesting from the marketing point of view, and for sure marketers have analyzed the Kony2012 campaign, as they have done in the social networks.&lt;br /&gt;
&lt;br /&gt;
As for the Russian reading, What most interested me about it was the networked public sphere phenomenon in practice, in which when an issue is considered to be from public importance online activists take action—like the Khimki forest campaign, the drivers’ movement and the Anti-Seliger protests. From my point of view this will continually help in the building of real democracies in which people can participate and their voices are heard. In the Russian case, this shift is happening and having success due to the low level of support that the people have for institutions, and it is something to be expected not only in Russia but also around the world. Not far away, this situation led the Middle East towards the Arab Spring, in which social networks participation was crucial to detonate the revolutions.[[User:Fabiancelisj|Fabiancelisj]] 22:09, 26 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think it is interesting to note from this week’s readings that collective action, through organizing online, is faster, easier (in that there is less physical barriers), allows for more collaboration of ideas globally, and is less expensive than traditional offline methods. Taking advantage of social media, Mona was quickly released after tweeting about her arrest by Egyptian police. In most cases, social media through Facebook, YouTube, and Twitter are faster than mainstream media such as TV and radio. The internet has allowed for sharing of information as quickly and as simple as a click, for example, the “share” button on Facebook. The internet and social media have allowed for new ideas to generate online and then carried out offline. However, as evident in the Russia study, there is a disparity in internet use, which is more available to “city dwellers and younger and richer people.” Another example is the Kony 2012 video on Youtube, which people can easily share on Facebook, is “popular among youths.” In Russia, people mostly expressed anti-government ideas through the blogosphere. While the government fought back using twitter and DDoS attacks and offline methods, such as inflicting harm to journalists.[[User:Qdang|Qdang]] 18:05, 27 March 2012 (UTC)   &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
I had read the Gladwell article before and just seeing his name in the list of readings lead me back to it first (who doesn&#039;t always want to read a Gladwell piece?).  I also generally agree with his conclusions about the limitations of social media and had arrived at roughly the same place in some of our earlier class discussions.  As a result, I feel like my reading of the other materials was mostly through that skeptical lens.  I very much agree that the degree of effort, true commitment, and genuine impact is extremely different on Twitter vs. in real life, and while that should be quite obvious it sometimes seems like it gets disregarded during our current age of adoration of social media and Twitter in particular.  His explanation of how strong vs weak social connections play into that difference in true commitment was an interesting next step in understanding protest and activism both through social media and in our physical daily lives.&lt;br /&gt;
&lt;br /&gt;
That all being said, I still was very impressed by the #freeMona campaign and its results.  I like that the various pieces we read on it acknowledged that it was more or less a perfect storm of connected individuals and important relationships along with Twitter and that Twitter was not the be-all end-all savior in a vacuum, but it still seemed undeniable that this was the power of Twitter in action.  The main point to me is that Twitter was used as the connective piece; a hashtag alone did not free her.  What it did was inform and motivate a large group of people, and included in that group were a few with the existing power and connections to allow them to call the state department, arrange to send help, etc., and in the end that freed her.  [[User:AlexLE|AlexLE]] 13:31, 26 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just wanted to share this &#039;&#039;New York Times&#039;&#039; article - &amp;quot;[http://www.nytimes.com/2012/03/26/business/media/hashtag-activism-and-its-limits.html?src=recg Hashtag Activism, and Its Limits]&amp;quot; - since it complemented the discussion last week about barriers to entry for digital activism. [[User:Aditkowsky|Aditkowsky]] 00:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I liked Zynep&#039;s article and the term &amp;quot;slacktivists.&amp;quot; I believe Kony 2012 was a large group of non-activists taking symbolic action. I had heard of Invisible Children before the Kony 2012 youtube video and had done some research on the organization. Full disclosure I am not a huge fan of the organization but I admit I still jumped on the Kony 2012 bandwagon for one reason - a genius PR/Marketing campaign. There is a lot to learn from this organization and how an effective Twitter campaign can sustain... if only for a short time. I look forward to our discussion in tonight&#039;s class.--[[User:Hds5|Hds5]] 14:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Social media (and Twitter for our discussions, has two affects when it comes to the user communicating a sentiment or action (versus any particular target government responding to such communications or actions). Either it creates a new cultural/political/geopolitical phenomenon that otherwise would not have existed in its identity without the existence of social media or that these transactions and movements have already existed for years but has allowed for “quicker” responses and actions as Zeynep points out. &lt;br /&gt;
&lt;br /&gt;
Besides rapidity, I also think that social media has empowered individuals to become more politically active, which I believe is somewhat independent of the “quicker” hypothesis. While the example of Mona and the massive Twitter movement between journalists and state officials was sped up through almost instantaneous communications through Twitter, I surmise that those communications may have occurred to some degree (but in different modalities). But the Egyptian uprising is an example of people becoming more empowered through social media by reading or writing Twitter feeds as the events unfolded and therefore forming “complex, diverse and ad hoc networks” as Zeynep indicates as “dynamics of a global campaign.” But the formation of those networks relies not necessarily on the collective entity but of a collection of individuals empowered to join and participate in those networks.  --[[User:Jimmyh|Jimmyh]] 16:43, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week - looking forward to our discussion in class and very much interested in your perspectives as this week&#039;s topic fits right in with my project.  I attended a conference yesterday hosted by Digital Democracy and the New American Tavern titled, &amp;quot;The Impact of KONY2012&amp;quot; with a couple representatives from Invisible Children and additional experts.  I&#039;ll share with you what was discussed where the focus was mostly with: lessons we can learn from what worked about Kony2012, critiques of the campaign, the film, IC, and the larger issues they point to, what it means moving forward for non-profits, etc.[[User:JennLopez|JennLopez]] 17:51, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Slaughter’s Article&#039;&#039;&#039;Relational Power: 1. COMMANDING CHANGE = getting people or groups to do things they don&#039;t want to do. 2. “CONTROLLING AGENDAS” = framing &amp;quot;agendas for action that make others&#039; preferences seem irrelevant or out of bounds.&amp;quot; 3. “SHAPING PREFERENCES”= using &amp;quot;ideas, beliefs, and culture to shape basic beliefs, perceptions and preferences.&amp;quot;&lt;br /&gt;
Please explain how Dec. of Independence is soft power? This is a government document, handed down as law. I interpreted soft power as the draw that led to hard power, which is what I thought the Declaration would be considered.&lt;br /&gt;
“power with” vs “power over” = difference in collaborative power. This was the difference I noted in (something we discussed last class) but wasn’t highlighted&lt;br /&gt;
Relational vs collaborative powers = force vs choice?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;freemona&#039;&#039;&#039;Debate over released (mentioned in above article): I would think that the twitter campaign had a huge impact on the result. Side question: how did she tweet she was beaten and detained? Someone else for her?&lt;br /&gt;
My takeaway: another extension of users leveraging technology (or perhaps the ability of technology to travel with people) into other countries with less technology to be used as news. &lt;br /&gt;
Cause/Effect Debate: Connected Users creating their own news versus topdown traditional newspapers (last class discussion)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alexanyan/Professor/Others&#039;&#039;&#039;Russian Politics and Twitter, Blogosphere, etc: “The Russian political blogosphere supports more cross-linking debate than others we have studied (including the U.S. and Iranian), and appears less subject to the formation of self-referential ‘echo chambers”&lt;br /&gt;
“The online ‘news diet’ of Russian bloggers is more independent, international, and oppositional than that of Russian Internet users overall, and far more so than that of non-Internet users, who are more reliant upon state-controlled federal TV channels”&lt;br /&gt;
“Popular political YouTube videos focus on corruption and abuse of power by elites, the government, and the police”&lt;br /&gt;
These findings seem to support that Russia is embracing democracy and the old guard (which still apparently has a presence according to U.S. Media) is losing strength.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Kony2012&#039;&#039;&#039;Author: “Further, all human societies operate in a world of socially-constructed norms and ideals” ---- no mention of architecture&lt;br /&gt;
I may argue that slacktivism does contain some harms ---it seems the author doesn’t want to answer any criticisms of it, but just purely defend the symbolic nature of slacktivism even if the information is not accurate. Boy who cried wolf? I think it’s important for information to be accurate. I think people demand the truth, and more importantly are infuriated when they find out facts are different after they’ve went along with something (Iraq). We are pulling out of Iraq (long term view has yet to decide if this will be adverse or not).&lt;br /&gt;
As for Kony itself, we all know what its currently known for due to incident with leader arrest --- which further gives discussion to the effects of activism turned slacktivism.  Going back to why we have the phrase slacktivism is because of “mistakes” made in the original reporting.&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 17:45, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The articles I read for this week’s class were very intriguing and fascinating, especially since my final project deals with this argument to some extent. The first article was very interesting in general but it really got me thinking about the recent middle eastern and African dictatorships which have been overthrown by the people who gained access to mass media and communication systems to finally change an unpleasant system. The second article as well was very interesting and powerful in demonstrating the importance of the media and in this specific case social networks like Twitter. The article concerning Russia was fascinating in one sense but sad in another. I know for certain that what happens in Russia (politically speaking) is only a mask of what really happens and what people really think about the Government. Although it may seem that there is a certain freedom in the use of the internet, the truth is very far from this, the only difference is that what really happens is kept a secret most of the time, and those very few who are able to escape torture, prison and political assassinations, are able to flee and tell the world about their experiences. I really enjoyed Zeynep Tufekci’s article on Kony 2012 and I do agree with her totally for what concerns getting people to pay attention to what really is important and not just mundane activities but I feel that for the majority of the population at least now that is not the case nor will it be in the near future. It is often hard to convince the average person that there are extremely important issues out there which apparently don’t touch him but in order to change the system, should. The last article on Kony 2012 was also very interesting but my personal view on this matter is that I don’t believe that simply “sharing” or “liking” the campaign video will actually do anything to change the situation. Clicking “share” in my opinion is just a way of saying: ok, I saw it! But the question is: now what are you going to do? And the answer in my opinion is: nothing, just going to continue tweeting or posting about the next sport event etc. I might seem a bit too skeptical but this is my personal, and perhaps wrong, opinion on the matter at hand. [[User:Emanuele|Emanuele]] 18:05, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
There is a lot to be learned from KONY and #fremona. Collective action channeled through mediums like Twitter are more rapid and can reach a larger, more diverse swath of the population. These mediums are big and useful tools in these types of collective action campaigns. KONY helped those who are not typically involved in political activism (the younger age groups listed in the article) to get more involved/become more aware, and did so very quickly. I think that is one of the biggest strengths of social media. This is also evident in the article about Russian Twitter users. These people can now make their voices heard (although Tufekci points out the &amp;quot;rich get richer&amp;quot; phenomenon). The Gladwell article shows another perspective. I think it&#039;s important to not discount the masses who organize on the ground (the Moldovan protestors, Tehran protestors, etc), but to also keep in mind that social media platforms do play an important role and the dynamics of protests, campaigns, and collaborative efforts have changed. And, I think, for the better.&lt;br /&gt;
&lt;br /&gt;
I, too, wonder how Mona tweeted? I noticed in the article&#039;s comments that someone pointed out how &amp;quot;99%&amp;quot; of Egyptians don&#039;t have the technology (phone, apps, network connection) nor are they bilingual (can&#039;t as easily reach an international crowd) and they use word of mouth, therefore the article isn&#039;t representative. But both Mona and Trufekci qualify the powerful use of Twitter by saying most jailed Egyptians don&#039;t have that option. At the very least, Mona shed more light on the &amp;quot;languishing&amp;quot; plight of the jailed Egyptians/protestors, and she did so in a big way. [[User:Aberg|Aberg]] 19:47, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All of these articles were quite informative, and all together interesting regarding the nature of activism and social media.  However, I found one thing lacking in each of these articles; namely, popularity.  Zeynep began to touch on the subject when he addressed #Kony2012 activists, naming them slactivists.  His insight to the inactivity of those interested in activist movements was an exceptional read.  But I wish he would have taken it a step further and addressed the issue of popularity.  To analyze this you really have to analyze human behavior, which I won’t do here, but I’ll address it.  Regardless of the nature of the subject, what will trend through social media, whether it be activist causes or cat videos, will be what individuals find to be most appealing to their interests at that time based upon the knowledge they have on the particular nature of that subject.  In other words, if it sounds appealing to the individual, then it will retain that individual’s attention, and in retaining that attention, that individual will either seek other sources of information about that subject, or promote the information he just read.  &lt;br /&gt;
&lt;br /&gt;
This is simple trending, and simple mass appeal that all marketing firms know of and manipulate.  It’s clearly evident that this is also what has taken place through #Mona and #Kony.  Both of these trends became popular because they were able to pique the interest of so many, rather than actually meaning something.  I’m not trying to say that they didn’t mean something, but Zeynep was on to something when he mentioned all the other world problems that we ignore.  These subjects became popular, and eventually their popularity alone drew in many others to contribute to its popularity; and this is a trait that is special to social media.  I have not seen the Kony video, however, if I were to watch it, its view count would increase, and in effect, move up the ladder of trending topics, regardless of my interest.  An example of what I mean is the Rebecca Black song “Friday”.  The original version has 26 million views, and not all that watch it really likes that song; it has 5 times as many dislikes as likes.  But because it trends, more people are apt to watch the video, which adds to its count and adds it to the trend.&lt;br /&gt;
&lt;br /&gt;
The principle of my argument it that while social media does help these causes, as Zeynep states, it also follows popularity contests, which are subject to causes that are not congruous with the activist cause.  The greatest example is President Franklin Pierce.  He won the presidential election of 1852 in a landslide victory with virtually no political experience.  He was the most popular, not the greatest politician.  This came to light throughout his presidency, and to this day is the only incumbent president not to be re-nominated by his own party for reelection.  He became unpopular.  He was a fleeting trend that individuals promoted without knowing the actual nature of the trend, and once the nature of the trend is known, it falls into disfavor.  Zeynep points this out in Kony, and the Mona issue seems no different.  They trend because they seem appealing at the time, rather than actually being the issue that is assumed by those who popularize it.  I’m not saying that this is a bad thing, or that the topics are inherently inferior, but rather they won the popularity contest.[[User:Nthib|Nthib]] 21:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the KONY article to be the most interesting of the bunch for this class.  In particular, I had many questions answered as to how that particular campaign went so viral while others for similiar causes have floundered.  It seems that &amp;quot;having pre-existing networks in place helped the initial spread of their message.&amp;quot; Apparently, laying the foundation with clusters of youth or other tech-savv demographics is paramount to a succesful online campaign.  Secondly, they used &amp;quot;attention philanthropy tactics&amp;quot; which mens they had high-profile celebrities increase their visibility substantially. I would argue that a third lever activated such a viral campaign in that the press came out and covered the spread of the campaign (both positively and negatively) which then spurred further dissemination.  That level of tv and print media coverage then drew in those who were not tech-savvy to begin with or may use it for other reasons than tweeting, facebook, etc. [[User:Cfleming27|Cfleming27]] 11:34, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
About Anne-Marie Slaughter’s article, it’s truly something to reflect on.  There is a power, which has been latent, but is no more latent.  That is the power of individual and collective opinion.  I say it was previously latent, because although some people are more outspoken than others, most people tend to remain silent, when they think it will cost them much to speak up about injustice or needed change, or if they feel they can do nothing about the situation.  Modern technology has put this human tendency into a new context, removing, at least in part, some of that “costliness” barrier.  It’s easy to send a tweet, and become, as Slaughter put it, another drop of water that can form a “tsunami”.  Although some places do their best to stop the rain of water drops, and manage to stop many drops, they can never stop them all, clouds condense in new places, and rain is bound to fall.  Modern technology is facilitating this new avenue for the torrents of water to form and flow, so the power is no longer latent.[[User:Mike|Mike]] 18:31, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; Posted on March 29, 2012 1:30pm EST [[User: Harvard212|Harvard212]]&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the KONY inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=8263</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=8263"/>
		<updated>2012-03-29T17:34:56Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;March 27&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012-03-27.pdf Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/11/a-new-theory-for-the-foreign-policy-frontier-collaborative-power/249260/ Anne-Marie Slaughter, A New Theory for the Foreign Policy Frontier: Collaborative Power]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=566INSERT Zeynep Tufekci, The #freemona Perfect Storm: Dissent and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2012/exploring_russian_cyberspace Alexanyan et al, Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell Malcolm Gladwell, Why the revolution will not be tweeted.] &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Etling and Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://ui04e.moit.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
* [http://rosebellkagumire.com/2012/03/08/kony2012-my-response-to-invisible-childrens-campaign/ Rosebell Kagumire, Kony2012; My response to Invisible Children’s campaign]&lt;br /&gt;
&lt;br /&gt;
* [http://www.truthdig.com/report/item/a_letter_from_uganda_on_kony2012_20120315/  Sara Weschler, A Letter From Uganda on #Kony2012]&lt;br /&gt;
&lt;br /&gt;
* A few more Kony 2012-related resources:&lt;br /&gt;
** Sam Gregory, [http://advocacy.globalvoicesonline.org/2012/03/21/advocacy-audience-and-agency-in-kony-2012-moving-from-critique-to-action/ Advocacy, Audience and Agency in Kony 2012: Moving from Critique to Action]&lt;br /&gt;
** Ethan Zuckerman, [http://www.ethanzuckerman.com/blog/2012/03/14/useful-reads-on-kony-2012/ Useful reads on Kony 2012]&lt;br /&gt;
** Xeni Jardin, [http://boingboing.net/2012/03/08/african-voices-respond-to-hype.html African voices respond to hyper-popular Kony 2012 viral campaign]&lt;br /&gt;
** Kate Cronin-Furman and Amanda Taub, [http://www.theatlantic.com/international/archive/2012/03/solving-war-crimes-with-wristbands-the-arrogance-of-kony-2012/254193/ Solving War Crimes With Wristbands: The Arrogance of &#039;Kony 2012&#039;]&lt;br /&gt;
** Norbert Mao, [http://blog.foreignpolicy.com/posts/2012/03/21/guest_post_ive_met_joseph_kony_and_kony_2012_isnt_that_bad I&#039;ve met Joseph Kony and Kony 2012 isn&#039;t that bad]&lt;br /&gt;
** Radio Berkman, [http://blogs.law.harvard.edu/mediaberkman/2012/03/23/rb-195-can-100-million-viewers-save-a-child/ RB 195: Can 100 Million Viewers Save a Child?]&lt;br /&gt;
** [http://www.youtube.com/watch?v=QWACLKaOC08 Invisible Children Global Night Commute Musical] (2006)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
March 27: Internet and Democracy&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:11, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great analysis in the Social Flow Blog about the Kony2012 campaign. This reading made me realize the two powerful ingredients for the skyrocketing spread of an online message: pre-existing networks and  philanthropy tactics. I had seen the video a few weeks ago and felt inclined to participate. I think anything that has to do with children is touching for the people, also for me; but at the same time I was wondering how this campaign, and no others--because injustice is present in a number of cases around the world--succeeded in the gathering of all that people, and these two ingredients led me to the Eureka solution. I think it&#039;s very interesting from the marketing point of view, and for sure marketers have analyzed the Kony2012 campaign, as they have done in the social networks.&lt;br /&gt;
&lt;br /&gt;
As for the Russian reading, What most interested me about it was the networked public sphere phenomenon in practice, in which when an issue is considered to be from public importance online activists take action—like the Khimki forest campaign, the drivers’ movement and the Anti-Seliger protests. From my point of view this will continually help in the building of real democracies in which people can participate and their voices are heard. In the Russian case, this shift is happening and having success due to the low level of support that the people have for institutions, and it is something to be expected not only in Russia but also around the world. Not far away, this situation led the Middle East towards the Arab Spring, in which social networks participation was crucial to detonate the revolutions.[[User:Fabiancelisj|Fabiancelisj]] 22:09, 26 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think it is interesting to note from this week’s readings that collective action, through organizing online, is faster, easier (in that there is less physical barriers), allows for more collaboration of ideas globally, and is less expensive than traditional offline methods. Taking advantage of social media, Mona was quickly released after tweeting about her arrest by Egyptian police. In most cases, social media through Facebook, YouTube, and Twitter are faster than mainstream media such as TV and radio. The internet has allowed for sharing of information as quickly and as simple as a click, for example, the “share” button on Facebook. The internet and social media have allowed for new ideas to generate online and then carried out offline. However, as evident in the Russia study, there is a disparity in internet use, which is more available to “city dwellers and younger and richer people.” Another example is the Kony 2012 video on Youtube, which people can easily share on Facebook, is “popular among youths.” In Russia, people mostly expressed anti-government ideas through the blogosphere. While the government fought back using twitter and DDoS attacks and offline methods, such as inflicting harm to journalists.[[User:Qdang|Qdang]] 18:05, 27 March 2012 (UTC)   &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
I had read the Gladwell article before and just seeing his name in the list of readings lead me back to it first (who doesn&#039;t always want to read a Gladwell piece?).  I also generally agree with his conclusions about the limitations of social media and had arrived at roughly the same place in some of our earlier class discussions.  As a result, I feel like my reading of the other materials was mostly through that skeptical lens.  I very much agree that the degree of effort, true commitment, and genuine impact is extremely different on Twitter vs. in real life, and while that should be quite obvious it sometimes seems like it gets disregarded during our current age of adoration of social media and Twitter in particular.  His explanation of how strong vs weak social connections play into that difference in true commitment was an interesting next step in understanding protest and activism both through social media and in our physical daily lives.&lt;br /&gt;
&lt;br /&gt;
That all being said, I still was very impressed by the #freeMona campaign and its results.  I like that the various pieces we read on it acknowledged that it was more or less a perfect storm of connected individuals and important relationships along with Twitter and that Twitter was not the be-all end-all savior in a vacuum, but it still seemed undeniable that this was the power of Twitter in action.  The main point to me is that Twitter was used as the connective piece; a hashtag alone did not free her.  What it did was inform and motivate a large group of people, and included in that group were a few with the existing power and connections to allow them to call the state department, arrange to send help, etc., and in the end that freed her.  [[User:AlexLE|AlexLE]] 13:31, 26 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just wanted to share this &#039;&#039;New York Times&#039;&#039; article - &amp;quot;[http://www.nytimes.com/2012/03/26/business/media/hashtag-activism-and-its-limits.html?src=recg Hashtag Activism, and Its Limits]&amp;quot; - since it complemented the discussion last week about barriers to entry for digital activism. [[User:Aditkowsky|Aditkowsky]] 00:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I liked Zynep&#039;s article and the term &amp;quot;slacktivists.&amp;quot; I believe Kony 2012 was a large group of non-activists taking symbolic action. I had heard of Invisible Children before the Kony 2012 youtube video and had done some research on the organization. Full disclosure I am not a huge fan of the organization but I admit I still jumped on the Kony 2012 bandwagon for one reason - a genius PR/Marketing campaign. There is a lot to learn from this organization and how an effective Twitter campaign can sustain... if only for a short time. I look forward to our discussion in tonight&#039;s class.--[[User:Hds5|Hds5]] 14:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Social media (and Twitter for our discussions, has two affects when it comes to the user communicating a sentiment or action (versus any particular target government responding to such communications or actions). Either it creates a new cultural/political/geopolitical phenomenon that otherwise would not have existed in its identity without the existence of social media or that these transactions and movements have already existed for years but has allowed for “quicker” responses and actions as Zeynep points out. &lt;br /&gt;
&lt;br /&gt;
Besides rapidity, I also think that social media has empowered individuals to become more politically active, which I believe is somewhat independent of the “quicker” hypothesis. While the example of Mona and the massive Twitter movement between journalists and state officials was sped up through almost instantaneous communications through Twitter, I surmise that those communications may have occurred to some degree (but in different modalities). But the Egyptian uprising is an example of people becoming more empowered through social media by reading or writing Twitter feeds as the events unfolded and therefore forming “complex, diverse and ad hoc networks” as Zeynep indicates as “dynamics of a global campaign.” But the formation of those networks relies not necessarily on the collective entity but of a collection of individuals empowered to join and participate in those networks.  --[[User:Jimmyh|Jimmyh]] 16:43, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week - looking forward to our discussion in class and very much interested in your perspectives as this week&#039;s topic fits right in with my project.  I attended a conference yesterday hosted by Digital Democracy and the New American Tavern titled, &amp;quot;The Impact of KONY2012&amp;quot; with a couple representatives from Invisible Children and additional experts.  I&#039;ll share with you what was discussed where the focus was mostly with: lessons we can learn from what worked about Kony2012, critiques of the campaign, the film, IC, and the larger issues they point to, what it means moving forward for non-profits, etc.[[User:JennLopez|JennLopez]] 17:51, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Slaughter’s Article&#039;&#039;&#039;Relational Power: 1. COMMANDING CHANGE = getting people or groups to do things they don&#039;t want to do. 2. “CONTROLLING AGENDAS” = framing &amp;quot;agendas for action that make others&#039; preferences seem irrelevant or out of bounds.&amp;quot; 3. “SHAPING PREFERENCES”= using &amp;quot;ideas, beliefs, and culture to shape basic beliefs, perceptions and preferences.&amp;quot;&lt;br /&gt;
Please explain how Dec. of Independence is soft power? This is a government document, handed down as law. I interpreted soft power as the draw that led to hard power, which is what I thought the Declaration would be considered.&lt;br /&gt;
“power with” vs “power over” = difference in collaborative power. This was the difference I noted in (something we discussed last class) but wasn’t highlighted&lt;br /&gt;
Relational vs collaborative powers = force vs choice?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;freemona&#039;&#039;&#039;Debate over released (mentioned in above article): I would think that the twitter campaign had a huge impact on the result. Side question: how did she tweet she was beaten and detained? Someone else for her?&lt;br /&gt;
My takeaway: another extension of users leveraging technology (or perhaps the ability of technology to travel with people) into other countries with less technology to be used as news. &lt;br /&gt;
Cause/Effect Debate: Connected Users creating their own news versus topdown traditional newspapers (last class discussion)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alexanyan/Professor/Others&#039;&#039;&#039;Russian Politics and Twitter, Blogosphere, etc: “The Russian political blogosphere supports more cross-linking debate than others we have studied (including the U.S. and Iranian), and appears less subject to the formation of self-referential ‘echo chambers”&lt;br /&gt;
“The online ‘news diet’ of Russian bloggers is more independent, international, and oppositional than that of Russian Internet users overall, and far more so than that of non-Internet users, who are more reliant upon state-controlled federal TV channels”&lt;br /&gt;
“Popular political YouTube videos focus on corruption and abuse of power by elites, the government, and the police”&lt;br /&gt;
These findings seem to support that Russia is embracing democracy and the old guard (which still apparently has a presence according to U.S. Media) is losing strength.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Kony2012&#039;&#039;&#039;Author: “Further, all human societies operate in a world of socially-constructed norms and ideals” ---- no mention of architecture&lt;br /&gt;
I may argue that slacktivism does contain some harms ---it seems the author doesn’t want to answer any criticisms of it, but just purely defend the symbolic nature of slacktivism even if the information is not accurate. Boy who cried wolf? I think it’s important for information to be accurate. I think people demand the truth, and more importantly are infuriated when they find out facts are different after they’ve went along with something (Iraq). We are pulling out of Iraq (long term view has yet to decide if this will be adverse or not).&lt;br /&gt;
As for Kony itself, we all know what its currently known for due to incident with leader arrest --- which further gives discussion to the effects of activism turned slacktivism.  Going back to why we have the phrase slacktivism is because of “mistakes” made in the original reporting.&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 17:45, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The articles I read for this week’s class were very intriguing and fascinating, especially since my final project deals with this argument to some extent. The first article was very interesting in general but it really got me thinking about the recent middle eastern and African dictatorships which have been overthrown by the people who gained access to mass media and communication systems to finally change an unpleasant system. The second article as well was very interesting and powerful in demonstrating the importance of the media and in this specific case social networks like Twitter. The article concerning Russia was fascinating in one sense but sad in another. I know for certain that what happens in Russia (politically speaking) is only a mask of what really happens and what people really think about the Government. Although it may seem that there is a certain freedom in the use of the internet, the truth is very far from this, the only difference is that what really happens is kept a secret most of the time, and those very few who are able to escape torture, prison and political assassinations, are able to flee and tell the world about their experiences. I really enjoyed Zeynep Tufekci’s article on Kony 2012 and I do agree with her totally for what concerns getting people to pay attention to what really is important and not just mundane activities but I feel that for the majority of the population at least now that is not the case nor will it be in the near future. It is often hard to convince the average person that there are extremely important issues out there which apparently don’t touch him but in order to change the system, should. The last article on Kony 2012 was also very interesting but my personal view on this matter is that I don’t believe that simply “sharing” or “liking” the campaign video will actually do anything to change the situation. Clicking “share” in my opinion is just a way of saying: ok, I saw it! But the question is: now what are you going to do? And the answer in my opinion is: nothing, just going to continue tweeting or posting about the next sport event etc. I might seem a bit too skeptical but this is my personal, and perhaps wrong, opinion on the matter at hand. [[User:Emanuele|Emanuele]] 18:05, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
There is a lot to be learned from KONY and #fremona. Collective action channeled through mediums like Twitter are more rapid and can reach a larger, more diverse swath of the population. These mediums are big and useful tools in these types of collective action campaigns. KONY helped those who are not typically involved in political activism (the younger age groups listed in the article) to get more involved/become more aware, and did so very quickly. I think that is one of the biggest strengths of social media. This is also evident in the article about Russian Twitter users. These people can now make their voices heard (although Tufekci points out the &amp;quot;rich get richer&amp;quot; phenomenon). The Gladwell article shows another perspective. I think it&#039;s important to not discount the masses who organize on the ground (the Moldovan protestors, Tehran protestors, etc), but to also keep in mind that social media platforms do play an important role and the dynamics of protests, campaigns, and collaborative efforts have changed. And, I think, for the better.&lt;br /&gt;
&lt;br /&gt;
I, too, wonder how Mona tweeted? I noticed in the article&#039;s comments that someone pointed out how &amp;quot;99%&amp;quot; of Egyptians don&#039;t have the technology (phone, apps, network connection) nor are they bilingual (can&#039;t as easily reach an international crowd) and they use word of mouth, therefore the article isn&#039;t representative. But both Mona and Trufekci qualify the powerful use of Twitter by saying most jailed Egyptians don&#039;t have that option. At the very least, Mona shed more light on the &amp;quot;languishing&amp;quot; plight of the jailed Egyptians/protestors, and she did so in a big way. [[User:Aberg|Aberg]] 19:47, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All of these articles were quite informative, and all together interesting regarding the nature of activism and social media.  However, I found one thing lacking in each of these articles; namely, popularity.  Zeynep began to touch on the subject when he addressed #Kony2012 activists, naming them slactivists.  His insight to the inactivity of those interested in activist movements was an exceptional read.  But I wish he would have taken it a step further and addressed the issue of popularity.  To analyze this you really have to analyze human behavior, which I won’t do here, but I’ll address it.  Regardless of the nature of the subject, what will trend through social media, whether it be activist causes or cat videos, will be what individuals find to be most appealing to their interests at that time based upon the knowledge they have on the particular nature of that subject.  In other words, if it sounds appealing to the individual, then it will retain that individual’s attention, and in retaining that attention, that individual will either seek other sources of information about that subject, or promote the information he just read.  &lt;br /&gt;
&lt;br /&gt;
This is simple trending, and simple mass appeal that all marketing firms know of and manipulate.  It’s clearly evident that this is also what has taken place through #Mona and #Kony.  Both of these trends became popular because they were able to pique the interest of so many, rather than actually meaning something.  I’m not trying to say that they didn’t mean something, but Zeynep was on to something when he mentioned all the other world problems that we ignore.  These subjects became popular, and eventually their popularity alone drew in many others to contribute to its popularity; and this is a trait that is special to social media.  I have not seen the Kony video, however, if I were to watch it, its view count would increase, and in effect, move up the ladder of trending topics, regardless of my interest.  An example of what I mean is the Rebecca Black song “Friday”.  The original version has 26 million views, and not all that watch it really likes that song; it has 5 times as many dislikes as likes.  But because it trends, more people are apt to watch the video, which adds to its count and adds it to the trend.&lt;br /&gt;
&lt;br /&gt;
The principle of my argument it that while social media does help these causes, as Zeynep states, it also follows popularity contests, which are subject to causes that are not congruous with the activist cause.  The greatest example is President Franklin Pierce.  He won the presidential election of 1852 in a landslide victory with virtually no political experience.  He was the most popular, not the greatest politician.  This came to light throughout his presidency, and to this day is the only incumbent president not to be re-nominated by his own party for reelection.  He became unpopular.  He was a fleeting trend that individuals promoted without knowing the actual nature of the trend, and once the nature of the trend is known, it falls into disfavor.  Zeynep points this out in Kony, and the Mona issue seems no different.  They trend because they seem appealing at the time, rather than actually being the issue that is assumed by those who popularize it.  I’m not saying that this is a bad thing, or that the topics are inherently inferior, but rather they won the popularity contest.[[User:Nthib|Nthib]] 21:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the KONY article to be the most interesting of the bunch for this class.  In particular, I had many questions answered as to how that particular campaign went so viral while others for similiar causes have floundered.  It seems that &amp;quot;having pre-existing networks in place helped the initial spread of their message.&amp;quot; Apparently, laying the foundation with clusters of youth or other tech-savv demographics is paramount to a succesful online campaign.  Secondly, they used &amp;quot;attention philanthropy tactics&amp;quot; which mens they had high-profile celebrities increase their visibility substantially. I would argue that a third lever activated such a viral campaign in that the press came out and covered the spread of the campaign (both positively and negatively) which then spurred further dissemination.  That level of tv and print media coverage then drew in those who were not tech-savvy to begin with or may use it for other reasons than tweeting, facebook, etc. [[User:Cfleming27|Cfleming27]] 11:34, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
About Anne-Marie Slaughter’s article, it’s truly something to reflect on.  There is a power, which has been latent, but is no more latent.  That is the power of individual and collective opinion.  I say it was previously latent, because although some people are more outspoken than others, most people tend to remain silent, when they think it will cost them much to speak up about injustice or needed change, or if they feel they can do nothing about the situation.  Modern technology has put this human tendency into a new context, removing, at least in part, some of that “costliness” barrier.  It’s easy to send a tweet, and become, as Slaughter put it, another drop of water that can form a “tsunami”.  Although some places do their best to stop the rain of water drops, and manage to stop many drops, they can never stop them all, clouds condense in new places, and rain is bound to fall.  Modern technology is facilitating this new avenue for the torrents of water to form and flow, so the power is no longer latent.[[User:Mike|Mike]] 18:31, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; (Posted on March 29, 2012 1:30pm EST [User: Harvard212|Harvard212])&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the KONY inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=8262</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_and_Democracy&amp;diff=8262"/>
		<updated>2012-03-29T17:30:45Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;March 27&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012-03-27.pdf Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/11/a-new-theory-for-the-foreign-policy-frontier-collaborative-power/249260/ Anne-Marie Slaughter, A New Theory for the Foreign Policy Frontier: Collaborative Power]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=566INSERT Zeynep Tufekci, The #freemona Perfect Storm: Dissent and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2012/exploring_russian_cyberspace Alexanyan et al, Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell Malcolm Gladwell, Why the revolution will not be tweeted.] &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Etling and Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://ui04e.moit.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
* [http://rosebellkagumire.com/2012/03/08/kony2012-my-response-to-invisible-childrens-campaign/ Rosebell Kagumire, Kony2012; My response to Invisible Children’s campaign]&lt;br /&gt;
&lt;br /&gt;
* [http://www.truthdig.com/report/item/a_letter_from_uganda_on_kony2012_20120315/  Sara Weschler, A Letter From Uganda on #Kony2012]&lt;br /&gt;
&lt;br /&gt;
* A few more Kony 2012-related resources:&lt;br /&gt;
** Sam Gregory, [http://advocacy.globalvoicesonline.org/2012/03/21/advocacy-audience-and-agency-in-kony-2012-moving-from-critique-to-action/ Advocacy, Audience and Agency in Kony 2012: Moving from Critique to Action]&lt;br /&gt;
** Ethan Zuckerman, [http://www.ethanzuckerman.com/blog/2012/03/14/useful-reads-on-kony-2012/ Useful reads on Kony 2012]&lt;br /&gt;
** Xeni Jardin, [http://boingboing.net/2012/03/08/african-voices-respond-to-hype.html African voices respond to hyper-popular Kony 2012 viral campaign]&lt;br /&gt;
** Kate Cronin-Furman and Amanda Taub, [http://www.theatlantic.com/international/archive/2012/03/solving-war-crimes-with-wristbands-the-arrogance-of-kony-2012/254193/ Solving War Crimes With Wristbands: The Arrogance of &#039;Kony 2012&#039;]&lt;br /&gt;
** Norbert Mao, [http://blog.foreignpolicy.com/posts/2012/03/21/guest_post_ive_met_joseph_kony_and_kony_2012_isnt_that_bad I&#039;ve met Joseph Kony and Kony 2012 isn&#039;t that bad]&lt;br /&gt;
** Radio Berkman, [http://blogs.law.harvard.edu/mediaberkman/2012/03/23/rb-195-can-100-million-viewers-save-a-child/ RB 195: Can 100 Million Viewers Save a Child?]&lt;br /&gt;
** [http://www.youtube.com/watch?v=QWACLKaOC08 Invisible Children Global Night Commute Musical] (2006)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
March 27: Internet and Democracy&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:11, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great analysis in the Social Flow Blog about the Kony2012 campaign. This reading made me realize the two powerful ingredients for the skyrocketing spread of an online message: pre-existing networks and  philanthropy tactics. I had seen the video a few weeks ago and felt inclined to participate. I think anything that has to do with children is touching for the people, also for me; but at the same time I was wondering how this campaign, and no others--because injustice is present in a number of cases around the world--succeeded in the gathering of all that people, and these two ingredients led me to the Eureka solution. I think it&#039;s very interesting from the marketing point of view, and for sure marketers have analyzed the Kony2012 campaign, as they have done in the social networks.&lt;br /&gt;
&lt;br /&gt;
As for the Russian reading, What most interested me about it was the networked public sphere phenomenon in practice, in which when an issue is considered to be from public importance online activists take action—like the Khimki forest campaign, the drivers’ movement and the Anti-Seliger protests. From my point of view this will continually help in the building of real democracies in which people can participate and their voices are heard. In the Russian case, this shift is happening and having success due to the low level of support that the people have for institutions, and it is something to be expected not only in Russia but also around the world. Not far away, this situation led the Middle East towards the Arab Spring, in which social networks participation was crucial to detonate the revolutions.[[User:Fabiancelisj|Fabiancelisj]] 22:09, 26 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think it is interesting to note from this week’s readings that collective action, through organizing online, is faster, easier (in that there is less physical barriers), allows for more collaboration of ideas globally, and is less expensive than traditional offline methods. Taking advantage of social media, Mona was quickly released after tweeting about her arrest by Egyptian police. In most cases, social media through Facebook, YouTube, and Twitter are faster than mainstream media such as TV and radio. The internet has allowed for sharing of information as quickly and as simple as a click, for example, the “share” button on Facebook. The internet and social media have allowed for new ideas to generate online and then carried out offline. However, as evident in the Russia study, there is a disparity in internet use, which is more available to “city dwellers and younger and richer people.” Another example is the Kony 2012 video on Youtube, which people can easily share on Facebook, is “popular among youths.” In Russia, people mostly expressed anti-government ideas through the blogosphere. While the government fought back using twitter and DDoS attacks and offline methods, such as inflicting harm to journalists.[[User:Qdang|Qdang]] 18:05, 27 March 2012 (UTC)   &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
I had read the Gladwell article before and just seeing his name in the list of readings lead me back to it first (who doesn&#039;t always want to read a Gladwell piece?).  I also generally agree with his conclusions about the limitations of social media and had arrived at roughly the same place in some of our earlier class discussions.  As a result, I feel like my reading of the other materials was mostly through that skeptical lens.  I very much agree that the degree of effort, true commitment, and genuine impact is extremely different on Twitter vs. in real life, and while that should be quite obvious it sometimes seems like it gets disregarded during our current age of adoration of social media and Twitter in particular.  His explanation of how strong vs weak social connections play into that difference in true commitment was an interesting next step in understanding protest and activism both through social media and in our physical daily lives.&lt;br /&gt;
&lt;br /&gt;
That all being said, I still was very impressed by the #freeMona campaign and its results.  I like that the various pieces we read on it acknowledged that it was more or less a perfect storm of connected individuals and important relationships along with Twitter and that Twitter was not the be-all end-all savior in a vacuum, but it still seemed undeniable that this was the power of Twitter in action.  The main point to me is that Twitter was used as the connective piece; a hashtag alone did not free her.  What it did was inform and motivate a large group of people, and included in that group were a few with the existing power and connections to allow them to call the state department, arrange to send help, etc., and in the end that freed her.  [[User:AlexLE|AlexLE]] 13:31, 26 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just wanted to share this &#039;&#039;New York Times&#039;&#039; article - &amp;quot;[http://www.nytimes.com/2012/03/26/business/media/hashtag-activism-and-its-limits.html?src=recg Hashtag Activism, and Its Limits]&amp;quot; - since it complemented the discussion last week about barriers to entry for digital activism. [[User:Aditkowsky|Aditkowsky]] 00:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I liked Zynep&#039;s article and the term &amp;quot;slacktivists.&amp;quot; I believe Kony 2012 was a large group of non-activists taking symbolic action. I had heard of Invisible Children before the Kony 2012 youtube video and had done some research on the organization. Full disclosure I am not a huge fan of the organization but I admit I still jumped on the Kony 2012 bandwagon for one reason - a genius PR/Marketing campaign. There is a lot to learn from this organization and how an effective Twitter campaign can sustain... if only for a short time. I look forward to our discussion in tonight&#039;s class.--[[User:Hds5|Hds5]] 14:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Social media (and Twitter for our discussions, has two affects when it comes to the user communicating a sentiment or action (versus any particular target government responding to such communications or actions). Either it creates a new cultural/political/geopolitical phenomenon that otherwise would not have existed in its identity without the existence of social media or that these transactions and movements have already existed for years but has allowed for “quicker” responses and actions as Zeynep points out. &lt;br /&gt;
&lt;br /&gt;
Besides rapidity, I also think that social media has empowered individuals to become more politically active, which I believe is somewhat independent of the “quicker” hypothesis. While the example of Mona and the massive Twitter movement between journalists and state officials was sped up through almost instantaneous communications through Twitter, I surmise that those communications may have occurred to some degree (but in different modalities). But the Egyptian uprising is an example of people becoming more empowered through social media by reading or writing Twitter feeds as the events unfolded and therefore forming “complex, diverse and ad hoc networks” as Zeynep indicates as “dynamics of a global campaign.” But the formation of those networks relies not necessarily on the collective entity but of a collection of individuals empowered to join and participate in those networks.  --[[User:Jimmyh|Jimmyh]] 16:43, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week - looking forward to our discussion in class and very much interested in your perspectives as this week&#039;s topic fits right in with my project.  I attended a conference yesterday hosted by Digital Democracy and the New American Tavern titled, &amp;quot;The Impact of KONY2012&amp;quot; with a couple representatives from Invisible Children and additional experts.  I&#039;ll share with you what was discussed where the focus was mostly with: lessons we can learn from what worked about Kony2012, critiques of the campaign, the film, IC, and the larger issues they point to, what it means moving forward for non-profits, etc.[[User:JennLopez|JennLopez]] 17:51, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Slaughter’s Article&#039;&#039;&#039;Relational Power: 1. COMMANDING CHANGE = getting people or groups to do things they don&#039;t want to do. 2. “CONTROLLING AGENDAS” = framing &amp;quot;agendas for action that make others&#039; preferences seem irrelevant or out of bounds.&amp;quot; 3. “SHAPING PREFERENCES”= using &amp;quot;ideas, beliefs, and culture to shape basic beliefs, perceptions and preferences.&amp;quot;&lt;br /&gt;
Please explain how Dec. of Independence is soft power? This is a government document, handed down as law. I interpreted soft power as the draw that led to hard power, which is what I thought the Declaration would be considered.&lt;br /&gt;
“power with” vs “power over” = difference in collaborative power. This was the difference I noted in (something we discussed last class) but wasn’t highlighted&lt;br /&gt;
Relational vs collaborative powers = force vs choice?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;freemona&#039;&#039;&#039;Debate over released (mentioned in above article): I would think that the twitter campaign had a huge impact on the result. Side question: how did she tweet she was beaten and detained? Someone else for her?&lt;br /&gt;
My takeaway: another extension of users leveraging technology (or perhaps the ability of technology to travel with people) into other countries with less technology to be used as news. &lt;br /&gt;
Cause/Effect Debate: Connected Users creating their own news versus topdown traditional newspapers (last class discussion)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alexanyan/Professor/Others&#039;&#039;&#039;Russian Politics and Twitter, Blogosphere, etc: “The Russian political blogosphere supports more cross-linking debate than others we have studied (including the U.S. and Iranian), and appears less subject to the formation of self-referential ‘echo chambers”&lt;br /&gt;
“The online ‘news diet’ of Russian bloggers is more independent, international, and oppositional than that of Russian Internet users overall, and far more so than that of non-Internet users, who are more reliant upon state-controlled federal TV channels”&lt;br /&gt;
“Popular political YouTube videos focus on corruption and abuse of power by elites, the government, and the police”&lt;br /&gt;
These findings seem to support that Russia is embracing democracy and the old guard (which still apparently has a presence according to U.S. Media) is losing strength.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Kony2012&#039;&#039;&#039;Author: “Further, all human societies operate in a world of socially-constructed norms and ideals” ---- no mention of architecture&lt;br /&gt;
I may argue that slacktivism does contain some harms ---it seems the author doesn’t want to answer any criticisms of it, but just purely defend the symbolic nature of slacktivism even if the information is not accurate. Boy who cried wolf? I think it’s important for information to be accurate. I think people demand the truth, and more importantly are infuriated when they find out facts are different after they’ve went along with something (Iraq). We are pulling out of Iraq (long term view has yet to decide if this will be adverse or not).&lt;br /&gt;
As for Kony itself, we all know what its currently known for due to incident with leader arrest --- which further gives discussion to the effects of activism turned slacktivism.  Going back to why we have the phrase slacktivism is because of “mistakes” made in the original reporting.&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 17:45, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The articles I read for this week’s class were very intriguing and fascinating, especially since my final project deals with this argument to some extent. The first article was very interesting in general but it really got me thinking about the recent middle eastern and African dictatorships which have been overthrown by the people who gained access to mass media and communication systems to finally change an unpleasant system. The second article as well was very interesting and powerful in demonstrating the importance of the media and in this specific case social networks like Twitter. The article concerning Russia was fascinating in one sense but sad in another. I know for certain that what happens in Russia (politically speaking) is only a mask of what really happens and what people really think about the Government. Although it may seem that there is a certain freedom in the use of the internet, the truth is very far from this, the only difference is that what really happens is kept a secret most of the time, and those very few who are able to escape torture, prison and political assassinations, are able to flee and tell the world about their experiences. I really enjoyed Zeynep Tufekci’s article on Kony 2012 and I do agree with her totally for what concerns getting people to pay attention to what really is important and not just mundane activities but I feel that for the majority of the population at least now that is not the case nor will it be in the near future. It is often hard to convince the average person that there are extremely important issues out there which apparently don’t touch him but in order to change the system, should. The last article on Kony 2012 was also very interesting but my personal view on this matter is that I don’t believe that simply “sharing” or “liking” the campaign video will actually do anything to change the situation. Clicking “share” in my opinion is just a way of saying: ok, I saw it! But the question is: now what are you going to do? And the answer in my opinion is: nothing, just going to continue tweeting or posting about the next sport event etc. I might seem a bit too skeptical but this is my personal, and perhaps wrong, opinion on the matter at hand. [[User:Emanuele|Emanuele]] 18:05, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
There is a lot to be learned from KONY and #fremona. Collective action channeled through mediums like Twitter are more rapid and can reach a larger, more diverse swath of the population. These mediums are big and useful tools in these types of collective action campaigns. KONY helped those who are not typically involved in political activism (the younger age groups listed in the article) to get more involved/become more aware, and did so very quickly. I think that is one of the biggest strengths of social media. This is also evident in the article about Russian Twitter users. These people can now make their voices heard (although Tufekci points out the &amp;quot;rich get richer&amp;quot; phenomenon). The Gladwell article shows another perspective. I think it&#039;s important to not discount the masses who organize on the ground (the Moldovan protestors, Tehran protestors, etc), but to also keep in mind that social media platforms do play an important role and the dynamics of protests, campaigns, and collaborative efforts have changed. And, I think, for the better.&lt;br /&gt;
&lt;br /&gt;
I, too, wonder how Mona tweeted? I noticed in the article&#039;s comments that someone pointed out how &amp;quot;99%&amp;quot; of Egyptians don&#039;t have the technology (phone, apps, network connection) nor are they bilingual (can&#039;t as easily reach an international crowd) and they use word of mouth, therefore the article isn&#039;t representative. But both Mona and Trufekci qualify the powerful use of Twitter by saying most jailed Egyptians don&#039;t have that option. At the very least, Mona shed more light on the &amp;quot;languishing&amp;quot; plight of the jailed Egyptians/protestors, and she did so in a big way. [[User:Aberg|Aberg]] 19:47, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All of these articles were quite informative, and all together interesting regarding the nature of activism and social media.  However, I found one thing lacking in each of these articles; namely, popularity.  Zeynep began to touch on the subject when he addressed #Kony2012 activists, naming them slactivists.  His insight to the inactivity of those interested in activist movements was an exceptional read.  But I wish he would have taken it a step further and addressed the issue of popularity.  To analyze this you really have to analyze human behavior, which I won’t do here, but I’ll address it.  Regardless of the nature of the subject, what will trend through social media, whether it be activist causes or cat videos, will be what individuals find to be most appealing to their interests at that time based upon the knowledge they have on the particular nature of that subject.  In other words, if it sounds appealing to the individual, then it will retain that individual’s attention, and in retaining that attention, that individual will either seek other sources of information about that subject, or promote the information he just read.  &lt;br /&gt;
&lt;br /&gt;
This is simple trending, and simple mass appeal that all marketing firms know of and manipulate.  It’s clearly evident that this is also what has taken place through #Mona and #Kony.  Both of these trends became popular because they were able to pique the interest of so many, rather than actually meaning something.  I’m not trying to say that they didn’t mean something, but Zeynep was on to something when he mentioned all the other world problems that we ignore.  These subjects became popular, and eventually their popularity alone drew in many others to contribute to its popularity; and this is a trait that is special to social media.  I have not seen the Kony video, however, if I were to watch it, its view count would increase, and in effect, move up the ladder of trending topics, regardless of my interest.  An example of what I mean is the Rebecca Black song “Friday”.  The original version has 26 million views, and not all that watch it really likes that song; it has 5 times as many dislikes as likes.  But because it trends, more people are apt to watch the video, which adds to its count and adds it to the trend.&lt;br /&gt;
&lt;br /&gt;
The principle of my argument it that while social media does help these causes, as Zeynep states, it also follows popularity contests, which are subject to causes that are not congruous with the activist cause.  The greatest example is President Franklin Pierce.  He won the presidential election of 1852 in a landslide victory with virtually no political experience.  He was the most popular, not the greatest politician.  This came to light throughout his presidency, and to this day is the only incumbent president not to be re-nominated by his own party for reelection.  He became unpopular.  He was a fleeting trend that individuals promoted without knowing the actual nature of the trend, and once the nature of the trend is known, it falls into disfavor.  Zeynep points this out in Kony, and the Mona issue seems no different.  They trend because they seem appealing at the time, rather than actually being the issue that is assumed by those who popularize it.  I’m not saying that this is a bad thing, or that the topics are inherently inferior, but rather they won the popularity contest.[[User:Nthib|Nthib]] 21:03, 27 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the KONY article to be the most interesting of the bunch for this class.  In particular, I had many questions answered as to how that particular campaign went so viral while others for similiar causes have floundered.  It seems that &amp;quot;having pre-existing networks in place helped the initial spread of their message.&amp;quot; Apparently, laying the foundation with clusters of youth or other tech-savv demographics is paramount to a succesful online campaign.  Secondly, they used &amp;quot;attention philanthropy tactics&amp;quot; which mens they had high-profile celebrities increase their visibility substantially. I would argue that a third lever activated such a viral campaign in that the press came out and covered the spread of the campaign (both positively and negatively) which then spurred further dissemination.  That level of tv and print media coverage then drew in those who were not tech-savvy to begin with or may use it for other reasons than tweeting, facebook, etc. [[User:Cfleming27|Cfleming27]] 11:34, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
About Anne-Marie Slaughter’s article, it’s truly something to reflect on.  There is a power, which has been latent, but is no more latent.  That is the power of individual and collective opinion.  I say it was previously latent, because although some people are more outspoken than others, most people tend to remain silent, when they think it will cost them much to speak up about injustice or needed change, or if they feel they can do nothing about the situation.  Modern technology has put this human tendency into a new context, removing, at least in part, some of that “costliness” barrier.  It’s easy to send a tweet, and become, as Slaughter put it, another drop of water that can form a “tsunami”.  Although some places do their best to stop the rain of water drops, and manage to stop many drops, they can never stop them all, clouds condense in new places, and rain is bound to fall.  Modern technology is facilitating this new avenue for the torrents of water to form and flow, so the power is no longer latent.[[User:Mike|Mike]] 18:31, 28 March 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039;&lt;br /&gt;
(Posted on March 29, 2012 1:30pm EST {User: Harvard212|Harvard212)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what it expedited communication could look like in the matters of critical situations. Indeed, this class has long left the safe haven of talking loftily about law in theory, but an active agent through a &amp;quot;small&amp;quot; tool such as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural efficacy (and relevance). &lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the KONY inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed lens.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8261</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=8261"/>
		<updated>2012-03-29T17:28:16Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 5 Peer Production and Collaboration (Feb 21)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 6 Copyright in Cyberspace (Feb 28)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 7 New and Old Media, Participation, and Information (March 6)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 8 Collective Action and Decision-making (March 13)&#039;&#039;&#039;&lt;br /&gt;
(Posted on)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039;&lt;br /&gt;
(Posted on March 29, 2012)&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what it expedited communication could look like in the matters of critical situations. Indeed, this class has long left the safe haven of talking loftily about law in theory, but an active agent through a &amp;quot;small&amp;quot; tool such as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural efficacy (and relevance). &lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the KONY inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed lens.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 10 Control and Code: Privacy Online (April 3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 11 Internet and Democracy: The Sequel (April 10)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 Internet Infrastructure and Regulation (April 17)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 12 The Wikileaks Case (April 24)&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Class 13 Cybersecurity and Cyberwarfare (May 1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=8123</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=8123"/>
		<updated>2012-03-20T10:55:34Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 7&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012_Feb7.pdf Download this week&#039;s slides] (PDF)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_1:_Wikipedia|Assignment 1]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.citmedialaw.org/legal-guide/defamation Citizen Media Law Project Legal Guide: Defamation]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Funding_Evil#Libel_controversy Wikipedia entry on &#039;&#039;Funding Evil&#039;&#039;] (focus on &amp;quot;libel controversy&amp;quot; section)&lt;br /&gt;
* [http://iheid.revues.org/321 The SWIFT Affair]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU]&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
In light of the assignment due today, I thought people would enjoy some great (and surprisingly insightful) web comics:&lt;br /&gt;
[http://xkcd.com/978/ citogenesis]&lt;br /&gt;
[http://xkcd.com/903/ extended mind]&lt;br /&gt;
[http://xkcd.com/214/ the problem with Wikipedia]&lt;br /&gt;
[http://xkcd.com/285/ Wikipedia Protester]&lt;br /&gt;
&lt;br /&gt;
The first is especially pertinent, at least for my rule.&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 21:41, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://www.cbsnews.com/stories/2011/07/19/national/main20080685.shtml&lt;br /&gt;
&lt;br /&gt;
During our last class we discussed the hacking group Anonymous.  One of the concerns raised in the class addressed ramifications for hacking and the belief that these types of attacks are not pursued by law enforcement.  As it turns out the FBI has been arresting members of this group and seizing their equipment.  In addition to the written story there is a video interview (link above) of the self-proclaimed leader of Anonymous, Commander X, where he likens this groups activity to the sit-ins during protests in the 50’s and 60’s when the nation was advocating for civil rights.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Two (conflicting) thoughts:&lt;br /&gt;
&lt;br /&gt;
1. I appreciate the analogy and disagree with the announcer who dismisses the likeness out-of-hand.&lt;br /&gt;
&lt;br /&gt;
2. I would agree with the analogy if, indeed, each “request for information” were being initiated by a separate and distinct person exercising their individual right to voice their concern.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The CDA Section 230 is a very crucial starting point of discussion for nowadays legal online processes. As John Palfrey exposed, time has passed and different situations have happened since the creation of it, and it&#039;s likely that those who created it didn&#039;t anticipate the immunity provided by this document. Although I agree with Adam that Section 230 has been crucial to the success of the Internet, I feel inclined to support John Palfrey in his ideas of re-examine it. He provides strong arguments to support his ideas, saying for example that although it would be less speech and innovation opportunities, it is a trade-off that has to be made. Since in some cases it is relatively easy to change from an online distributor to a online publisher, shielding intermediaries, I think Section 230 has to be changed. Also, I like John Plalfrey&#039;s idea that the great innovation would be present, in terms of technical safety measures to protect kids. Although in the article he referred to kid&#039;s safety, I believe this idea can be extended to the other online legal discussions. [[User:Fabiancelisj|Fabiancelisj]] 20:57, 7 February 2012 (UTC)    &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  I have to disagree with you on that point about Section 230 being the major reason for the success of the internet.  BBSes and the minitel were extremely successful.  Back in 1994, when I got my 1400 baud modem, I would love to call up AOL, or CompuServe. And I think that the world was just waiting for the internet to really explode on to the scene -- it really wanted it to happen.  I remember AOL allowing users to go on to the internet, what a trip that was.  At that time you had to connect through a University, or through a service like AOL or eWorld.  So, I don&#039;t think that Section 230 had much to do with the success of the internet.  I see it as more of something that was waiting to happen regardless.  Now, in terms of timing, and the new world order 9/11 fits directly in place -- particularly when it comes to sidestepping protocol and established laws. I see Section 230 changing with that trend.  Call it the Wal-Mart, Subway, McDonals, etc. trend, like so fifteen minutes ago.  So, we went from a controlled environment like AOL which was in your home town with your local provider to the internet, to be given total freedom, only to go back to control with sites like Facebook and Google.  Go figure. [[User:Just Johnny|Just Johnny]] 06:33, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
These computers, servers, and platforms are designed to accommodate millions of simultaneous, legitimate, requests.  I don’t believe that there are millions of Anonymous members initiating these requests, rather a handful of protesters mimicking multiple users.  So in this case the analogy fails as “the people” are not adequately represented through a First Amendment protection to assemble.  A more accurate analogy would be that two or three individuals went to Woolworths lunch counter to “sit-in” but each brought with them 150 manikins with made-up names, claiming that these were their friends in support.  Lastly, I’m not sure that I completely buy the idea that their hacking methods are simply an overwhelming volume of requests for information.  I believe that the method by which these attacks were initiated were a bit more technically complicated than that.[[User:Louiscelli|Louiscelli]] 13:24, 1 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Louiscelli: &amp;quot;I believe that the method by which these attacks were initiated were a bit more technically complicated than that.&amp;quot; Interesting point. I tend to think that it is human nature to assume things automatically, and not always true.  Who is to say who these hackers are?  For instance, antivirus software distros regularly put out viruses to perpetuate the need to buy antivirus software.  They could be anyone, and really used for any reason.  I just have to laugh at the people who simply believe what they are told through the media.  [[User:Just Johnny|Just Johnny]] 06:20, 1 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
RE Louiscelli on Anonymous Article: As far as I know, the basic idea behind the attacks is no different than when any page receives a surge in traffic that crashes their servers. It&#039;s coordinated, yes, but so is any form of protest. If that is the case, then I see no problem with the basic idea. How it is carried out however, is much more likely to be troublesome. Again, so far as I know, a botnet attack would be the most likely form of attack. This involves basically conscripting other users computers for the attack. I&#039;m sure there are many other ways to accomplish a similar effect, but I doubt any of them are anything I could approve of, short of installing massive server banks in your basement. Of course, I could be wrong on all counts here. &lt;br /&gt;
&lt;br /&gt;
That leads me to a more general point, which is that whenever it comes to regulating speech online (or even in the real world, much of the time), I on one hand see why some want to tighten the restrictions around speech, at least on the extremes. On the other hand, I don&#039;t see any practical (or non-arbitrary) way of drawing a line, or any practical ways of enforcing it that aren&#039;t worse than what the restrictions would be seeking to stop. And then I also see the positives, even from information that supposedly &amp;quot;clearly&amp;quot; should not be available.&lt;br /&gt;
&lt;br /&gt;
Take Wikileaks, for example. I can see why the Pentagon wanted to keep the data secret (especially in its raw form). I understand taking legal action against the person who illegally leaked the documents, since it is military law acting on military personnel, in marshal courts. On the other hand, I think that the availability of information on Wikileaks has been a great thing, especially in terms of the very real threat to government of ordinary people learning what is happening out of the public eye. Then, in a practical note, I don&#039;t see any way of censoring any part of the network without trampling on what makes it so important. First off, you have so many content generators (even down to tweets) that there&#039;s no possible way to get human eyes on every bit, or even any significant amount of, information that would be potentially censored under even the mildest restrictions. Machines don&#039;t do a great job at judgement. A computer can&#039;t tell the difference between a plot to blow up a government building and a discussion on how overblown fears of terrorism are causing us to lose our civil rights. Then on a more ethical line, there&#039;s always the question of who decides what the thresholds are. &lt;br /&gt;
&lt;br /&gt;
On one hand, I see why the government would want to keep information secret; on the other, I don&#039;t think they can without stopping valuable whistle blowers. On one hand I realize that copyright holders want to protect their work; On the other, I see how even now, even the little bit of enforcement that is happening hinders fair use and legitimate access. On one hand, I agree that people should be able to sue malicious bloggers; on the other, I don&#039;t think bloggers should enjoy any less protection than any other publication. In the end, I just end up seeing the less restricted flow of information as far more beneficial than harmful, and the harms from less restriction as the least evil option. That was the conclusion I came to once again with this week&#039;s reading.&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 13:28, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@BlakeGeno:  Interesting point about regulating speech online.  I think what we are getting at is targeting dissidents. Primarily, with sites like WikiLeaks, there is a bit of a double standard at work.  [[User:Just Johnny|Just Johnny]] 07:00, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Louiscelli, nice find on that article.  I agree with you that it seems a bit disingenuous for hackers like Anonymous to claim that they have very broad protest-type support when in fact most of their major actions are committed by a small and central group. As a devil&#039;s advocate thought experiment though, is this simply a difference of opportunity?  That is, it&#039;s physically easy for almost any person to walk into a diner and conduct a &amp;quot;sit-in&amp;quot; to support their views.  It is physically (in terms of technical skill) much much harder to have the hacking skills necessary to do the things Anonymous has been doing.  It seems possible that their protests are conducted by such a small group of people simply because those are all of the people who possess those skills, and not because those are all of the people who support the protest.  From a purely social protest perspective, their point is no less theoretically valid simply because it is one that is hard to physically make.&lt;br /&gt;
&lt;br /&gt;
From the readings, I really enjoyed the dialogue on online obscenity/CDA230/possible increased liability for online service providers; I found myself agreeing largely with Thierer that increased liability would be a bad Pandora&#039;s Box to open.  Palfrey says that he agrees many cases would be brought from every conceivable direction if liability for providers was opened up wider, but he counters that most providers would be fully protected from liability even with the practices they follow now and extensive litigation could also have some positive effects as a motivator.  My concern with this argument is that cases can be (and sometimes are) brought for bad reasons, knowing they will fail, but a plaintiff with massive wealth can still keep them alive almost indefinitely, at great expense (in time, money, and bad press)to the defendant.  Especially in a clash between the wide-open individual innovation possible on the internet and various wealthy real world entities that have agendas to pursue, this sort of legal bullying could stifle all but the most established and wealthy internet innovators, seriously harming the most positive aspect of the internet.&lt;br /&gt;
&lt;br /&gt;
Funding Evil&#039;s various details provided an interesting look at how the problem of different geography and law systems can become tangled up and sometimes abused when internet content is at issue.  I&#039;m very troubled by the idea that a wealthy individual or group could always create themselves some business interests in a country with very harsh libel standards and then use that as a basis to go after people online through that favorable court system.  On a related international-type note, I&#039;m amazed that I&#039;ve never heard of SWIFT before or realized how thoroughly it controls information about the vast majority of global finance.  Well done them for so successfully pursuing their goal of staying out of the headlines, and amazing that it was possible in this internet age.  Don&#039;t want to turn this too political, but it amused me that American conservatives/Republicans were outraged at the NY Times publication of info about this network and how the U.S. was using it to track terrorist financing but not at all about SWIFT itself... Isn&#039;t a massive, monolithic, European entity that almost fully controls an entire aspect of life even for Americans the exact thing every Republican presidential candidate has been railing against when the subject is changed from &amp;quot;global finance&amp;quot; to &amp;quot;health care&amp;quot;? [[User:AlexLE|AlexLE]] 19:55, 4 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The articles we were asked to read for this week’s class were extremely interesting and got me thinking on several matters. As a student with a legal background and pursuing a Master’s degree in the field of law, the articles I read were very relevant to my field of study. I enjoyed reading about defamation and free speech in general but what really got me interested were the last three articles. The dialogue between John Palfrey and Adam Thierer regarding the regulation of online obscenity and protection under Section 230 of the Communications Decency Act raised some very valid points on both sides. After reading the whole article I do however feel more close to the points raised by John Palfrey. I personally feel that even though Social Networks and other ISP are not responsible for what other people do in their sites, I feel that obscenity and other issues regarding minors especially would be limited if not eliminate if the site creators were not protected by the CDA. If they felt as if they could possibly be charged with a crime, I am sure that they would make their websites more secure and try to filter the usage of these websites by wrongdoers. For what concerns the Funding Evil article, I feel that the author should have been more careful in regards to her statements since nowadays even though a book, object or any other product is not sold outside a given country, thanks to the internet it is still possible to gain access to it. Her book wasn’t meant to be sold or published in the United Kingdom but somehow people did buy the book and in my opinion she should have thought of that earlier before writing defamatory statements about Mr. Mahfouz. By doing some research on the author I did find out that she is quite an expert on the matter and therefore I am sure there were valid reasons to back up her statements even though they were never proved. Writing something which doesn’t break the law in one country but does in another reminds me of the series of Danish cartoons designed a few years ago where Islam was made fun of, and the reactions that occurred from the middle east where such offense was a violation of their law. The Swift affair however was the most interesting article in my opinion because I was able to learn more about such system but also to learn about what was done by the CIA to fight terror. This summer while I was in a middle eastern country I had the pleasure to meet and spend a week with people from the Canadian Special Forces and some U.S. Government employees and we often talked about ways of fighting terrorism, especially in modern times. What we all agreed on was to eliminate the funds for terrorism by hitting the funders, therefore this article was really fascinating to me in order to understand how the CIA has been working on SWIFT databases in order to do so. What I don’t agree on, however is the fact that the US Government were only allowed to search terrorism cases. I don’t agree because I am confident that much funding is done through drug trafficking and arms dealing, especially since these limits have been publicized thanks to the media. [[User:Emanuele|Emanuele]] 15:58, 6 February 2012 (UTC)&lt;br /&gt;
For Commander X liken his group’s activities to the “sit-ins” advocating for civil rights is a slap in our faces. There’s absolutely no connection between hacking no matter the cause and civil rights; If the deeds of Anonymous contained a shred of nobility, they would put their faces on media outlets, and their peers would cheer them on.&lt;br /&gt;
It is my opinion that Anonymous has other ulterior motives in what they do. I am happy to see that the FBI is up to speed with technology, where people and groups like Anonymous are arrested and hopefully prosecuted. Sophia February 6, 2012 10:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The group Anonymous has been followed closely by law enforcement officials around the globe. In fact, on February 3, 2012, [http://www.youtube.com/watch?v=Ryq1v-cLHrk Anonymous posted a conference call between the FBI and Scotland Yard] discussing the group’s members and the response by law enforcement. It seems there is an organized global campaign to identify and arrest Anonymous members that are participating in “hacktivism”. &lt;br /&gt;
&lt;br /&gt;
A DDoS attack works by overloading servers and thus forcing them to become unresponsive. It is not that Anonymous has millions of followers sending these requests to various websites, but that Anonymous is mimicking legitimate requests. Anonymous uses an open source application called Low Orbit Ion Cannon (LOIC) to accomplish DDOS attacks. Recently, a LOIC application has been written in JavaScript, allowing web browsers to run the software without any downloads. This allows Anonymous to use the resources of unsuspecting and non-committing users to accomplish their DDoS attacks.&lt;br /&gt;
&lt;br /&gt;
This is what I believe to be the crux of the problem. That is, as a hacktivism organization, does Anonymous have the right to use unsuspecting Internet users to accomplish their goals? Anonymous likens their actions to sit-ins during the civil rights movement but everyone who sat in made the conscious choice to participate. That is not the case today with Anonymous. &lt;br /&gt;
&lt;br /&gt;
Even though there is more skill required for a DDoS attack than participating in a sit-in as protestors did during the civil rights movement, I don’t think that knowledge barrier is a justification to take advantage of a user’s resources that are not actively protesting with your organization.  &lt;br /&gt;
&lt;br /&gt;
I don’t think that Anonymous would be as successful if they did not take advantage of other users not affiliated with their group. By definition of a DDoS, you need massive resources to take down a website. In contrast, a sit in can be effective with a handful of protestors. &lt;br /&gt;
&lt;br /&gt;
While Anonymous needs the resources of others to have successful DDoS attacks, I don’t think that alone negates the activism they participate in. A successful DDoS requires massive resources. Without pooling bandwidth from multiple users, the DDoS would not be successful. The fact is that Anonymous acquired the bandwidth and directed it at targeted servers to participate in the activism they deem worthy. I don’t think we should claim that their group is any less of a protest organization because they don’t have the millions of members required to produce DDoS attacks. [[User:chrism|chrism]] February 7, 2012 19:33 UTC&lt;br /&gt;
&lt;br /&gt;
While I had written a lengthy response to the Anonymous article, unfortunately, @chrism explained a lot of what I had written.  However, let me go further and state that Anonymous is not the organization that it is purported to be.  While tools like LOIC enable greater numbers to participate in DDoS attacks, each attack is not an organized effort.  The members of Anonymous do not necessarily know one another, they do not have to speak the same language, nor even live in the same country.  Any individual can be a member of Anonymous so long as they have a computer and an internet connection.  The mechanics of their operation is fairly simple once understood.  Using message board services like 4chan, individuals are able to anonymously suggest sites for attacks.  Once a site is agreed upon, which usually relates to the suppression of freedom on the internet, such as PayPal, who gave in to the pressures of cutting off Wikileaks, or the MPAA and RIAA after MegaUpload went under, those anonymous individuals use an anonymizing services such as Tor, LOIC and others to make their attacks.  Then someone somewhere uses the name Anonymous to claim the attack.  &lt;br /&gt;
&lt;br /&gt;
It&#039;s simple in its design, and since the internet is a globally connected community, members of Anonymous can live anywhere there is an internet connection, and do not necessarily have to be American.  Even still further, members of Anonymous do not have to know one another, nor do they have to be experienced computer hackers, or for that matter, good at all with computers.  They could be a thirteen year old kid who was shown how to use this basic program for simple executions, which might only appear to him as minute acts of vandalism.  The repercussions of which, however, are far greater.  But it still stand that the group known as Anonymous is a loosely based group of like-minded individuals from anywhere.  The group is exceptionally fluid, and while Commander X claims he orchestrated attacks, in reality it was the collective consensus of unaffiliated individuals that made it happen, not some organized crime syndicate.  &lt;br /&gt;
&lt;br /&gt;
@chrism, while I do like what you have added, it needs to be clarified that a huge number of individual computers had to have been used for the DDoS attacks to be effective.  I don&#039;t disagree that LOIC was used.  But I wish to broaden my horizons to areas outside of the U.S. to the countries that would like to see American Corporations fail.  I&#039;m not suggesting that LOIC and DDoS attacks are orchestrated by foreign military cyber-warfare divisions, but I could see a bunch of Europeans or Asians not caring if an American corporation was taken out, so they go ahead and cooperate with the Anonymous attack.  [[User:Nthib|Nthib]] 20:22, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I found the arguments between Palfrey and Thierer most interesting in this week’s readings. I agree with Palfrey that a hands-off approach to online security by the government is of concern. I feel that there should be more regulation to protect people’s privacy and child safety online. However, how and to what extent should we fiddle with Section 230? So, I am torn between these two views and also agree that online restriction would lead to less innovation. I think that the consumers, such as the parents, can take more initiative to monitor and protect their children’s online safety. For example, they can restrict a child from using Facebook if they feel that he/she may be harmed for visiting social networking sites. [[User:Qdang|Qdang]] 20:44, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I enjoyed reading David Ardia&#039;s explanation of Section 230 of the Communications Decency Act and how it impacts online speech. Judge Ain&#039;s response to the Stratton Oakmont decision was shocking to me. To suggest that Prodigy would be better off limiting their oversight on material that is posted to the site for fear of liability goes against what the CDA was fighting for - to protect children from harmful material on the Internet. Without a proper legal backing intermediaries do not have an incentive to protect children from harmful material for fear of liability. It appears that Section 230 was written in such a way to protect intermediaries not to provide oversight for environments created by intermediaries.  [[User: Hds5]] 16:43, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
What a difficult subject, that of how much freedom of speech we should have in society, and how much responsibility that implies.  On the one hand, if all &amp;quot;whistleblowers&amp;quot; are suffocated, society is in trouble, and in fact, the US would not exist, possibly, but if there is a free for all on speech which does hurt and is used irresponsibly, this is not good for any society.  The question come up about who can judge this.  Possibly, the solution is not about an &amp;quot;who&amp;quot; can judge, but what form of law can judge.  People can be arbitrary, but laws are meant to be objective.  Personally, I do believe what Jesus said about everything boiling down to two commandments: Love God and love others as much as you love yourself; but in practice, we just don&#039;t seem to have that much love to do it on a daily, massive scale, so we need to have a lot more laws, at least for now, at our stage of maturity.  I think it is better to restrict some, so that there is not a free-for-all which degrades society, but there must be care to allow for freedom of opinion, belief, and within guidelines, freedom of speech.&lt;br /&gt;
[[User:Mike|Mike]] 21:55, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would like to know more or hear anyone&#039;s input on why these networks need to be regulated in the first place. Is it because the network connections travel across state lines? What about a network that is operated inside a state used by a native of that state? If these networks/businesses and the lines that connect them are all private companies why are they subject to regulation, for the most part, in the first place? [[User:Brendanlong|Brendanlong]] 22:26, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
CDA 230 provides too much immunity to intermediaries, almost encouraging them to be negligent. I agree with Palfrey that an intermediary&#039;s immunity is extended too broadly. I don&#039;t think it would stifle innovation if CDA 230&#039;s immunity was  extended more narrowly. It would most likely result in less negligence on behalf of the intermediary (which, according to Palfrey, is happening to a small degree already). [[User:Aberg|Aberg]] 22:30, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
February 7: Regulating Speech Online&lt;br /&gt;
&lt;br /&gt;
“The US Treasury Department therefore has the right to issue administrative subpoenas (administrative orders) to receive information helpful in the fight against terrorism.  Those subpoenas are secret and are not subject to review by any judge or jury (Meyer and Miller 2006).”  &lt;br /&gt;
&lt;br /&gt;
What I think is actually really compelling about the SWIFT Affair is that there are very different opinions when it comes to surrounding the legality of United States authorization outside of United States jurisdiction, expanding powers, and so on and so forth.  Here, I see a clear and very distinct transition from the early part of the article toward the more immediate style of post 9/11 ruthlessness.  &lt;br /&gt;
&lt;br /&gt;
Just what happens in the meantime between this transition to the new world order is what seems most problematic.  Who is left out in the cold, and who gets to ride high on the new wave?  Just how are these &#039;&#039;second class US citizens&#039;&#039; fit into the overall landscape of the new world order?  It is a slow and painful process.  &lt;br /&gt;
&lt;br /&gt;
However, one of the main ways that we can change norms is through the media.  By controlling the media consumption of a particular population, we can slowly shape and change cultural norms.  Other institutions – such as government, educational, as well as religious pillars all shift when new norms are planted by way of mass media consumerism.  The process slowly continues with each new generation.  And there is resistance within older generations.  Particularly within Europe, globalization has hit a bit of a halt.  Although progress within these regions will likely continue through United States intelligence, there is a bit of a lag primarily due to language as well as strong religious barriers set in deep-rooted cultural history.  The Vatican, for instance, controls quite a considerable amount of the population of the planet through religion.  And the physical reality set in the landscape of most of Europe is very rich, full of art and architecture -- which plays a strong role in dictating cultural behavior.  Euro-Disney has remained open, even as the French don&#039;t seem all that interested in it.  Those who do not watch television, listen to the radio, play video games, watch films, and are not engaged in mass culture are basically immune.  Yet, for those people we have Google, and now Facebook.  Great Britain still has power, although is not what it used to be after colonization and World War 2.  And the United States – as US intelligence would have us accept – has picked up the torch, so to speak, from Great Britain.  Just how far humanity will go has yet to be seen, but progress continues.  And for the most part, it seems to become a world&#039;s strongest man competition when it comes to the command of power across legal boundaries.  &lt;br /&gt;
&lt;br /&gt;
&amp;quot;In 1976, the US Supreme Court ruled that Americans have no constitutional right to privacy over their banking records. Following that decision, US Congress passed the &#039;Right to Financial Privacy Act&#039; in 1978 to re-establish privacy rights for US bank customers. (Connorton 2007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
What I am really wondering about here is whether or not, if ever, most of these post 9/11 laws are going to be retracted ... yet, gone with the wind.  &lt;br /&gt;
&lt;br /&gt;
&amp;quot;US lawyers have nevertheless tried to sue SWIFT for violating their privacy rights under the Financial Privacy Act. Ian Walker and Stephen Kruse filed a class action lawsuit in a federal court the same day that the New York Times revealed the program, on 26 June 2006. They claimed that the US federal executive branch violated their privacy rights by obtaining their financial data through the SWIFT network.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
I do see a problem in that these new and expansive post 9/11 surveilance powers do conflict with pre-existing privacy laws.  Of course, from this stems primary concerns about [[legitimacy]].  &lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 07:13, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech. Previously loaded to Harvard212MyTalk.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=8122</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=8122"/>
		<updated>2012-03-20T10:54:49Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 7&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012_Feb7.pdf Download this week&#039;s slides] (PDF)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_1:_Wikipedia|Assignment 1]] due&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.citmedialaw.org/legal-guide/defamation Citizen Media Law Project Legal Guide: Defamation]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Funding_Evil#Libel_controversy Wikipedia entry on &#039;&#039;Funding Evil&#039;&#039;] (focus on &amp;quot;libel controversy&amp;quot; section)&lt;br /&gt;
* [http://iheid.revues.org/321 The SWIFT Affair]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU]&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
In light of the assignment due today, I thought people would enjoy some great (and surprisingly insightful) web comics:&lt;br /&gt;
[http://xkcd.com/978/ citogenesis]&lt;br /&gt;
[http://xkcd.com/903/ extended mind]&lt;br /&gt;
[http://xkcd.com/214/ the problem with Wikipedia]&lt;br /&gt;
[http://xkcd.com/285/ Wikipedia Protester]&lt;br /&gt;
&lt;br /&gt;
The first is especially pertinent, at least for my rule.&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 21:41, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://www.cbsnews.com/stories/2011/07/19/national/main20080685.shtml&lt;br /&gt;
&lt;br /&gt;
During our last class we discussed the hacking group Anonymous.  One of the concerns raised in the class addressed ramifications for hacking and the belief that these types of attacks are not pursued by law enforcement.  As it turns out the FBI has been arresting members of this group and seizing their equipment.  In addition to the written story there is a video interview (link above) of the self-proclaimed leader of Anonymous, Commander X, where he likens this groups activity to the sit-ins during protests in the 50’s and 60’s when the nation was advocating for civil rights.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Two (conflicting) thoughts:&lt;br /&gt;
&lt;br /&gt;
1. I appreciate the analogy and disagree with the announcer who dismisses the likeness out-of-hand.&lt;br /&gt;
&lt;br /&gt;
2. I would agree with the analogy if, indeed, each “request for information” were being initiated by a separate and distinct person exercising their individual right to voice their concern.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The CDA Section 230 is a very crucial starting point of discussion for nowadays legal online processes. As John Palfrey exposed, time has passed and different situations have happened since the creation of it, and it&#039;s likely that those who created it didn&#039;t anticipate the immunity provided by this document. Although I agree with Adam that Section 230 has been crucial to the success of the Internet, I feel inclined to support John Palfrey in his ideas of re-examine it. He provides strong arguments to support his ideas, saying for example that although it would be less speech and innovation opportunities, it is a trade-off that has to be made. Since in some cases it is relatively easy to change from an online distributor to a online publisher, shielding intermediaries, I think Section 230 has to be changed. Also, I like John Plalfrey&#039;s idea that the great innovation would be present, in terms of technical safety measures to protect kids. Although in the article he referred to kid&#039;s safety, I believe this idea can be extended to the other online legal discussions. [[User:Fabiancelisj|Fabiancelisj]] 20:57, 7 February 2012 (UTC)    &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  I have to disagree with you on that point about Section 230 being the major reason for the success of the internet.  BBSes and the minitel were extremely successful.  Back in 1994, when I got my 1400 baud modem, I would love to call up AOL, or CompuServe. And I think that the world was just waiting for the internet to really explode on to the scene -- it really wanted it to happen.  I remember AOL allowing users to go on to the internet, what a trip that was.  At that time you had to connect through a University, or through a service like AOL or eWorld.  So, I don&#039;t think that Section 230 had much to do with the success of the internet.  I see it as more of something that was waiting to happen regardless.  Now, in terms of timing, and the new world order 9/11 fits directly in place -- particularly when it comes to sidestepping protocol and established laws. I see Section 230 changing with that trend.  Call it the Wal-Mart, Subway, McDonals, etc. trend, like so fifteen minutes ago.  So, we went from a controlled environment like AOL which was in your home town with your local provider to the internet, to be given total freedom, only to go back to control with sites like Facebook and Google.  Go figure. [[User:Just Johnny|Just Johnny]] 06:33, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
These computers, servers, and platforms are designed to accommodate millions of simultaneous, legitimate, requests.  I don’t believe that there are millions of Anonymous members initiating these requests, rather a handful of protesters mimicking multiple users.  So in this case the analogy fails as “the people” are not adequately represented through a First Amendment protection to assemble.  A more accurate analogy would be that two or three individuals went to Woolworths lunch counter to “sit-in” but each brought with them 150 manikins with made-up names, claiming that these were their friends in support.  Lastly, I’m not sure that I completely buy the idea that their hacking methods are simply an overwhelming volume of requests for information.  I believe that the method by which these attacks were initiated were a bit more technically complicated than that.[[User:Louiscelli|Louiscelli]] 13:24, 1 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Louiscelli: &amp;quot;I believe that the method by which these attacks were initiated were a bit more technically complicated than that.&amp;quot; Interesting point. I tend to think that it is human nature to assume things automatically, and not always true.  Who is to say who these hackers are?  For instance, antivirus software distros regularly put out viruses to perpetuate the need to buy antivirus software.  They could be anyone, and really used for any reason.  I just have to laugh at the people who simply believe what they are told through the media.  [[User:Just Johnny|Just Johnny]] 06:20, 1 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
RE Louiscelli on Anonymous Article: As far as I know, the basic idea behind the attacks is no different than when any page receives a surge in traffic that crashes their servers. It&#039;s coordinated, yes, but so is any form of protest. If that is the case, then I see no problem with the basic idea. How it is carried out however, is much more likely to be troublesome. Again, so far as I know, a botnet attack would be the most likely form of attack. This involves basically conscripting other users computers for the attack. I&#039;m sure there are many other ways to accomplish a similar effect, but I doubt any of them are anything I could approve of, short of installing massive server banks in your basement. Of course, I could be wrong on all counts here. &lt;br /&gt;
&lt;br /&gt;
That leads me to a more general point, which is that whenever it comes to regulating speech online (or even in the real world, much of the time), I on one hand see why some want to tighten the restrictions around speech, at least on the extremes. On the other hand, I don&#039;t see any practical (or non-arbitrary) way of drawing a line, or any practical ways of enforcing it that aren&#039;t worse than what the restrictions would be seeking to stop. And then I also see the positives, even from information that supposedly &amp;quot;clearly&amp;quot; should not be available.&lt;br /&gt;
&lt;br /&gt;
Take Wikileaks, for example. I can see why the Pentagon wanted to keep the data secret (especially in its raw form). I understand taking legal action against the person who illegally leaked the documents, since it is military law acting on military personnel, in marshal courts. On the other hand, I think that the availability of information on Wikileaks has been a great thing, especially in terms of the very real threat to government of ordinary people learning what is happening out of the public eye. Then, in a practical note, I don&#039;t see any way of censoring any part of the network without trampling on what makes it so important. First off, you have so many content generators (even down to tweets) that there&#039;s no possible way to get human eyes on every bit, or even any significant amount of, information that would be potentially censored under even the mildest restrictions. Machines don&#039;t do a great job at judgement. A computer can&#039;t tell the difference between a plot to blow up a government building and a discussion on how overblown fears of terrorism are causing us to lose our civil rights. Then on a more ethical line, there&#039;s always the question of who decides what the thresholds are. &lt;br /&gt;
&lt;br /&gt;
On one hand, I see why the government would want to keep information secret; on the other, I don&#039;t think they can without stopping valuable whistle blowers. On one hand I realize that copyright holders want to protect their work; On the other, I see how even now, even the little bit of enforcement that is happening hinders fair use and legitimate access. On one hand, I agree that people should be able to sue malicious bloggers; on the other, I don&#039;t think bloggers should enjoy any less protection than any other publication. In the end, I just end up seeing the less restricted flow of information as far more beneficial than harmful, and the harms from less restriction as the least evil option. That was the conclusion I came to once again with this week&#039;s reading.&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 13:28, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@BlakeGeno:  Interesting point about regulating speech online.  I think what we are getting at is targeting dissidents. Primarily, with sites like WikiLeaks, there is a bit of a double standard at work.  [[User:Just Johnny|Just Johnny]] 07:00, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Louiscelli, nice find on that article.  I agree with you that it seems a bit disingenuous for hackers like Anonymous to claim that they have very broad protest-type support when in fact most of their major actions are committed by a small and central group. As a devil&#039;s advocate thought experiment though, is this simply a difference of opportunity?  That is, it&#039;s physically easy for almost any person to walk into a diner and conduct a &amp;quot;sit-in&amp;quot; to support their views.  It is physically (in terms of technical skill) much much harder to have the hacking skills necessary to do the things Anonymous has been doing.  It seems possible that their protests are conducted by such a small group of people simply because those are all of the people who possess those skills, and not because those are all of the people who support the protest.  From a purely social protest perspective, their point is no less theoretically valid simply because it is one that is hard to physically make.&lt;br /&gt;
&lt;br /&gt;
From the readings, I really enjoyed the dialogue on online obscenity/CDA230/possible increased liability for online service providers; I found myself agreeing largely with Thierer that increased liability would be a bad Pandora&#039;s Box to open.  Palfrey says that he agrees many cases would be brought from every conceivable direction if liability for providers was opened up wider, but he counters that most providers would be fully protected from liability even with the practices they follow now and extensive litigation could also have some positive effects as a motivator.  My concern with this argument is that cases can be (and sometimes are) brought for bad reasons, knowing they will fail, but a plaintiff with massive wealth can still keep them alive almost indefinitely, at great expense (in time, money, and bad press)to the defendant.  Especially in a clash between the wide-open individual innovation possible on the internet and various wealthy real world entities that have agendas to pursue, this sort of legal bullying could stifle all but the most established and wealthy internet innovators, seriously harming the most positive aspect of the internet.&lt;br /&gt;
&lt;br /&gt;
Funding Evil&#039;s various details provided an interesting look at how the problem of different geography and law systems can become tangled up and sometimes abused when internet content is at issue.  I&#039;m very troubled by the idea that a wealthy individual or group could always create themselves some business interests in a country with very harsh libel standards and then use that as a basis to go after people online through that favorable court system.  On a related international-type note, I&#039;m amazed that I&#039;ve never heard of SWIFT before or realized how thoroughly it controls information about the vast majority of global finance.  Well done them for so successfully pursuing their goal of staying out of the headlines, and amazing that it was possible in this internet age.  Don&#039;t want to turn this too political, but it amused me that American conservatives/Republicans were outraged at the NY Times publication of info about this network and how the U.S. was using it to track terrorist financing but not at all about SWIFT itself... Isn&#039;t a massive, monolithic, European entity that almost fully controls an entire aspect of life even for Americans the exact thing every Republican presidential candidate has been railing against when the subject is changed from &amp;quot;global finance&amp;quot; to &amp;quot;health care&amp;quot;? [[User:AlexLE|AlexLE]] 19:55, 4 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The articles we were asked to read for this week’s class were extremely interesting and got me thinking on several matters. As a student with a legal background and pursuing a Master’s degree in the field of law, the articles I read were very relevant to my field of study. I enjoyed reading about defamation and free speech in general but what really got me interested were the last three articles. The dialogue between John Palfrey and Adam Thierer regarding the regulation of online obscenity and protection under Section 230 of the Communications Decency Act raised some very valid points on both sides. After reading the whole article I do however feel more close to the points raised by John Palfrey. I personally feel that even though Social Networks and other ISP are not responsible for what other people do in their sites, I feel that obscenity and other issues regarding minors especially would be limited if not eliminate if the site creators were not protected by the CDA. If they felt as if they could possibly be charged with a crime, I am sure that they would make their websites more secure and try to filter the usage of these websites by wrongdoers. For what concerns the Funding Evil article, I feel that the author should have been more careful in regards to her statements since nowadays even though a book, object or any other product is not sold outside a given country, thanks to the internet it is still possible to gain access to it. Her book wasn’t meant to be sold or published in the United Kingdom but somehow people did buy the book and in my opinion she should have thought of that earlier before writing defamatory statements about Mr. Mahfouz. By doing some research on the author I did find out that she is quite an expert on the matter and therefore I am sure there were valid reasons to back up her statements even though they were never proved. Writing something which doesn’t break the law in one country but does in another reminds me of the series of Danish cartoons designed a few years ago where Islam was made fun of, and the reactions that occurred from the middle east where such offense was a violation of their law. The Swift affair however was the most interesting article in my opinion because I was able to learn more about such system but also to learn about what was done by the CIA to fight terror. This summer while I was in a middle eastern country I had the pleasure to meet and spend a week with people from the Canadian Special Forces and some U.S. Government employees and we often talked about ways of fighting terrorism, especially in modern times. What we all agreed on was to eliminate the funds for terrorism by hitting the funders, therefore this article was really fascinating to me in order to understand how the CIA has been working on SWIFT databases in order to do so. What I don’t agree on, however is the fact that the US Government were only allowed to search terrorism cases. I don’t agree because I am confident that much funding is done through drug trafficking and arms dealing, especially since these limits have been publicized thanks to the media. [[User:Emanuele|Emanuele]] 15:58, 6 February 2012 (UTC)&lt;br /&gt;
For Commander X liken his group’s activities to the “sit-ins” advocating for civil rights is a slap in our faces. There’s absolutely no connection between hacking no matter the cause and civil rights; If the deeds of Anonymous contained a shred of nobility, they would put their faces on media outlets, and their peers would cheer them on.&lt;br /&gt;
It is my opinion that Anonymous has other ulterior motives in what they do. I am happy to see that the FBI is up to speed with technology, where people and groups like Anonymous are arrested and hopefully prosecuted. Sophia February 6, 2012 10:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The group Anonymous has been followed closely by law enforcement officials around the globe. In fact, on February 3, 2012, [http://www.youtube.com/watch?v=Ryq1v-cLHrk Anonymous posted a conference call between the FBI and Scotland Yard] discussing the group’s members and the response by law enforcement. It seems there is an organized global campaign to identify and arrest Anonymous members that are participating in “hacktivism”. &lt;br /&gt;
&lt;br /&gt;
A DDoS attack works by overloading servers and thus forcing them to become unresponsive. It is not that Anonymous has millions of followers sending these requests to various websites, but that Anonymous is mimicking legitimate requests. Anonymous uses an open source application called Low Orbit Ion Cannon (LOIC) to accomplish DDOS attacks. Recently, a LOIC application has been written in JavaScript, allowing web browsers to run the software without any downloads. This allows Anonymous to use the resources of unsuspecting and non-committing users to accomplish their DDoS attacks.&lt;br /&gt;
&lt;br /&gt;
This is what I believe to be the crux of the problem. That is, as a hacktivism organization, does Anonymous have the right to use unsuspecting Internet users to accomplish their goals? Anonymous likens their actions to sit-ins during the civil rights movement but everyone who sat in made the conscious choice to participate. That is not the case today with Anonymous. &lt;br /&gt;
&lt;br /&gt;
Even though there is more skill required for a DDoS attack than participating in a sit-in as protestors did during the civil rights movement, I don’t think that knowledge barrier is a justification to take advantage of a user’s resources that are not actively protesting with your organization.  &lt;br /&gt;
&lt;br /&gt;
I don’t think that Anonymous would be as successful if they did not take advantage of other users not affiliated with their group. By definition of a DDoS, you need massive resources to take down a website. In contrast, a sit in can be effective with a handful of protestors. &lt;br /&gt;
&lt;br /&gt;
While Anonymous needs the resources of others to have successful DDoS attacks, I don’t think that alone negates the activism they participate in. A successful DDoS requires massive resources. Without pooling bandwidth from multiple users, the DDoS would not be successful. The fact is that Anonymous acquired the bandwidth and directed it at targeted servers to participate in the activism they deem worthy. I don’t think we should claim that their group is any less of a protest organization because they don’t have the millions of members required to produce DDoS attacks. [[User:chrism|chrism]] February 7, 2012 19:33 UTC&lt;br /&gt;
&lt;br /&gt;
While I had written a lengthy response to the Anonymous article, unfortunately, @chrism explained a lot of what I had written.  However, let me go further and state that Anonymous is not the organization that it is purported to be.  While tools like LOIC enable greater numbers to participate in DDoS attacks, each attack is not an organized effort.  The members of Anonymous do not necessarily know one another, they do not have to speak the same language, nor even live in the same country.  Any individual can be a member of Anonymous so long as they have a computer and an internet connection.  The mechanics of their operation is fairly simple once understood.  Using message board services like 4chan, individuals are able to anonymously suggest sites for attacks.  Once a site is agreed upon, which usually relates to the suppression of freedom on the internet, such as PayPal, who gave in to the pressures of cutting off Wikileaks, or the MPAA and RIAA after MegaUpload went under, those anonymous individuals use an anonymizing services such as Tor, LOIC and others to make their attacks.  Then someone somewhere uses the name Anonymous to claim the attack.  &lt;br /&gt;
&lt;br /&gt;
It&#039;s simple in its design, and since the internet is a globally connected community, members of Anonymous can live anywhere there is an internet connection, and do not necessarily have to be American.  Even still further, members of Anonymous do not have to know one another, nor do they have to be experienced computer hackers, or for that matter, good at all with computers.  They could be a thirteen year old kid who was shown how to use this basic program for simple executions, which might only appear to him as minute acts of vandalism.  The repercussions of which, however, are far greater.  But it still stand that the group known as Anonymous is a loosely based group of like-minded individuals from anywhere.  The group is exceptionally fluid, and while Commander X claims he orchestrated attacks, in reality it was the collective consensus of unaffiliated individuals that made it happen, not some organized crime syndicate.  &lt;br /&gt;
&lt;br /&gt;
@chrism, while I do like what you have added, it needs to be clarified that a huge number of individual computers had to have been used for the DDoS attacks to be effective.  I don&#039;t disagree that LOIC was used.  But I wish to broaden my horizons to areas outside of the U.S. to the countries that would like to see American Corporations fail.  I&#039;m not suggesting that LOIC and DDoS attacks are orchestrated by foreign military cyber-warfare divisions, but I could see a bunch of Europeans or Asians not caring if an American corporation was taken out, so they go ahead and cooperate with the Anonymous attack.  [[User:Nthib|Nthib]] 20:22, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I found the arguments between Palfrey and Thierer most interesting in this week’s readings. I agree with Palfrey that a hands-off approach to online security by the government is of concern. I feel that there should be more regulation to protect people’s privacy and child safety online. However, how and to what extent should we fiddle with Section 230? So, I am torn between these two views and also agree that online restriction would lead to less innovation. I think that the consumers, such as the parents, can take more initiative to monitor and protect their children’s online safety. For example, they can restrict a child from using Facebook if they feel that he/she may be harmed for visiting social networking sites. [[User:Qdang|Qdang]] 20:44, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I enjoyed reading David Ardia&#039;s explanation of Section 230 of the Communications Decency Act and how it impacts online speech. Judge Ain&#039;s response to the Stratton Oakmont decision was shocking to me. To suggest that Prodigy would be better off limiting their oversight on material that is posted to the site for fear of liability goes against what the CDA was fighting for - to protect children from harmful material on the Internet. Without a proper legal backing intermediaries do not have an incentive to protect children from harmful material for fear of liability. It appears that Section 230 was written in such a way to protect intermediaries not to provide oversight for environments created by intermediaries.  [[User: Hds5]] 16:43, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
What a difficult subject, that of how much freedom of speech we should have in society, and how much responsibility that implies.  On the one hand, if all &amp;quot;whistleblowers&amp;quot; are suffocated, society is in trouble, and in fact, the US would not exist, possibly, but if there is a free for all on speech which does hurt and is used irresponsibly, this is not good for any society.  The question come up about who can judge this.  Possibly, the solution is not about an &amp;quot;who&amp;quot; can judge, but what form of law can judge.  People can be arbitrary, but laws are meant to be objective.  Personally, I do believe what Jesus said about everything boiling down to two commandments: Love God and love others as much as you love yourself; but in practice, we just don&#039;t seem to have that much love to do it on a daily, massive scale, so we need to have a lot more laws, at least for now, at our stage of maturity.  I think it is better to restrict some, so that there is not a free-for-all which degrades society, but there must be care to allow for freedom of opinion, belief, and within guidelines, freedom of speech.&lt;br /&gt;
[[User:Mike|Mike]] 21:55, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I would like to know more or hear anyone&#039;s input on why these networks need to be regulated in the first place. Is it because the network connections travel across state lines? What about a network that is operated inside a state used by a native of that state? If these networks/businesses and the lines that connect them are all private companies why are they subject to regulation, for the most part, in the first place? [[User:Brendanlong|Brendanlong]] 22:26, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
CDA 230 provides too much immunity to intermediaries, almost encouraging them to be negligent. I agree with Palfrey that an intermediary&#039;s immunity is extended too broadly. I don&#039;t think it would stifle innovation if CDA 230&#039;s immunity was  extended more narrowly. It would most likely result in less negligence on behalf of the intermediary (which, according to Palfrey, is happening to a small degree already). [[User:Aberg|Aberg]] 22:30, 7 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
February 7: Regulating Speech Online&lt;br /&gt;
&lt;br /&gt;
“The US Treasury Department therefore has the right to issue administrative subpoenas (administrative orders) to receive information helpful in the fight against terrorism.  Those subpoenas are secret and are not subject to review by any judge or jury (Meyer and Miller 2006).”  &lt;br /&gt;
&lt;br /&gt;
What I think is actually really compelling about the SWIFT Affair is that there are very different opinions when it comes to surrounding the legality of United States authorization outside of United States jurisdiction, expanding powers, and so on and so forth.  Here, I see a clear and very distinct transition from the early part of the article toward the more immediate style of post 9/11 ruthlessness.  &lt;br /&gt;
&lt;br /&gt;
Just what happens in the meantime between this transition to the new world order is what seems most problematic.  Who is left out in the cold, and who gets to ride high on the new wave?  Just how are these &#039;&#039;second class US citizens&#039;&#039; fit into the overall landscape of the new world order?  It is a slow and painful process.  &lt;br /&gt;
&lt;br /&gt;
However, one of the main ways that we can change norms is through the media.  By controlling the media consumption of a particular population, we can slowly shape and change cultural norms.  Other institutions – such as government, educational, as well as religious pillars all shift when new norms are planted by way of mass media consumerism.  The process slowly continues with each new generation.  And there is resistance within older generations.  Particularly within Europe, globalization has hit a bit of a halt.  Although progress within these regions will likely continue through United States intelligence, there is a bit of a lag primarily due to language as well as strong religious barriers set in deep-rooted cultural history.  The Vatican, for instance, controls quite a considerable amount of the population of the planet through religion.  And the physical reality set in the landscape of most of Europe is very rich, full of art and architecture -- which plays a strong role in dictating cultural behavior.  Euro-Disney has remained open, even as the French don&#039;t seem all that interested in it.  Those who do not watch television, listen to the radio, play video games, watch films, and are not engaged in mass culture are basically immune.  Yet, for those people we have Google, and now Facebook.  Great Britain still has power, although is not what it used to be after colonization and World War 2.  And the United States – as US intelligence would have us accept – has picked up the torch, so to speak, from Great Britain.  Just how far humanity will go has yet to be seen, but progress continues.  And for the most part, it seems to become a world&#039;s strongest man competition when it comes to the command of power across legal boundaries.  &lt;br /&gt;
&lt;br /&gt;
&amp;quot;In 1976, the US Supreme Court ruled that Americans have no constitutional right to privacy over their banking records. Following that decision, US Congress passed the &#039;Right to Financial Privacy Act&#039; in 1978 to re-establish privacy rights for US bank customers. (Connorton 2007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
What I am really wondering about here is whether or not, if ever, most of these post 9/11 laws are going to be retracted ... yet, gone with the wind.  &lt;br /&gt;
&lt;br /&gt;
&amp;quot;US lawyers have nevertheless tried to sue SWIFT for violating their privacy rights under the Financial Privacy Act. Ian Walker and Stephen Kruse filed a class action lawsuit in a federal court the same day that the New York Times revealed the program, on 26 June 2006. They claimed that the US federal executive branch violated their privacy rights by obtaining their financial data through the SWIFT network.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
I do see a problem in that these new and expansive post 9/11 surveilance powers do conflict with pre-existing privacy laws.  Of course, from this stems primary concerns about [[legitimacy]].  &lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 07:13, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech. Previously updated to Harvard212 MyTalk&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech. Previously loaded to Harvard212MyTalk.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_Economic_Models&amp;diff=8121</id>
		<title>New Economic Models</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_Economic_Models&amp;diff=8121"/>
		<updated>2012-03-20T10:52:19Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 14&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The rise of the networked economy is changing economic possibilities around the world.  From the call centers in India to eBay and the new Internet entrepreneurs, there are many signs that suggest a flatter world fueled by innovative production and marketing strategies.  In this session, we will explore the promise and reality of the changing economic tides associated with rising Internet use including those marketing to the long tail and the new oligopolists.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/sites/is2012/images/IS2012_feb14_InternetEconomicsandBusinesspdf.pdf Download today&#039;s slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Wikipedia, [http://en.wikipedia.org/wiki/Dot-com_bubble Dot-com Bubble]&lt;br /&gt;
* Chris Anderson, [http://www.wired.com/wired/archive/12.10/tail.html The Long Tail]&lt;br /&gt;
* Kevin Kelly, [http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php Better than Free]&lt;br /&gt;
* Eric von Hippel:&lt;br /&gt;
** The Economics of Open Content Symposium: New Models of Creative Production in the Digital Age Collaboration and the Marketplace - &#039;&#039;&#039;Video stream of the 30-minute presentation: [http://forum-network.org/lecture/boston-ideas-2005-eric-von-hippel new improved link!]&#039;&#039;&#039; (requires [http://real.com/ RealPlayer]). See below for alternate links to the presentation in video and audio format.&lt;br /&gt;
** [http://web.mit.edu/evhippel/www/books/DI/Chapter8.pdf Democratizing Innovation, Chapter 8: Adapting Policy to User Innovation]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/The_Long_Tail &amp;quot;Wikipedia Long Tail&amp;quot;]&lt;br /&gt;
* Free by Chris Anderson[http://www.audible.com/adbl/site/products/ProductDetail.jsp?]&lt;br /&gt;
* Larry Lessig&#039;s [http://codev2.cc/ Code 2.0]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I really enjoyed the readings this week, particularly the &amp;quot;Long Tail&amp;quot; and &amp;quot;Better Than Free&amp;quot; articles. What was particularly interesting was the breakdown of potential profit for the music industry should they choose to release albums/songs digitally. I also enjoyed learning about Rhapsody&#039;s model: how &amp;amp; why it works. Also, I&#039;ve definitely fallen victim to Amazon and even eBay&#039;s &amp;quot;collaborative filtering.&amp;quot; I think it is an entirely new approach to marketing, one that works immensely better due to its broad reach. Consumers don&#039;t always know what they want and are generally open to sampling new material, whether it&#039;s print or media. This is where &amp;quot;collaborative filtering&amp;quot; or Rhapsody/Pandora&#039;s jukebox/radio station comes into play by allowing consumers to sample media they&#039;ve yet to be introduced to. Thus, a new market emerges. Another interesting phenomena are reviews. I tend to use reviews for everything, including books or products on Amazon, as well as restaurant recommendations. Reviews are a powerful tool that weren&#039;t utilized in their full capacity until recently.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Better than Free&amp;quot; brings up a good point: intangible services. I&#039;d rather buy and download software or music from a trusted source (trust being an intangible service according to the article) rather than pirate bay, for instance, as it would guarantee virus, bug free software/music. Also, accessibility and convenience are equally if not more important intangible services. If the dying record label/music industry model doesn&#039;t catch onto this movement, it will take its last breath, so to speak, sooner rather than later. [[User:Aberg|Aberg]] 02:29, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
What interested me more about the readings was the dot-com case and the high risk that these internet-based companies were taking. Even though they knew that there could only be one network-effects winner in each sector, they continued with their strategy of  “get large or get lost.” Also, they were not investing a few thousand dollars, but millions of them in a battle to remain in the dot-com business. As a result, only some large dot-com businesses remained, such as Amazon and eBay.&lt;br /&gt;
&lt;br /&gt;
Also I enjoyed The Long Tail article because it explains a number of phenomena I think all in this class have experienced but sometimes were unaware of the causes. First, we were living in a Hit-driven culture, talking about the same movies or TV series at high school, but we knew little about foreign TV shows and movies. Part of this issue is why the East criticizes the West, because probably we know who is Lady Gaga but we don’t who wrote Le Tartuffe. &lt;br /&gt;
&lt;br /&gt;
Thus, what I like about The Long Tail, and also part of the author’s conclusion, is that we are entering in a more diversified time, where not everybody listens to the same songs, looks the same movies and reads the same books. The more we find, the more we like.[[User:Fabiancelisj|Fabiancelisj]] 21:00, 14 February 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have two thoughts relating this week&#039;s reading to the larger world.&lt;br /&gt;
The first is a re-synthesis of other ideas, in that the internet has not really so much created new things as it has amplified already existing phenomena. Media sharing has been around nearly as long as the media itself. In the 80&#039;s, the band Metallica encouraged fans to make copies of their music (on cassette tapes) and hand them out to friends. I remember my own friends and relatives trading albums on cassettes and mix tapes. My grandmother had a set up to easily copy VHS tapes at home. She would rent movies, and copy them for later. Certain movies that were more popular were often purchased, since it made them easier to find (my grandmother had a cataloging system, where every tape was numbered, with the movies that were on each tape listed both on the tape, and recorded in a notebook - just looking for the right tape cover was much easier), and better quality. Sure, the movie companies didn&#039;t make as much money as if she had bought all of the movies, but then again, she bought much more than she would have otherwise. The only real difference now, is that it is easier, more widespread, more exhaustive, and easier to see. &lt;br /&gt;
&lt;br /&gt;
The second is that my wife and I often observe to each other that while companies are often most concerned about owning the most market share, or getting the largest profit per unit, what really should matter is if any individual thing is profitable. It is ok to have a portion of the business that is less profitable, so long as it is still is profitable in the first place. It doesn&#039;t matter if an individual item is hugely profitable, so long as once all the costs have been payed, the item makes money. &lt;br /&gt;
One example of this would be the breakdown of the starsplay/ netflix arangement. Stars Play wanted to deal with netflix like a cable company, making individuals who wanted the extra content pay separately for it. Netflix wanted to outright license the Stars Play content, rather than start a two tier pricing scheme. Because SP didn&#039;t want to compromise, there was no deal. I, for one, never intend on accessing SP content elsewhere (and certainly not paying for it), do not have a cable tv subscription that has access to it, and would not have paid extra for it if they had gotten netflix to budge. There are far too many interesting titles for me to watch that, while it might not be exactly what I wanted, costs me nothing additional. SP meanwhile, loses out on my little sliver of what netflix would have payed them. Sure, they wouldn&#039;t have made as much money per unit, but they would have made money they wouldn&#039;t have made otherwise. &lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 20:55, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really loved the Wired article and its point that this next era will be more about “misses” than “hits.”  The internet and new technology remove almost all the related costs that created this all-or-nothing dichotomy; once I read it, it seems so obvious to realize that “misses” still can generate reasonable profits, just not ones that could overcome the expenses inherent in our older distribution systems (movie theater, an actual record store in a small town, etc.).  The concept of the Long Tail and the 3 Major Business Rules he gives at the end are all great.&lt;br /&gt;
  &lt;br /&gt;
I’m a reasonably expense-conscious person in the just post-college age range with a low income, but I am also quite active in pursuing media I enjoy (movies, tv shows, music, books).  With so much available free online (illegally) I tend to only pay (whether by actually paying or by getting it through a medium that provides ad revenue directly to the creator) for around 1/3 of all the media I enjoy.  Those are the songs by artists I like best and truly want to support, or the movies that I am so impressed with that I want to contribute to their box office take and that simplemindedly measured “success.”  Following the second Long Tail Rule, I would be very happy to pay SOMETHING for almost everything I enjoy.  Lowering the prices dramatically or providing a “pay what you feel” option would actually increase what I’m happy to pay pretty significantly.  And I know this is totally anecdotal, but I feel like most of my peers have the same sentiment.&lt;br /&gt;
&lt;br /&gt;
Does that sound about right to everyone else in the class? Would you pay at least something for everything if that was an option?&lt;br /&gt;
&lt;br /&gt;
Democratizing Innovation echoes a lot of discussions/other readings we have had about the importance of having both the manufacturers and users able and willing to innovate.  The phrase “Policy makers should be aware of ‘collateral damage’ that may be inflicted on user innovation by legislation aimed at other targets“ really summed it up well for me.  As cliché as it is now, “thinking outside the box” is sometimes only possible when people have the ability to ignore the boundaries that create that box.  This is something very difficult for major organizations or corporations to do, but easy for individuals.  Unfortunately, with acts like SOPA even being proposed, we seem to be moving in to opposite direction of the more user-innovation focused world the chapter argues for.&lt;br /&gt;
&lt;br /&gt;
And just briefly on the dot com crash: I’ve studied the housing bubble/foreclosure crisis quite a bit in the past few years, but was too young to really grasp what was happening with these comparably massive dot com crashes at the time.  This look back was pretty jarring. [[User:AlexLE|AlexLE]] 17:46, 11 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I personally had no knowledge al all of the dot-com bubble system. It seems to me that these bubbles were more of a financial scheme rather than a legally oriented invention. Creating something that people will invest in just because of the e- prefix or the .com at the end seems a bit naïve and risky but surprisingly enough many people fell for this and as a result some made money but the majority lost their funds and companies went bankrupt. I really enjoyed reading the Long Tail article. I never would have guessed that thanks to modern systems such as the internet and Amazon.com for example, old hits or even more surprisingly “misses” would turn out to be hits. I often noticed while buying merchandise on Amazon.com that at the bottom of the page it would show me related items and trends and I must admit that a few times while buying books or DVDs specifically, I have also bought related items suggested by Amazon.  Another article that I enjoyed reading was the one Better than Free since I agree with the author and find myself in similar situations. I believe that most people emphasize one of the generatives rather than all eight of them. Personally I like having something immediately delivered to me rather than doing several searches for something that would take me time, and therefore I also agree with the Findability generative as well. I also enjoyed the last article and found it to be really accurate. Users looking for or in need of a certain device either continued with their lives without it or in the case of the article, built it or developed it themselves…the majority of inventions are user centered rather than discovered and developed by manufacturers . I personally think that some of the most important inventions took place because of the user’s need for a given device. Large corporations don’t usually see what people could use on an everyday basis but aim to invent spectacular devices in order to sell and make profits. [[User:Emanuele|Emanuele]] 16:50, 12 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLe I wanted to reply to your question about paying at least something for everything if it&#039;s presented as an option. My husband and I developed a catchphrase while traveling that went something like, &amp;quot;Why won&#039;t you let me pay you??!!&amp;quot; Sometimes this had to do with things like trying to find a place where we could do (or pay someone to do) laundry but oftentimes it had to do with companies not getting their act together online. One classic (hypothetical, of course) example was when my husband wanted to read a particular comic book while we were in Malaysia. So he went to the publisher&#039;s website and searched for it. They didn&#039;t have any digital copies and print copies weren&#039;t available either (not that they would have been much use to him in Asia). So he then went &amp;quot;elsewhere&amp;quot; and found exactly what he was looking for. He even contemplated sending money directly to the author because he really liked the guy&#039;s work and wanted him to get something for his efforts. Generally speaking, we try to go through proper channels first but if those don&#039;t work, we&#039;ll take our business elsewhere.&lt;br /&gt;
&lt;br /&gt;
To get a little Cluetrain Manifesto, companies are shooting themselves in the foot if they think they can sit back and dictate the terms of their relationships with consumers. Yes, the profit margins may be smaller to offer products online in easily reproducible formats, but companies are effectively putting themselves out of business by not acting as useful intermediaries. Kevin Kelly does a great job of highlighting the potential value-adds of intermediaries in &amp;quot;Better than Free&amp;quot;, while Chris Anderson explores the significant profit opportunities available to companies that exploit the long tail. If companies invested as much time and energy in getting ahead of the on-demand media delivery curve as they did fighting for control of an antiquated relationship between producers and consumers that consumers are opting out of anyway, then those companies might actually have a shot of staying in business for the next five years. /rant&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 04:26, 13 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Power of the Preview&amp;quot;&lt;br /&gt;
&lt;br /&gt;
During high school, the internet was in its infancy. Therefore the accessibility of lesser-known artists to sell their songs/albums in the open market was limited. I have been involved in music throughout my life and a band’s path to creating a commercial album has been a challenging and structured process starting with signing up with a label, providing upfront costs for production, pressing CD&#039;s and so on. In this digital age where physical CD&#039;s are no longer required and home studio technology has advanced, the costs to produce an album are certainly less. While I am not familiar with popular music sites such as Rhapsody, I know that iTunes is quite accessible in allowing independent musicians sell their songs on their platform.&lt;br /&gt;
&lt;br /&gt;
In addition to the algorithmic recommendations that have created the Long Tail, I also believe that the “preview” function is also vitally important. To hear a segment of a song is particularly powerful for the Long Tail effect (i.e. iTunes). Prior to the music digital media age, the only way that a listener could preview a more obscure band was by listening to the album through others or seeing live shows. Therefore consumers were less likely to pay full price for an entire album from a band that they were wholly unfamiliar with. However the ability for consumers to hear parts of songs has undoubtedly contributed to the Long Tail affect.--[[User:Jimmyh|Jimmyh]] 17:38, 13 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I find that the generative qualities immediacy, personalization, accessibility, and findability allow Youtube, online radio, and Netflix to become my main source for entertainment in the free copies world. I no longer depend on my TV, which had limited shows and a fixed schedule. On the contrary, I can basically find any video on Youtube and watch them for free. With a Youtube account, I can create a play list and watch my favorite videos at my convenience. I had also watched many seasons of America’s Next Top Model on Youtube for free. &lt;br /&gt;
I remember the days when I had to call into a local radio station to request them to play my favorite song. Now, I can just go on Youtube and watch/listen to my favorite songs. I also no longer feel the need to run to a store to buy a favorite CD or the need to purchase my favorite songs. I also appreciate the fact that I can stream my favorite local radio station online, even when I am out of the local range. Netflix is another example of a convenience source to access shows and movies instantly. [[User:Qdang|Qdang]] 04:38, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I enjoyed the Technium article that mentioned the generative qualities that favor the consumer. Companies like Amazon and Wikipedia embody these qualities the most, with Amazon give us a great example of the Long Tail. As a superstore, Amazon has an incredible amount of adaptability and ability to connect buyers and sellers. Lots of items bought off Amazon are from other sellers they do business with so they are just connecting you to them. I do wish Kevin Kelly touched on advertising which he admittedly omitted. Perhaps he wanted to avoid the discussion of consumer versus producer driven demand and who shaped or steered these generative forces more. [[User:Brendanlong|Brendanlong]] 06:21, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The properties of generative innovation that von Hipple spoke of is quite eye opening, albeit not unexpected.  The shift from manufacturing standards to user generative improvements reflects the long tail effect spoke of in the other articles.  Unfortunately it seems as though most companies and manufacturers adhere to the antiquated principles of limitation.  Von Hipple is quite clear when he states that many of the users and innovators seek a shift of the current legal precedents set through patent law and copyrights.  As he noted, the physical world costs time, money, actual physical stuff to be modified.  But in the virtual world, anything can be copied and modified without the need for physical items, or even R&amp;amp;D, since that can come through democratization of innovation.  Because the virtual world inside computers allows for instant copying and modification, and since the internet allows for the instant communication and copying between systems, the long tail is not only enabled, but it allows for instant results at virtually no cost.  But it is precisely because it is virtual and it avoids cost (or profit for that matter) that the application of laws and practices that rule a world of normal distribution don’t apply.  Those laws apply to systems of manufacture in which it is difficult or costly to enable that manufacture.  One in which all users can be grouped into large groups, instead of millions of small ones.  As the world moves closer and closer to the singularity, the laws and rules of the physical world need to be modified in order to account for the virtual world, or new laws and regulations need to be made, ones which address the difficulties of controlling the long tail.  And I don’t really see that happening because of the rights that would be infringed upon (freedom of speech, press, expression, et al.).[[User:Nthib|Nthib]] 20:32, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
By the way here is a link to &amp;quot;Free&amp;quot; by Chris Anderson: http://books.google.com/books?id=lLZbXN2odVYC&amp;amp;printsec=frontcover&amp;amp;source=gbs_navlinks_s#v=onepage&amp;amp;q&amp;amp;f=false [[User:Brendanlong|Brendanlong]] 20:34, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Kevin Kelly&#039;s article, Better than Free, touched on something we discussed in our first few classes - a human element of trust when communicating on the  Internet. A lot of the reading selections for class keep coming back to a common theme for me: &amp;quot;Golden Rule&amp;quot; or Trust. Kelly places a monetary value on &amp;quot;trust&amp;quot; but more importantly recognizes that this notion of being able to trust products, people, etc. on the internet will always remain a key player. Eric von Hippel also spoke about an element of trust - between the user and manufacturer regarding innovations. There is a fine line between intellectual property rights and access for users to change and improve products. [[User:Hds5]] 16:29, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Though the traditional mode of financial transaction appears threatened by digital reproducibility, Kevin Kelly suggests that being &amp;quot;free&amp;quot; is only part of the equation. We can explain why iTunes, Netflix, Steam, and Amazon have been so successful despite piracy efforts: what they are monetizing isn&#039;t just the product, but also the services around the product that enhance and secure the consumer experience (this is also, I think, the juncture at which law feels most relevant to the consumer: it promises reliability and safety that the pirate cannot). Unfortunately, not only does much of the entertainment industry remain stubbornly tethered to protecting the copyable product, but it even fails to outperform pirates in the eight generative areas. For instance, consider the recent incident where Japanese comics publisher VIZ Media ordered Manga Stream, an online group which scans and translates comic series as they are published weekly, to stop releasing some of its most popular titles. Yet Manga Stream had exceeded VIZ in every respect when it came to providing quality comics: MS did not censor the original content, as VIZ had in its English-language versions; MS&#039;s translations were far more consistent and accurate; and most perhaps importantly, MS&#039;s releases were almost immediate, whereas VIZ released their own English scanslations &#039;&#039;weeks&#039;&#039; after the Japanese originals. Instead of proposing a superior alternative, VIZ was focused on preventing what is inevitably—thanks to the affordances of technology—unpreventable. This, to me, seems to be a lose-lose situation for all parties involved. We receive inferior products and services, and the publishers receive unenthusiastic business. Looking forward to hearing what others think can be done. [[User:Michaels|Michaels]] 21:54, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I really enjoy getting my eyes opened to how things really work in the world, and sometimes it is things behind the scenes.  The dot com article was one of these &amp;quot;eye-openers&amp;quot; for me.  It seems so easy for people to be manipulated into doing things that are obviously dumb, but the (we) keep falling for it again and again historically, and there are always a group of those who know how to leverage human nature for their own gain.  I suppose that&#039;s what marketing is all about.  I&#039;m very intrigued by this new opening on the horizon for each individual to market their intellectual goods, a freedom of ideas available on the internet, but of course, there will be those who want to stop it.  It is not to their advantage, for whatever reason, monetary, or because it represents an opposition to their power and influence.  This was also high-lighted in the Long Tail article, which really got me to thinking how to take advantage of this &amp;quot;breach in the wall&amp;quot; to share ideas in the world.  It really opens up a whole new world of opportunities for those who want to bring innovation onto the scene of world influence.[[User:Mike|Mike]] 22:02, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I really enjoyed reading the article on The Long Tail and found it quite impressive that with the introduction of new technologies and platforms such as iTunes, Rhapsody, Pandora, etc., they have opened the doors for consumers to focus on the artists or songs that might not be mainstream or &amp;quot;megahits.&amp;quot; Turning that &amp;quot;megahit&amp;quot; concept on its head and essentially disrupting or dismantling the music industry especially with iTunes, is what was needed to revolutionize the aging concept of purchasing an album, making it more personalized and cost effective for consumers. Also with the mention of documentaries and how that is now flourishing online and creating new markets in places that had not previously existed or providing new channels for filmmakers to get their content out in the world. I am now going to look for Chris&#039; book![[User:JennLopez|JennLopez]] 22:24, 14 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
I found two articles in this class section particularly interesting: &amp;quot;Long Tails&amp;quot; and &amp;quot;Democratizing Innovation.&amp;quot;  To be honest, the Long Tails article opened my eyes to a new economic model that many probably are already familiar with, but of which I was ignorant.  The concept of making previously obscure, low demand products so ubiquitously available that they then generate the lion&#039;s share of a company&#039;s revenue is remarkable.  I can now better understand how Amazon and Netflix have become so successful, among other things. I am interested in learning more of how the long tail model can be applied to educational access to impoverished communities.  &amp;quot;Democratizing Innovation&amp;quot; was interesting in that it highlighted for me the need to engage users in the design of products.  This should be done not only for social welfare, but also for a more usable end product.  Again, I am interested in learning more how this principle can be applied to the design of educational tools. [[User:Cfleming27|Cfleming27]] 14:57, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Learning about the “Long Tail&amp;quot; phenomenon this week has, incredibly, kind of quelled my desire to travel in time back to the 1970s (note: I didn’t yet exist, so please excuse my romanticizing). Despite the very real risk of information overload (and the paralysis it can bring), the idea that we can access so much stuff other than what’s brought directly to us by the “hit-makers” is sublime. I love @Fabiancelisj’s comment about the resulting proliferation—and ensuing acceptance--of divergent tastes. It’s amazing to think about how social contexts (such as in high school—where pop-cultural affiliations seemingly reign supreme [can of worms: how much of that has itself been influenced by the &amp;quot;hit-makers&amp;quot;?]) might be modified in this way.[[User:Jlynnping|Jlynnping]] 19:47, 15 February 2012 (UTC)JLynnping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
February 14: New Economic Models&lt;br /&gt;
&lt;br /&gt;
This is interesting in how these articles seem to tie-in nicely together into the dot-com bubble – in effect, economic activity.  There is a continual flux that moves with cultural nerve impulse.  History repeats itself, and is refined.  Collectively, this process can be shaped, trained and so on and so forth.  Thereby, firms shaping cultural outcomes.  Sites like Google and Facebook have the power to shape human interaction, manufacturing human behavior.  For example, a Facebook account consists of “Facebook friends” – their interactions are totally dictated under the architecture of a corporate rule, their relationship as a commercial exchange.  It is the commercialization of human interaction, it is a brand.  Product placement, connected across varying services, streamlined to the user through his or her preferences, and so on and so forth can control effortlessly, following the user wherever they may go.  Of course, this goes back into the notion of what consumers will pay for something.  If their natural inclination is to desire the free, then keeping prices low is good for business.  And if record companies want to start charging more for music, maybe their artists should start producing better music.  There is no way you are going to get me to pay 99 cents for that new Nickki Minage song, even if it is really really super new and super shiny.  That does not mean I will not recycle it for my own purposes, however.  &lt;br /&gt;
&lt;br /&gt;
We need to make consumers keep buying things.  &lt;br /&gt;
&lt;br /&gt;
When we think of new economic models, what is really interesting is this notion of the long tail model.  What can anyone say, other than it was a long time coming.  Really – it is a great thing to be able to recycle old stuff.  Well, it is not necessarily old rubbish, and sometimes new is not always better.  So those are certainly reasons why part of this new model is needed.  Not just for the sake of nostalgia, but because there is a lot of really exceptionally great stuff that has simply become … lost in space.   So, spread it around and spread some beloved.  However, what is interesting – particularly when it comes to the marketing side of this equation – in that as culture becomes more refined and adjusted to what consumers purchase, the ideas become more limited in scope.  So, how does culture reinvent itself?  Well, this is where the long tail comes into the equation.  It is not necessarily history repeating  – quite the contrary, because new offshoots may be produced.  A new genre of music, for example, may be spawned from some obscure album made in United States during the early 1980&#039;s.  Yet again, perhaps there was a reason those albums flopped in the first place?  Does the world really need another Devo, or another Frank Sinatra?  How about another hillbilly folk singer?  Perhaps, then, what becomes interesting about this long tail model is that it allows accessibility to these forgotten domains.  It is the cure for a culture that has become musty.  It is not bringing anything new, but it is re-arranging the furniture in an extremely large house.  And it is not just fascination with the old, because it is somewhat necessary for culture to carry on.  In some sense, it is simply feeding the masses regurgitated rubble that has been edited, sanitized, and deemed completely harmless.  Sure, there is probably still room for the obscure – except now it is even easier for authorities to single out diabolical purchases.  Serial killer memorabilia, child pornography, snuff films, equipment to make bombs, and so on and so forth, can be purchased online – except, all of these purchases can all be traced online.  This makes it easier for bating operations to work, phasing out potential trouble makers.  Covert sting operations can be setup in this way.  Yet, it is not so much of a danger to the system that someone buys Charles Manson&#039;s album, because the manufacturers of the “here and now” are in complete control of what consumers purchase – and the shelves will surely be stocked full with nothing but Miley Cirus, Selina Gomez, and whatever else the large corporations are influencing consumers to purchase.  There are some acts that have been able to navigate past the corporate guard, though.  Acts like Rage Against the Machine, Nirvana, and many of the artists from the 1990&#039;s are an example of this resurgence of reanimated artistic creation – breakthroughs.  And these acts, no doubt, were influenced by more obscure acts from the past.  It is Socrates prompting a riot.  And notice how a frenzy is created around one act that breaks through.  So, essentially one act can change the cultural landscape dramatically.  After the scene embodies a relatively out of control attribute, culture is repaved by corporate control in order to get back in line and sell more stuff.  And this may not be so intentional on the part of a CEO, it is just business.  So, in this way, the long tail is actually useful in stimulating a cultural Rebirth.  However, because it is controlled at the inception as well as on fresh display, there is a limitation to what new culture can be produced from the old.  It is like the area codes in the telephone system, or IP addresses.  So, it is culture recycling itself, cannibalism – not producing anything new, but producing limitlessness of safe and sterile cultural variation.  And for those who wish to quit the world, this is a great way to become absorbed into an endless ocean of ineffectual distraction.  One could conceivably become lost in the long tail for ... forever and a day.  So, this is beneficial for the corporate elite and governments – because, if the long tail is kept clean then it simply becomes nostalgic nonsense that is not only harmless but keeps consumers preoccupied with content that will hardly change the shape of how governments are organized or orchestrated.  &lt;br /&gt;
&lt;br /&gt;
I suppose I should differentiate, as there is a difference between the theory of a model and a model in practice.  As most of us wil probably agree, Cranivals can be rather fun.  &lt;br /&gt;
&lt;br /&gt;
Perhaps what is most interesting about the flip side of this framework is that marketing is indeed changing human behavior.  Predictive Analytics, more recently, have focused on mass traffic and product placement.  And this is not anything small.  This is astronomical business enterprise.  Large box stores charge premiums for shelf space, and behavior is entirely tracked  – changing perceptions, and foreseeing outcomes.  Human decision making is manufactured and manipulated.  Amongst this, we are also copying, in effect replicating ourselves.  Like a giant mass of thirty year old teenagers tuning themselves in high school, all being affected through peer pressure.  So there is a resemblance of the architecture influencing behavior.  “The internet is a copy machine. At its most foundational level, it copies every action, every character, every thought we make while we ride upon it” (Kelly).  And we are behind it, as it is just the machinery of enterprise in motion.  [[User:Just Johnny|Just Johnny]] 17:08, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=8120</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=8120"/>
		<updated>2012-03-20T10:47:17Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 20.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{AssignmentInfo|Jeff Kimble|Assignment 3: eCommerce through the lens of Amazon|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Jeff_Kimble_--_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alexis Ditkowsky|Assignment 3: Collaborative Boards on Pinterest: Clearly Not a Primary Function of the Site|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment3-DitkowskyAlexis.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Harvard212|Message Efficacy on Broad Spectrum Platforms|http://cyber.law.harvard.edu/is2012/Image:Harvard212_Assignment3.pdf}}&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=8119</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=8119"/>
		<updated>2012-03-20T10:45:36Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 20.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{AssignmentInfo|Jeff Kimble|Assignment 3: eCommerce through the lens of Amazon|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Jeff_Kimble_--_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alexis Ditkowsky|Assignment 3: Collaborative Boards on Pinterest: Clearly Not a Primary Function of the Site|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment3-DitkowskyAlexis.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Harvard212|Message Efficacy on Broad Spectrum Platforms|http://cyber.law.harvard.edu/is2012/Image:Harvard212_Assignment3.pdf}}&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=8118</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_3_Submissions&amp;diff=8118"/>
		<updated>2012-03-20T10:42:43Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 20.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2012/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{AssignmentInfo|Jeff Kimble|Assignment 3: eCommerce through the lens of Amazon|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Jeff_Kimble_--_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alexis Ditkowsky|Assignment 3: Collaborative Boards on Pinterest: Clearly Not a Primary Function of the Site|http://cyber.law.harvard.edu/is2012/sites/is2012/images/Spring2012-Berkman-Assignment3-DitkowskyAlexis.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Harvard212|Message Efficacy on Broad Spectrum Platforms|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment3.pdf&amp;diff=8117</id>
		<title>File:Harvard212 Assignment3.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment3.pdf&amp;diff=8117"/>
		<updated>2012-03-20T10:39:23Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=8116</id>
		<title>File:Harvard212 Assignment2.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=8116"/>
		<updated>2012-03-20T10:38:13Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: uploaded a new version of &amp;quot;Image:Harvard212 Assignment2.pdf&amp;quot;: Reverted to version as of 22:08, 21 February 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=8115</id>
		<title>File:Harvard212 Assignment2.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=8115"/>
		<updated>2012-03-20T10:37:47Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: uploaded a new version of &amp;quot;Image:Harvard212 Assignment2.pdf&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=7692</id>
		<title>File:Harvard212 Assignment2.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=7692"/>
		<updated>2012-02-21T22:08:47Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: uploaded a new version of &amp;quot;Image:Harvard212 Assignment2.pdf&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=7683</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=7683"/>
		<updated>2012-02-21T21:37:55Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Harvard212&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; Being Nice and Free Speech on the Internet[http://cyber.law.harvard.edu/is2012/sites/is2012/images/Harvard212_Assignment2.pdf]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Harvard212|Harvard212]] 16:34 EST, 21 February 2012 &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; BSK342&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; Community, Architecture, and Regulation in the Something Awful Forum Space&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/Image:Bsk342assignment2.pdf]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BSK342|BSK342]] 21:30, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Blake Geno&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; Anonymity, Privacy and Evolving Tools&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/Image:Blakegeno_prospectus.odt]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 20:58, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Abby Bergman&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:ABergman_Prospectus.pdf Pinterest: Visually Arrested]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Research Focus:&amp;lt;/b&amp;gt; [http://www.pinterest.com/ Pinterest] and Copyright Infringement&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 19:55, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Fabian Celis J&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; The Role of the Internet in Distance Education: The Open University Case&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Fabian_Celis_Assignment_2.doc Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 19:09, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; André Pase and Priscila Lollo&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; When two worlds collide, digital TV and online video in an age of transformation&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Research Focus:&amp;lt;/b&amp;gt; online video x tv&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Assigment2_andrepase_priscilalollo.pdf Assignment 2]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Andrepase|Andrepase]] 20:17, 21 February 2012 (UTC)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; [http://pinterest.com/ Pinterest]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Spring2012-BerkmanAssignment2-DitkowskyAlexis.pdf Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Alexis,&lt;br /&gt;
&lt;br /&gt;
I would like to offer two sources which may be useful to supplement your research.  The first, the Millennium Development Goals (MDG), are a list of 8 goals adopted by the United Nations in an effort to eradicate poverty by the year 2015.  Several of the goals involve online access for poor countries, and one goal specifically addresses gender equality.  [http://www.un.org/millenniumgoals Millennium Goals Main Site]   And the second source, [http://www.tigweb.org Taking IT Global], is rich in content and will provide a wealth of information and resource material.  Good luck with your project, it looks interesting and informative.[[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
...................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; James Harris&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; The Internet and “Bridging the Gap” in Politics&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:James_Harris_Assignment_2.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 22:28, 20 February 2012 (UTC)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi James,&lt;br /&gt;
&lt;br /&gt;
I love the concept, I’m just a little fuzzy on the thesis.  Is the main focus going to concentrate on the elected-official/constituent relationship, or the paradigm shift of political campaign support? [[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
.................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alex Lloyd-Evans&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus Title:&amp;lt;/b&amp;gt; Social Structure&#039;s on the Writer&#039;s Forums of Cracked.com&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Research Focus:&amp;lt;/b&amp;gt; [http://www.cracked.com/ Cracked]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:AlexLE_Assignment_2.pdf Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Alex,&lt;br /&gt;
&lt;br /&gt;
Is this line correct – “free to enter forum”?  I don’t understand what that means.  This looks like it will be an interesting project.  I wonder if the editors will be surprised by your findings, or possibly take issue with your conclusion, depending on the outcome.  I am really looking forward to reading your paper.[[User:Louiscelli|Louiscelli]]&lt;br /&gt;
...................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Jeff Kimble&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Internet E-Commerce&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Jeff_Kimble_--_Assignment_2.doc]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:JeffKimble|JeffKimble]] 14:25, 21 February 2012 (UTC)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Jeff,&lt;br /&gt;
&lt;br /&gt;
While I am sure there will be plenty of studies that address this, it will be nice to see the data synthesized, analyzed, and compacted into a short paper.  You certainly will have lots of data to pour through.  I will be particularly interested in some of your research as it will complement my project as well.  Good luck, and if I run across any statistics that may be beneficial to your research, I’ll be sure to forward it along.[[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
....................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Louis Celli&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;e&amp;lt;/i&amp;gt;-commerce Taxation&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/Assignment_2_CELLI_Research_Prospectus.doc The Future of &amp;lt;i&amp;gt;e&amp;lt;/i&amp;gt;-commerce Taxation]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Terrorist Websites&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2012/Image:Emanuele_Assignment_2.doc Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Emanuele|Emanuele]] 16:06, 21 February 2012 (UTC)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Emanuele,&lt;br /&gt;
&lt;br /&gt;
This is going to be an exciting paper indeed.  This is a whopper and you might have trouble containing it to 10 pages.  The First Amendment question might be a great place to start, then begin to wind in the Patriot act, while comparing it to the Espionage act of 1917.  I can’t wait to read this paper, good luck![[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
....................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; [http://ask.metafilter.com/ Ask MetaFilter]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:JBrav_LSTU_E-120_Assignment_2.pdf Prospectus]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 17:41, 21 February 2012 (UTC)Jlynnping&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Managing a Flexible Work/Life Balance: Legal Ramifications of Facebook &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:2012_02_-_SZakuto_Prospectus.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Anonymous&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Thibodeau_Assignment_2.pdf]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 17:59, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Quynh Dang&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; [http://answers.yahoo.com/;_ylt=Agj1j2NWf7soiMwgqNKlvo6e5HNG;_ylv=3 Yahoo! Answers]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Quynh_Dang_Prospectus.doc Prospectus]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Qdang|Qdang]] 18:14, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Building a New Online Community in Drupal&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/sites/is2012/images/Final_project_prospectus.doc Prospectus]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 18:40, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Brendan Long&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Question &amp;amp; Answer Website Services and the Impact of Social Media&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/Final_Project_Prospectus_-_Long%2C_Brendan.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 19:47, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Communicating with Constituents through Twitter&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus: [http://cyber.law.harvard.edu/is2012/Image:Assignment_2_Hope_Solomon.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 14:22, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Yerzhan Temirbulatov&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Endless war on piracy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus: [http://cyber.law.harvard.edu/is2012/Image:YerzhanTemirbulatov_EndlessWarOnPiracy.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Erzhik|Erzhik]] 20:42, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Tara Baechel&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; The Internet, Adoption and the Privacy of Minors&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus: [http://cyber.law.harvard.edu/is2012/Image:Baechel_Assignment_2.pdf Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:TBaechel]] 21:25, 21 February 2012 (UTC)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=7682</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=7682"/>
		<updated>2012-02-21T21:35:39Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2012/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Harvard212&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; Being Nice and Free Speech on the Internet[http://cyber.law.harvard.edu/is2012/Image:Harvard212_Assignment2.pdf#filelinks&lt;br /&gt;
]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Harvard212|Harvard212]] 16:34 EST, 21 February 2012 &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; BSK342&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; Community, Architecture, and Regulation in the Something Awful Forum Space&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/Image:Bsk342assignment2.pdf]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BSK342|BSK342]] 21:30, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Blake Geno&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; Anonymity, Privacy and Evolving Tools&lt;br /&gt;
[http://cyber.law.harvard.edu/is2012/Image:Blakegeno_prospectus.odt]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 20:58, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Abby Bergman&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:ABergman_Prospectus.pdf Pinterest: Visually Arrested]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Research Focus:&amp;lt;/b&amp;gt; [http://www.pinterest.com/ Pinterest] and Copyright Infringement&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 19:55, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Fabian Celis J&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; The Role of the Internet in Distance Education: The Open University Case&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Fabian_Celis_Assignment_2.doc Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 19:09, 21 February 2012 (UTC)&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; André Pase and Priscila Lollo&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; When two worlds collide, digital TV and online video in an age of transformation&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Research Focus:&amp;lt;/b&amp;gt; online video x tv&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Assigment2_andrepase_priscilalollo.pdf Assignment 2]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Andrepase|Andrepase]] 20:17, 21 February 2012 (UTC)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; [http://pinterest.com/ Pinterest]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Spring2012-BerkmanAssignment2-DitkowskyAlexis.pdf Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Alexis,&lt;br /&gt;
&lt;br /&gt;
I would like to offer two sources which may be useful to supplement your research.  The first, the Millennium Development Goals (MDG), are a list of 8 goals adopted by the United Nations in an effort to eradicate poverty by the year 2015.  Several of the goals involve online access for poor countries, and one goal specifically addresses gender equality.  [http://www.un.org/millenniumgoals Millennium Goals Main Site]   And the second source, [http://www.tigweb.org Taking IT Global], is rich in content and will provide a wealth of information and resource material.  Good luck with your project, it looks interesting and informative.[[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
...................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; James Harris&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; The Internet and “Bridging the Gap” in Politics&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:James_Harris_Assignment_2.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 22:28, 20 February 2012 (UTC)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi James,&lt;br /&gt;
&lt;br /&gt;
I love the concept, I’m just a little fuzzy on the thesis.  Is the main focus going to concentrate on the elected-official/constituent relationship, or the paradigm shift of political campaign support? [[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
.................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alex Lloyd-Evans&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus Title:&amp;lt;/b&amp;gt; Social Structure&#039;s on the Writer&#039;s Forums of Cracked.com&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Research Focus:&amp;lt;/b&amp;gt; [http://www.cracked.com/ Cracked]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:AlexLE_Assignment_2.pdf Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Alex,&lt;br /&gt;
&lt;br /&gt;
Is this line correct – “free to enter forum”?  I don’t understand what that means.  This looks like it will be an interesting project.  I wonder if the editors will be surprised by your findings, or possibly take issue with your conclusion, depending on the outcome.  I am really looking forward to reading your paper.[[User:Louiscelli|Louiscelli]]&lt;br /&gt;
...................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Jeff Kimble&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Internet E-Commerce&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Jeff_Kimble_--_Assignment_2.doc]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:JeffKimble|JeffKimble]] 14:25, 21 February 2012 (UTC)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Jeff,&lt;br /&gt;
&lt;br /&gt;
While I am sure there will be plenty of studies that address this, it will be nice to see the data synthesized, analyzed, and compacted into a short paper.  You certainly will have lots of data to pour through.  I will be particularly interested in some of your research as it will complement my project as well.  Good luck, and if I run across any statistics that may be beneficial to your research, I’ll be sure to forward it along.[[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
....................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Louis Celli&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;e&amp;lt;/i&amp;gt;-commerce Taxation&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/Assignment_2_CELLI_Research_Prospectus.doc The Future of &amp;lt;i&amp;gt;e&amp;lt;/i&amp;gt;-commerce Taxation]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Terrorist Websites&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2012/Image:Emanuele_Assignment_2.doc Final Project Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Emanuele|Emanuele]] 16:06, 21 February 2012 (UTC)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Emanuele,&lt;br /&gt;
&lt;br /&gt;
This is going to be an exciting paper indeed.  This is a whopper and you might have trouble containing it to 10 pages.  The First Amendment question might be a great place to start, then begin to wind in the Patriot act, while comparing it to the Espionage act of 1917.  I can’t wait to read this paper, good luck![[User:Louiscelli|Louiscelli]]&amp;lt;br&amp;gt;&lt;br /&gt;
....................................................&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; [http://ask.metafilter.com/ Ask MetaFilter]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:JBrav_LSTU_E-120_Assignment_2.pdf Prospectus]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 17:41, 21 February 2012 (UTC)Jlynnping&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Managing a Flexible Work/Life Balance: Legal Ramifications of Facebook &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:2012_02_-_SZakuto_Prospectus.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Anonymous&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Thibodeau_Assignment_2.pdf]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 17:59, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Quynh Dang&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; [http://answers.yahoo.com/;_ylt=Agj1j2NWf7soiMwgqNKlvo6e5HNG;_ylv=3 Yahoo! Answers]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/Image:Quynh_Dang_Prospectus.doc Prospectus]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Qdang|Qdang]] 18:14, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Building a New Online Community in Drupal&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt; [http://cyber.law.harvard.edu/is2012/sites/is2012/images/Final_project_prospectus.doc Prospectus]&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 18:40, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Brendan Long&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Question &amp;amp; Answer Website Services and the Impact of Social Media&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2012/sites/is2012/images/Final_Project_Prospectus_-_Long%2C_Brendan.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 19:47, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Communicating with Constituents through Twitter&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus: [http://cyber.law.harvard.edu/is2012/Image:Assignment_2_Hope_Solomon.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 14:22, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Yerzhan Temirbulatov&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; Endless war on piracy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus: [http://cyber.law.harvard.edu/is2012/Image:YerzhanTemirbulatov_EndlessWarOnPiracy.doc Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Erzhik|Erzhik]] 20:42, 21 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Tara Baechel&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus title:&amp;lt;/b&amp;gt; The Internet, Adoption and the Privacy of Minors&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Prospectus: [http://cyber.law.harvard.edu/is2012/Image:Baechel_Assignment_2.pdf Prospectus]&amp;lt;br&amp;gt;&lt;br /&gt;
Comments:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:TBaechel]] 21:25, 21 February 2012 (UTC)&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=7676</id>
		<title>File:Harvard212 Assignment2.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=File:Harvard212_Assignment2.pdf&amp;diff=7676"/>
		<updated>2012-02-21T21:24:11Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7568</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7568"/>
		<updated>2012-02-17T07:30:01Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7567</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7567"/>
		<updated>2012-02-17T07:29:04Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with the Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my busy bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7566</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7566"/>
		<updated>2012-02-17T07:28:12Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1 Politics and Tech Control (Jan 24)&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Paradigms for Studying (Jan 31)&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Regulating Speech Online (Feb 7)&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with the Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
It would be great to see progress in this area, so that creative individuals would be able to build a sound business model. &lt;br /&gt;
&lt;br /&gt;
I also found &amp;quot;Democratizing Innovation&amp;quot; interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my work and family bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Technologies_of_Politics_and_Control:Community_Portal&amp;diff=7565</id>
		<title>Technologies of Politics and Control:Community Portal</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Technologies_of_Politics_and_Control:Community_Portal&amp;diff=7565"/>
		<updated>2012-02-17T07:21:33Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When is a telephone call a telephone call?  When you pick up the handset, dial a number and start speaking to someone?  Apparently not.  The FCC, which is funded by telecommunications surcharges, has held the position that voice transmitted over IP is considered information and not a phone call.  Perhaps they are rethinking this decision.  After all, traditional TDM infrastructure (the technology used to support calls over copper lines) is experiencing a decrease in use by consumers at a very rapid pace.  Many people are converting from traditional copper lines to digital phone service or Voice over IP (VoIP) as offered by companies like Skype and Vonage.  However, if voice over the internet is considered information, than why do telecommunications surcharges still apply?  Apparently someone thinks they shouldn&#039;t.  The following article reports of a landmark case where the courts have determined that Voice carried over the internet is information and therefore the surcharges do not apply.&lt;br /&gt;
&lt;br /&gt;
[http://www.telecomlawmonitor.com/2010/02/articles/voip/federal-court-rules-that-voip-need-not-pay-access-charges/ Link to Article here: Does this bode well for the FCC?]&lt;br /&gt;
&lt;br /&gt;
So what does this mean?  As consumers opt out of traditional POTS lines (plain old telephony system) is the FCC at a crossroads?  How do they acquire the funding necessary to support their agressive plans for a nationwide 100 squared access to the internet?  It is true that a significant amount of funds will be garnered due to the American Re-Investment and Recovery Act of 2009, but unless an ongoing plan for funding exists, those funds will eventually run out and then what?  Who will be left to pay for the rest?  Do I smell a true and real internet tax coming on?  And if so... how do we collect that tax from the foreign users and businesses who we interact with... Or will the burden be placed upon us?  Thoughts anyone?  D. Jodoin --[[User:Lunatixcoder|Lunatixcoder]] 16:48, 27 February 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://blog.infotech.com/analysts-angle/social-media-a-double-edged-sword-for-democracy-advocates/ Social Media a Double-Edged Sword for Democracy Advocates] --[[User:Gclinch|Gclinch]] 16:04, 12 June 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I came across this article the other day and felt that it may interest some of you as well.  It involves a patent suit going on now (just filed actually) over the ownership of the interactive web.  To learn more, check out this link:  [http://www.wired.com/threatlevel/2012/02/patent-troll-trial/?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed:+wired/index+(Wired:+Index+3+(Top+Stories+2)) Patent Troll Claims Ownership of Interactive Web – And Might Win] [[User:JeffKimble|JeffKimble]] 14:54, 9 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See comments for Class 3 by Harvard212. http://cyber.law.harvard.edu/is2012/User_talk:Harvard212&lt;br /&gt;
&lt;br /&gt;
17 February 2012: Just updated Comments for Class 4 by Harvard212 http://cyber.law.harvard.edu/is2012/User_talk:Harvard212&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7564</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7564"/>
		<updated>2012-02-17T07:19:58Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Feb 7th&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0800)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with the Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
I also thought, &amp;quot;Democratizing Innovation&amp;quot; to be interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my work and family bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7563</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7563"/>
		<updated>2012-02-17T07:18:23Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1&#039;&#039;&#039;&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2&#039;&#039;&#039;&lt;br /&gt;
Summary: Elaborated on inter-boundaries regulation. Questioned: social phenomenon of cultural differences, amongst other things.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 3 Feb 7th&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 4 New Economic Models (Feb 14)&#039;&#039;&#039;&lt;br /&gt;
(Posted February 17, 2012 3:16pm GMT+0500)&lt;br /&gt;
&lt;br /&gt;
From the collection of this week&#039;s readings, I really enjoyed &amp;quot;Better Than Free&amp;quot;. I agree with the Eight Generatives points, although I would have framed some of the arguments differently. &lt;br /&gt;
&lt;br /&gt;
Of the Eight Generatives, I was particularly interested in: &lt;br /&gt;
	- Interpretation&lt;br /&gt;
	- Embodiment&lt;br /&gt;
	- Patronage&lt;br /&gt;
	- Findability&lt;br /&gt;
&lt;br /&gt;
With so many things currently free to the market it is true that the know-how (or the insider view) to make the most use of free-ware a possible lucrative pursuit and endeavor for entrepreneurs. It would be interesting to see smart innovators combine free ware to help other entrepreneurs build lean start-ups. &lt;br /&gt;
&lt;br /&gt;
I agree that embodiment and human interaction would become a premium as technology advances. Especially as everything is produced on the web and free (and quickly) available. This saturation in tech-connection and focus on embodiment would add value to the Patronage generative.&lt;br /&gt;
&lt;br /&gt;
Lastly, Findability correlates tightly with the Interpretation - or at least it should. If Interpretation becomes a premium knowledge as a known phenomenon then Findability is the bedrock for connective innovation (how all the technologies (and non-tech) peripherals meet and collide).&lt;br /&gt;
&lt;br /&gt;
I also thought, &amp;quot;Democratizing Innovation&amp;quot; to be interesting.&lt;br /&gt;
&lt;br /&gt;
Hope you&#039;re all well, I will soon be over my work and family bump and be rejoining classroom live-chats soon. All the best!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7504</id>
		<title>User talk:Harvard212</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=User_talk:Harvard212&amp;diff=7504"/>
		<updated>2012-02-14T07:08:08Z</updated>

		<summary type="html">&lt;p&gt;Harvard212: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Recap of Harvard212 Contribution in Class Discussion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Summary: I brought up the political connotation that (this rapid) media can play -- highlighting, in particular, the necessity of social responsibility and reliable journalism.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 2 Feb 7th&#039;&#039;&#039; &lt;br /&gt;
I missed this class, but through the readings these were my thoughts on Regulating Free Speech.&lt;br /&gt;
&lt;br /&gt;
I respect the opportunity that America provides for its citizens in regards of Free Speech. Ultimately, it would be great to see that truly (and fully) utilized in the spectrum of Journalism. However, I agree with the Citizen Media Law writing on Defamation (http://www.citmedialaw.org/legal-guide/defamation) - especially having completed the Feb 7th Wikipedia assignment. It is too easy to pass personal judgment on the Net as &amp;quot;facts.&amp;quot; The risk of defamation and the opportunity to slander and diminish an individual&#039;s (or corporation) reputation is freely available to any individual. As I worked through the Wikipedia website, and as a critical reader, I was not hasty to pass certain information as true. Sadly, that can&#039;t be said of all individuals that contribute &amp;quot;information&amp;quot; on the Internet.&lt;br /&gt;
&lt;br /&gt;
I also appreciate the Protection for Private Blocking and Screening ( http://www.law.cornell.edu/uscode/text/47/230). First, for its bullet point conciseness. Second, for its clarity on the message (benefits of privacy and screening). &lt;br /&gt;
&lt;br /&gt;
I had done a little curious reading into Zittrain and found this week&#039;s reading by Cornell Law useful in shedding light on the Morris worm phenomenon.  It served to synthesize the material and juxtapose arguments on Morris&#039; contribution, fluke, or unnecessary risk(s) in a balancing (and understanding) way. Without Morris&#039; random tap into MIT&#039;s computers, we wouldn&#039;t have the social phenomenon and understanding of computers getting bugged. Simultaneously, it creates job opportunities and work for security companies. It is important to remember that all users take personal responsibility in the usage of the Internet and decipher the best practice for their communicative needs. As we can see now, the Net carries a certain set of liabilities and benefits. For those who have already been tripped up in this area, I say: live and learn. And don&#039;t take the bait to any prowless pranks or angry postings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Subject to change.&lt;/div&gt;</summary>
		<author><name>Harvard212</name></author>
	</entry>
</feed>