Assignment 2 Submissions: Difference between revisions
No edit summary |
Gpanjhazari (talk | contribs) |
||
Line 32: | Line 32: | ||
===Submissions=== | ===Submissions=== | ||
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC) | |||
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya | |||
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt | |||
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC) | *Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC) |
Revision as of 02:34, 26 February 2011
This assignment is due on February 22. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).
The upload file link is to the left, under toolbox. Once you've uploaded your file, please link to it following the format below:
- Name:
- Prospectus title:
- Link to prospectus: (the file you uploaded)
If you have trouble finding the file you uploaded, check the list of uploaded files.
Comments
Everyone will receive an additional participation grade for this assignment. You should read through everyone's proposals after they are uploaded and add constructive comments below the proposal on which you're commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (Remember to sign your comments!)
Submissions
- Name: Gagan Panjhazari --Gpanjhazari 07:34, 26 February 2011 (UTC)
- Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt
- Name: Saam Batmanghelidj --Saambat 10:00, 23 February 2011 (UTC)
- Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc
- Name: Kimberly Nevas --KimberlyNevas 02:17, 23 February 2011 (UTC)
- Prospectus Title: Can the U.S. Prosecute Julian Assange?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf
- Name: Jamil Buie
- Prospectus Title: Profiteering via "Public Privacy" The use/misuse of your data
- Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf
- Name: Uduak Patricia Okon
- Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf
- Name: Yaerin Kim Quill80 02:17, 23 February 2011 (UTC)
- Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc
- Name: William Bauser -- Wnb 23:55, 22 February 2011 (UTC)
- Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf
- Name: Brian Smith Smithbc 23:47, 22 February 2011 (UTC)
- Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --VladimirK 20:03, 24 February 2011 (UTC)
- Name: Yu Ri Jeong --Yu Ri 22:22, 22 February 2011 (UTC)
- Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.
- Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc
- Name: La Keisha Landrum llandrum 21:48, 22 February 2011 (UTC)
- Prospectus Title: Building a Sustainable News Org
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc
- Name: Jillian YorkJyork 21:48, 22 February 2011 (UTC)
- Prospectus Title: Understanding "Lesbanon": Lebanon's Online Lesbian Community
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc
- Name: Caroline McLoughlinCamcloughlin 21:44, 22 February 2011 (UTC)
- Prospectus title: Privacy and Society
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf
- Name:Anthony Crowe Acrowe
- Prospectus title: Tagging and Metadata on the Internet and in New Media
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc
- Name: Vladimir Kruglyak --VladimirK 21:13, 22 February 2011 (UTC)
- Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of "conspiracies" from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a "popular" topic, blurring the "secret" component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that's on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the "accused" by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the "right cause", that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don't you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín. --lorenabuin 21:17, 25 February 2011 (UTC)
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer's privacy. Collecting data on traffic flow of observed websites may be fine, but trying to parse the IP addresses into geographical locations through a Whois database may be difficult and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. Deinous 04:15, 26 February 2011 (UTC)
- Name:Corey MacDonald Coreymacd 20:28, 22 February 2011 (UTC)
- Prospectus title: Fringe Forums for the Under-represented
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc
- Name: Richard (Rick) Kundiger --Rakundig 19:38, 22 February 2011 (UTC)
- Prospectus title: The Role of Bittorrent in the Internet Society
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf
- Name: Mary Van Gils
- Prospectus title: Yelp Case Study - Freedom of Expression
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc
- Name: Susan Jennings [[sjennings 15:46, 22 February 2011 (UTC)]]
- Prospectus title: Annuity Companies' Social Media Communities
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc
- Name: Alan Davies-Gavin & Alex Solomon
- Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf
- Name: Kristina Meshkova
- Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf
- Name:Vladimir Trojak--VladimirTrojak 20:01, 20 February 2011 (UTC)
- Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf
- Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --SCL 03:06, 22 February 2011 (UTC)
- Name: Faye Ryding FMRR 23:59, 21 February 2011 (UTC)
- Prospectus title: Trolls and vandals on Epinions.com
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc
- Name: Alex Bryan 16:59, 21 February 2011
- Prospectus title: Groooveshark music application
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf
- Comments:
- Name: Robert Cunningham
- Prospectus title: The Archive Team
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf
- Name: Joshuasurillo
- Prospectus title: The effect of government transparency websites- Wikileaks
- Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc
- Name: Susan Lemont
- Prospectus title: Why do people cultivate large online networks?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc
- Name: Chris Sura -Chris Sura 03:13, 22 February 2011 (UTC)
- Prospectus title: The Java Community Process: How Does It Really Work?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf
- Name: Ed Arboleda Earboleda 04:42, 22 February 2011 (UTC)
- Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf
- Name: Elisha Surillo
- Prospectus title: The Tea Party and Internet Freedom
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc
- Name: Brandon A. Ceranowicz - BrandonAndrzej 08:29, 22 February 2011 (UTC)
- Prospectus title: A Comparative Study of Open Source Licenses
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc
- Name: Lorena Abuín
- Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf
I noticed that there is a lot of crossover between our topics. We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here. Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is. They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous. In other words, Anonymous is a concept more than an identifiable specific group. I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published. It could simply be the rantings of teenager enamored with the publicity of their antics and activity. The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized. There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal. Good luck, and I look forward to watching your project develope! -----=:) Deinous 23:28, 23 February 2011 (UTC) for the #datalove
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called "hacktivism" to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler's Army is not a secret nowadays because of the "hacktivism", although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the "wrong way" is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the "uniformed criminals" employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&task=view&id=17&Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers' dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --VladimirK 10:29, 25 February 2011 (UTC)
Hai. Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers. Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker. In a nutshell, hackers create things and crackers break things. Most hackers look down upon crackers and dismiss them as technological bugs. Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once. Pastebin happens to not be one used for documents all that much though. It is mainly used to send larger pieces of text into chat protocols such as IRC without flooding the channel. Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it. Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society. I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, "How to Become a Hacker" describes the difference quite well. Deinous 03:11, 26 February 2011 (UTC)
- Name: Margaret Tolerton deinous
- Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study
- Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about "hacktivism", I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every "hacktivist" action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called "cyber-crimes" that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: "Happy to help others who are not as advanced?". I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don't hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín. --lorenabuin 21:00, 25 February 2011 (UTC)
LOL, I don't know how privileged my point of view is. I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations. Telecomix is very open about their work, and does not engage in illegal actions. Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment "happy too help others who are not as advanced" is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem. For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know how to fix the problems will jump in and start coaching with many lulz along the way.Deinous 03:45, 26 February 2011 (UTC)
- Name: Guy Clinch --Gclinch 13:22, 22 February 2011 (UTC)
- Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive
- Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf
- Name: Syed Yasir Shirazi [User: syedshirazi]
- Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf
- Name: Jessica Sanfilippo - Jsanfilippo 16:03, 22 February 2011 (UTC)
- Prospectus title: Transparency and Participation in Crowd Funding
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc
- Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [(Anna 17:03, 22 February 2011 (UTC))]
- Prospectus title: Analysis of E-Government Practices in Brazil
- Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf
- Name: Laura Connell Ltconnell 18:15, 22 February 2011 (UTC)
- Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf
- Name: Alokika Singh Singh singh 19:32, 22 February 2011 (UTC)User:Singhsingh
- Prospectus title: Online Political Activism in India
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf
- Name: Don Hussey Donaldphussey 19:47, 22 February 2011 (UTC)
- Prospectus title: Online Crowd-Sourcing of Starbucks Product Development
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc
- Name: Tym Lewtak lewtak 21:31, 22 February 2011 (UTC)
- Prospectus title: User Generated Sites: Defining Superusers and Their Monetization
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf
- Name: Denise Reed---dreed07 21:40, 22 February 2011 (UTC)
- Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers
- Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc
- Name: Michelle Forelle mcforelle 21:56, 22 February 2011 (UTC)
- Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism
- Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf
- Name: Myra Garza Myra
- Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses
- Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc