Assignment 2 Submissions: Difference between revisions
Line 175: | Line 175: | ||
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST) | [[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST) | ||
:Steve: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you're looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called "Facebook for companies." Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to "flatten hierarchy" and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company's permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST) | |||
**** | **** |
Revision as of 13:01, 27 February 2013
Submission Instructions
This assignment is due on February 21. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).
Please name your file "wikiusername_Assignment2," where "wikiusername" is replaced with your username, to avoid overwriting someone else's assignment or causing errors in the Wiki by including forbidden characters. So if your username is "jdoe" and your file is a Word document your file should be named "jdoe_Assignment2.doc."
Upload your rough draft here: Upload file. If you have trouble finding the file you uploaded, check the list of uploaded files.
In the submissions section below please post the following information:
- Name or pseudonym:
- Prospectus title:
- Link to prospectus: (add your link here)
Comments
Everyone will receive an additional participation grade for this assignment. You should read through everyone's proposals after they are uploaded and add constructive comments below the proposal on which you're commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. Please remember to sign your comments by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post. If we don't know who you are we can't give you credit for finishing this assignment!
Name or pseudonym: interestingcomments
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx
Interestingcomments 18:47, 24 February 2013 (EST)
Pseudonym: "Asmith" Prospectus title: “Diaspora* A Social Network for the People by the People” Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc
Asmith 00:10, 25 February 2013 (EST)
Pseudonym: Rich Cacioppo Prospectus title: "The Limits of Fee Speech In Light of Cultural Senility and Pragmatism" Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf Rich 00:45, 25 February 2013 (EST)
- Rich: Of the three case studies that you're considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.JW 20:33, 26 February 2013 (EST)
Pseudonym: AaronEttl Prospectus Title: "The Market's Impact on Operational Policies" Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx AaronEttl 13:11, 25 February 2013 (EST)
Pseudonym: Hgaylor Prospectus:“Access for Open and Secure Communication” An In-depth analysis of government’s role in the Global Collaborative Data Network. Link to Prospectus: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&oldid=9645
Pseudonym: Dear Alice Prospectus Title: "One Company, Multiple Social Media Platforms, Numerous Conversations" Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx --Dear Alice 17:50, 25 February 2013 (EST)
Michael Keane "A Single Site Case Study of the Effect of Censorship on a Web Community" http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx
Michaelekeane 18:20, 25 February 2013 (EST)
Rebekahjudson Title: "'Weird Twitter': Critique from Within?" Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf
Rebekahjudson 21:09, 25 February 2013 (EST)
Name or pseudonym: Joshywonder Prospectus title: Lawbuzz_Prospectus Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx
Matthew D. Haney "Online Review Platform Yelp – filtering for hire?" http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx
- Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?JW 22:04, 26 February 2013 (EST)
Milenagrado "Duolingo and Copyright Issues" http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc Milenagrado 21:34, 25 February 2013 (EST)
- Pseudonym: Tessa May
- Prospectus title: Moderation or Censorship in LinkedIn Groups?
- Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf
Tessa May 02:52, 26 February 2013 (EST)
Alicia Phan | APhan "Assignment#2 - Law As Culture; Facebook & Privacy Rights" http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx APhan 08:24, 26 February 2013 (EST)
- Alicia: If you feel that it's relevant to your paper, I would be interested in reading your analysis of the pending class action Fraley v. Facebook.JW 22:28, 26 February 2013 (EST)
Assignment 2 _USER777 . Facebook-Marketing-Power of "Like" http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx user777 11:35, 26 February 2013 (EST)
Muromi Prospectus Title: Maintaining Stability in China's Cyberspace http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf --Muromi 12:02, 26 February 2013 (EST)
- Muromi: Instead of using Lessig's four factors, I think it would be interesting to use Zittrain's generativity lens to examine how China manages to innovate in spite of all the existing controls. I'd be curious to find out in what respects China's cyberspace is (or could) be unlimited.JW 21:22, 26 February 2013 (EST)
- Zak Paster
- Online Giving: A New Fundraising Era
- http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx
- Zak Paster 12:49, 26 February 2013 (EST)
RobMcLain Under the Watchful Eye: Community, Connivery, and Censorship on Yelp http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx
- RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?JW 22:04, 26 February 2013 (EST)
The Right to be Forgotten http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc Caroline 13:28, 26 February 2013 (EST)
- Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.JW 23:33, 26 February 2013 (EST)
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. Johnathan Merkwan 13:46, 26 February 2013 (EST)
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx (Free speech 14:13, 26 February 2013 (EST))
- Phillip Dade
- The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)
- http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc
- Phildade 15:01, 26 February 2013 (EST)
- Phil: I wonder how you will "avoid direct engagement with members of the community" when you've stated that you will interact with and interview DPLA players and opponents. Perhaps I'm misunderstanding something, such as the teaching staff approving your methodology?JW 23:20, 26 February 2013 (EST)
Name: Susan Goldstein Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?” Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx Susan Goldstein 15:44, 26 February 2013 (EST)
- Susan: I'm curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)JW 22:28, 26 February 2013 (EST)
Kaley Sweeney 15:47, 26 February 2013 (EST) Kaley Sweeney Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx
- Kaley: The part of your prospectus that most caught my attention is the very end: "the changes that are beginning to unfold with the rise in mobile internet access in the country." I would read a 10-page paper entirely focusing on mobile Internet access in North Korea!JW 21:33, 26 February 2013 (EST)
- Raven
- Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community
- Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&oldid=9718
Raven 15:59, 26 February 2013 (EST)
Saridder 16:18, 26 February 2013 (EST) saridder Steve Ridder
The Digital Marketplace
Link: http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx
Saridder 16:18, 26 February 2013 (EST)
- Steve: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you're looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called "Facebook for companies." Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to "flatten hierarchy" and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company's permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. Asmith 13:01, 27 February 2013 (EST)
María Paz Jurado Internet regulation in Argentina, the case of Taringa! http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf --Maria 16:22, 26 February 2013 (EST)
- María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country's equivalent, e.g. Reddit, Craigslist, Steam, etc.JW 21:22, 26 February 2013 (EST)
John Floyd Emergent Institutions: Technical Innovation in the Absence of Governance http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt Johnfloyd6675 16:53, 26 February 2013 (EST)
Pseudonym: CyberRalph Prospectus: Anonymous and Their Aggressiveness in the Twittersphere http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx CyberRalph 16:55, 26 February 2013 (EST)
Name or pseudonym: Julian Prospectus title: We the People: On the Effectiveness of Public Outreach Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt Julian 17:10, 26 February 2013 (EST)
- Julian:You've presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.JW 21:22, 26 February 2013 (EST)
Aly Barbour Prospectus: The prevalence and moderation of the ‘Pro-Ana’ movement http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx Alybarbour 17:17, 26 February 2013 (EST)
Pseudonym: JW
Prospectus title: Reddit's Dox Paradox: Proper or Not?
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txtJW 17:36, 26 February 2013 (EST)
- JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But "justifiable doxxing" also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit's stance was clearly: doxxing is bad, period. But do community members feel differently? Asmith 12:30, 27 February 2013 (EST)
Pseudonym: Jax, formerly known as Jaclyn Horowitz
Prospectus Title: Ignorance and the Colonization of Rap Genius
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx
Jax 17:57, 26 February 2013 (EST)
Becca Luberoff
Prospectus title: Issues of Privacy and Security in Online Mental Health Communities
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx
BeccaLuberoff 19:41, 26 February 2013 (EST)
- Becca: I've noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?JW 22:42, 26 February 2013 (EST)
Pseudonym: baughller Prospectus title: Ethical Implications of Personalized Search Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx